Drift Protocol has disclosed that a $270 million exploit was the result of a six-month intelligence operation by a North Korean state-affiliated group. The attackers infiltrated the protocol through a sophisticated social engineering campaign and exploited known vulnerabilities in code editors.
- Drift Protocol's $270 million exploit was orchestrated by a North Korean state-affiliated group over six months.
- The attackers infiltrated the protocol by presenting themselves as a legitimate trading firm and building a credible presence through multiple conferences and working sessions.
- The breach occurred via a TestFlight application and a known vulnerability in VSCode and Cursor code editors.
- The attackers obtained multisig approvals to execute pre-signed transactions, draining $270 million in under a minute.
- Drift has attributed the attack to UNC4736, a group also linked to the Radiant Capital attackers and DPRK-linked personas.
- The incident underscores the vulnerabilities in DeFi's multisig governance model and the need for enhanced security measures.
Sign up free to read the full analysis
Create a free account to unlock full AI-curated market articles, personalized alerts, and more.