Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»North Korean Hackers Drain $285 Million From Drift in 10 Seconds
    Cybersecurity

    North Korean Hackers Drain $285 Million From Drift in 10 Seconds

    adminBy adminApril 5, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cryptocurrency heist
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A North Korean threat actor is likely to be blamed for a $285 million heist from decentralized finance (DeFi) platform Drift, executed as part of a carefully planned attack.

    The incident, Drift said, was a “highly sophisticated operation” involving “the use of durable nonce accounts to pre-sign transactions that delayed execution” and the compromise of multisig signers’ approvals.

    “Drift Protocol is coordinating with multiple security firms to determine the cause of the incident. Drift is also working with bridges, exchanges, and law enforcement to trace and freeze stolen assets,” Drift said, promising more details in a future postmortem.

    According to blockchain security company Elliptic, the attack was likely mounted by a North Korean threat actor and resulted in the theft of $286 million from Drift. Over the past several years, Pyongyang-aligned hackers are estimated to have stolen over $6.5 billion in cryptocurrency.

    The attack was executed with extreme precision: the hackers set up supporting infrastructure roughly eight days before, prepared multiple nonce-based transactions, gained admin control, drained funds from five vaults within seconds, and immediately started laundering them through multiple wallets.

    A PIF Research Labs analysis of the heist shows that the attackers created a brand-new wallet eight days before the exploit and performed a series of microtransactions to ensure it could receive seven types of tokens.

    Advertisement. Scroll to continue reading.

    The attackers used a durable nonce to create a transaction on the Solana blockchain that would never expire, and then pre-signed every transaction used during the attack to ensure everything was executed rapidly.

    Five hours before the attack, the hackers gained control of a Drift admin key, which allowed them to modify settings on the protocol. It was protected by a multisig, but Drift allows for changes to be approved with only 2 out of 5 keyholders.

    “Five hours before the exploit, the carryover signer proposed transferring the admin key. One of the new signers co-signed within one second,” and because the change had a zero-second timelock, it was executed instantly, PIF Research Labs explains.

    Fake market, fake tokens, real theft

    The hackers used the compromised admin key 25 seconds before the heist to create a fake collateral market for CVT, a worthless token they had minted 20 days earlier, and to disable Drift’s safety system that prevents massive, rapid asset drains.

    The market was configured to drain as many funds as possible by setting CVT parameters to increase the value of the fake tokens, eliminate penalties for depositing massive supply, and eliminate incentives to liquidate the fake position.

    Additionally, CVT’s tier was set to the highest available on Drift, to ensure borrowing power for the fake tokens, and an ‘oracle’ for it was used to increase the value of the worthless tokens to hundreds of millions.

    To disable the DeFi platform’s anti-drain system, the hackers modified its circuit breakers, which are designed to block withdrawals if too many assets are drained from a vault too fast, raising the value to 500 trillion.

    “The fake market creation and the circuit breaker modifications were bundled into a single on-chain transaction at 16:05:39 UTC. Twenty-five seconds later, the withdrawals began. The entire weaponisation took less time than it takes to order coffee,” PIF Research Labs notes.

    Two seconds after depositing 500 million CVT, which the fake oracle valued at over $100 million, the heist started. Within 10 seconds, funds were drained from JLP, USDC, cbBTC, USDS, dSOL, and wETH. The JLP vault was completely drained.

    Next, the hackers began laundering the money. The funds were moved from the attackers’ wallet to 27 getaway wallets and then scattered across 57,331 wallet addresses using automated bots. Roughly $225 million in assets were swapped to Ethereum and stored in three wallets.

    The bots continued their work for over 34 hours, making 590 transactions per minute, operating across multiple blockchains and centralized exchanges simultaneously, adding complexity to the money-trail investigation. PIF Research Labs says more than 860,000 transactions were made within 34 hours.

    Related: Axios NPM Package Breached in North Korean Supply Chain Attack

    Related: US Charges Uranium Crypto Exchange Hacker

    Related: Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

    Related: North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers

    drain Drift hackers Korean Million North seconds
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI didn’t realize how much of Amazon’s Fallout set was actually real
    Next Article Google Meet Is Now Available in CarPlay
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026

    12 Awesome Custom Google Analytics Reports Created by the Experts

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,214)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026
    Most Popular
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    • 12 Awesome Custom Google Analytics Reports Created by the Experts
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    • Google adds llms.txt check to Chrome Lighthouse
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.