Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
#DriftProtocolHacked
A $285 million state-sponsored intelligence operation disguised as a crypto conference handshake. The industry is reeling from one of the most sophisticated DeFi attacks ever recorded.
The Scale of the Breach
Drift Protocol, the largest perpetual futures exchange on Solana, was drained of approximately **$285 million on April 1, 2026**. The attack was not a smart contract vulnerability or a stolen key, but the culmination of a **six-month social engineering operation** orchestrated by **UNC4736 (Citrine Sleet/AppleJeus)** , a state-sponsored group linked to North Korea. Chainalysis has stated that if confirmed, North Korea-linked crypto heists would total at least $10.58 trillion won globally. The scale of the operation is staggering: the group established a fake quantitative trading firm identity, deposited over $1 million of their own real capital, and met Drift contributors in person at conferences across multiple countries before striking.
---
Anatomy of a State-Sponsored Attack
The attackers began their operation in the fall of 2025 at a major crypto conference, where they posed as representatives of a quantitative trading firm. What followed was a meticulous, patient campaign of trust-building that spanned roughly half a year.
· The Infiltration Phase: By December 2025 and January 2026, the group had onboarded an Ecosystem Vault on Drift, submitted strategy documentation, participated in multiple working sessions with contributors, and deposited over $1 million of their own capital. Drift described this behavior as entirely consistent with how legitimate trading firms typically integrate with the protocol.
· The Human Layer: Throughout February and March 2026, Drift contributors met members of the group face-to-face at several major industry conferences in different countries. By the time the attack was launched, these were not strangers but established working partners with a nearly six-month-old relationship.
· The Technical Vectors: Once trust was established, the group deployed a dual-pronged attack: one involved a malicious TestFlight application (Apple's pre-release app distribution platform that bypasses App Store review) presented as their wallet product; the other exploited a known vulnerability in VSCode and Cursor where simply opening a file or folder was enough to silently execute arbitrary code with no warning or prompt.
---
The Execution: A Solana Feature Turned Weapon
The attackers abused a legitimate Solana feature called "durable nonces," which allows transactions to be pre-signed and remain valid indefinitely. By tricking two of Drift's five-member Security Council multisig signers into approving what appeared to be routine transactions, the attackers obtained pre-signed approvals that sat dormant for more than a week. On April 1, they executed those pre-signed transactions, seizing protocol-level administrative powers in under one minute.
---
The Aftermath: Market Fallout and Community Backlash
The immediate impact was devastating:
· TVL Collapse: Drift's total value locked plunged from roughly $550 million to under $250 million in a single morning, a drop of over 53%.
· Token Crash: The DRIFT token dropped as much as 45% in the hours that followed, bottoming near $0.04–$0.05.
· Wider Ecosystem Impact: At least 20 other projects with exposure to Drift liquidity or strategies paused operations or assessed losses.
· Circle Under Fire: On-chain investigator ZachXBT criticized Circle for failing to freeze stolen USDC during the attack, as the attacker used Circle's own Cross-Chain Transfer Protocol (CCTP) to bridge approximately $232 million worth of USDC from Solana to Ethereum without intervention.
---
Legal and Security Implications
Crypto attorney Ariel Givner has stated that the incident may constitute "civil negligence," arguing that the Drift team failed to follow basic security procedures—including keeping signing keys on separate, air-gapped systems and conducting due diligence on developers met at industry conferences. Ads for potential class action lawsuits against Drift Protocol are already circulating. In response, the Solana Foundation and Asymmetric Research launched the STRIDE security program on April 6, 2026, providing formal verification and threat monitoring for Solana DeFi protocols.
---
A New Era of DeFi Threats
This attack represents a fundamental escalation in the threat landscape. It wasn't a code exploit—it was a structured intelligence operation requiring organizational backing, significant resources, and months of deliberate preparation. The attackers didn't just build fake LinkedIn profiles; they deployed intermediaries with fully constructed identities, verifiable employment histories, and professional networks capable of withstanding real due diligence. As one security researcher noted: "If attackers act like a real organization for six months, invest funds, and participate in the ecosystem, it is practically impossible to detect them with existing security systems".
#DeFiHack #NorthKoreaCrypto #DriftProtocol #CryptoSecurity