Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»North Koreans hackers likely behind $286 million Drift Protocol exploit: Elliptic
Security

North Koreans hackers likely behind $286 million Drift Protocol exploit: Elliptic

April 4, 2026No Comments3 Mins Read

Elliptic said Thursday the $285 million Drift Protocol exploit, the largest this year, carries “multiple indicators” of North Korea’s state-sponsored DPRK hacker group involvement.

The research firm pointed specifically to onchain behavior, laundering methodologies and network-level signals, all of which align with previous state-linked attacks.

Drift Protocol, whose token has dropped over 40% to roughly $0.06 since the hack, is the largest decentralized perpetual futures exchange on the Solana blockchain.

“If confirmed, this incident would represent the eighteenth DPRK act Elliptic has tracked this year, with over $300 million stolen so far,” the report said.

“It is a continuation of the DPRK’s sustained campaign of large-scale cryptoasset theft, which the U.S. government has linked to the funding of its weapons programs. DPRK-linked actors are believed to be responsible for billions of dollars in cryptoasset theft in recent years,” Elliptic added.

Hours earlier, Arkham data showed that over $250 million had been moved from Drift to an interim wallet, then to various other addresses.

In December, a Chainalysis report revealed DPRK hackers stole a record $2 billion of crypto in 2025, including the $1.4 billion Bybit breach, representing a 51% increase from the previous year. The U.S. Treasury Department last month said North Korea uses the stolen assets to fund the country’s weapons of mass destruction program.

Rather than focusing on the exploit itself, Elliptic’s analysis highlights a familiar operational pattern. The activity appears “premeditated and carefully staged,” with early test transactions and pre-positioned wallets preceding the main event.

The report explains that once executed, funds were rapidly consolidated and swapped, bridged across chains, and converted into more liquid assets, reflecting a structured, repeatable laundering flow designed to obscure origin while maintaining control.

See also  South Korea’s Hanwha makes a $13 million bet on ‘seedless’ crypto wallets

A central challenge, Elliptic notes, is Solana’s account model. Because each asset is held in a separate token account, activity tied to a single actor can appear fragmented across multiple addresses. Without linking these, investigators risk seeing “fragments of the attacker’s activity, not the complete picture.”

This is where Elliptic’s report highlights the clustering approach, which connects token accounts back to a single entity, allowing exposure to be identified regardless of which address is screened. In an incident involving more than a dozen asset types, that entity-level view becomes critical.

The case also emphasizes, Elliptic adds in its report, how laundering has become inherently cross-chain. Funds moved from Solana to Ethereum and beyond, demonstrating the need for what Elliptic described as “holistic cross-chain tracing capabilities.”

Source link

Drift Elliptic Exploit hackers Koreans Million North protocol

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Synbo Protocol Partners With DeBox Social to Accelerate DeFi Fund Growth With Web3 Community Engagement

May 2, 2026
Top Posts

EmSam, Jury Questions and Another Denial for Bankman-Fried

October 1, 2023

SIGN Headed to $0.012 as Oversold Bounce Fails

April 17, 2026

The Glamsterdam Ethereum Upgrade: Ethereum’s Most Ambitious Redesign Since the Merge

April 20, 2026

Type above and press Enter to search. Press Esc to cancel.