Drift Protocol $280M exploit took months of deliberate preparation

Drift Protocol, a decentralized cryptocurrency exchange (DEX), says the recent exploit against the platform was a six-month-long, highly coordinated attack.

In an X post on Saturday, Drift said ‘The preliminary investigation shows that D drift was part of a structured intelligence operation with organizational support, significant resources and months of deliberate preparation.

The decentralized exchange was exploited on Wednesday, with external estimates putting losses at around $280 million.

It all began at a “major crypto conference”

Drift says the attack plan dates back to around October 2025, when “savage actors posing as a quantitative trading firm” first approached D drift contributors at’major crypto conference,” saying they would like to integrate with the protocol.

Drift Protocol 0M exploit took months of deliberate preparation

Source: Drift Protocol

Source: Drift Protocol

Over the next six months, the group continued to engage in person with contributors at several industry events. But this seems to be a targeted approach, where people from this group continued to deliberately seek out and engage certain Drift contributors,” said Diffr.

“They were technically fluent, had verifiable professional backgrounds, and were familiar with how Drift operated,” Drift said.

Having established trust and access to Drift Protocol over six months they used shared malicious links and tools to compromise contributors’ devices, execute the exploit (and then erased their presence immediately after the attack).

The incident also serves as an example of how crypto industry participants must remain cautious, even during in-person interactions, to be alerted and skeptical; for instance, the emergence of crypto conferences can serve as prime targets for sophisticated threat actors.

Drift flags a high probability of a Radiant Capital hack link

The exploit was executed by the actors behind the October 2024 Radiant Capital hack, Drift said with’medium-high confidence’ that it was carried out by “the same actors who did this,” D drift said.

According to Radiant Capital in December 2024, “the exploit was executed using malware sent via Telegram from a North Korea-aligned hacker who is seen as an ex-contractor.”


Source: Dith

Source: Dith

Originally shared for feedback by other developers, this ZIP file was ultimately malware that helped to fuel the subsequent intrusion, Radiant Capital said.

Drift said it is “important to note” that the individuals who appeared in person “were not North Korean nationals.”

Related: Naoris launches post-quantum blockchain as quantum security risks gain attention

“DPRK threat actors operating at this level are known to deploy third-party intermediaries to conduct face-to-face relationship-building,” Drift said.

Drift said it is working with police and others in the crypto industry to “build a full picture of what happened during April 1st attack,” Diff said. Paraphrast.

Magazine: Bitcoin 85% crashes ‘done,’ CLARITY Act speculation mounts: Hodler’s Digest, Mar. 29 – April 4

Thanks for reading Drift Protocol $280M exploit took months of deliberate preparation

Check Also

Aave Labs Proposes Dedicated Bug Bounty Program for Aave V4 With Sherlock

Aave Labs Proposes Dedicated Bug Bounty Program for Aave V4 With Sherlock

A proposal for a dedicated bug bounty program for the 24/7 channel to report security …

Teras Media
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.