HomeIntelligenceBrief
BREACH BRIEF🔴 Critical Breach

DPRK Social Engineering Operation Steals $285 Million from Solana‑Based Drift DEX

A six‑month, state‑sponsored social‑engineering campaign by North Korea compromised admin credentials at Drift, a Solana decentralized exchange, resulting in the theft of $285 million. The incident underscores heightened geopolitical risk to crypto‑infrastructure and the need for strong human‑factor controls in third‑party risk programs.

LiveThreat™ Intelligence · 📅 April 06, 2026· 📰 thehackernews.com
🔴
Severity
Critical
BR
Type
Breach
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
3 recommended
📰
Source
thehackernews.com

DPRK Social Engineering Operation Steals $285 Million from Solana‑Based Drift DEX

What Happened — A six‑month, state‑sponsored social‑engineering campaign by the Democratic People’s Republic of Korea culminated on April 1 2026 in the theft of roughly $285 million from Drift, a Solana‑based decentralized exchange. Attackers leveraged forged communications and credential‑harvesting tactics to gain privileged access and execute unauthorized token transfers.

Why It Matters for TPRM

  • State‑backed actors are targeting crypto‑infrastructure, raising the geopolitical risk profile of blockchain vendors.
  • Social‑engineering attacks bypass technical controls, highlighting the need for robust human‑factor defenses across third‑party relationships.
  • Large‑scale fund loss can trigger regulatory scrutiny and reputational damage for downstream partners and investors.

Who Is Affected — Cryptocurrency exchanges, blockchain platform providers, custodial wallet services, and any fintech firms that integrate with Solana‑based DeFi protocols.

Recommended Actions

  • Conduct a deep‑dive review of all third‑party crypto service contracts for social‑engineering resilience.
  • Verify that privileged‑access workflows enforce multi‑factor authentication and least‑privilege principles.
  • Implement continuous security awareness training focused on spear‑phishing and credential‑theft scenarios for all vendor staff.

Technical Notes — The breach stemmed from a sophisticated phishing campaign that harvested admin credentials, enabling attackers to invoke Drift’s smart‑contract functions and move assets off‑chain. No public CVE was involved; the vector was purely human‑factor exploitation. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/04/285-million-drift-hack-traced-to-six.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.