Drift Protocol: The April 1 attack was a months-long organized infiltration operation, possibly linked to North Korean hackers.

robot
Abstract generation in progress

Wu Blockchain learned that Drift Protocol has released the latest investigative progress regarding the April 1 attack incident, saying the attack was likely a long-term infiltration operation lasting about 6 months with an organized background. Preliminary findings show that the attackers, starting from the autumn of 2025, posed as quantitative trading institutions and continuously engaged with members of the Drift team at multiple international crypto conferences. They carried out device infiltration through methods such as linking code repositories and using TestFlight applications. Drift said it has frozen remaining protocol functions, removed the compromised multisig wallets, and has begun evidence collection in coordination with firms such as Mandiant and SEAL 911. The project team assesses with medium to high confidence that this operation may be linked to the North Korea–related hacking group behind the 2024 Radiant Capital theft incident.

DRIFT27,21%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin