Key Points
- State-sponsored hackers from North Korea masqueraded as legitimate traders for approximately six months before executing a $270 million theft from Drift Protocol on April 1.
- The perpetrators attended in-person meetings with Drift team members at international cryptocurrency conferences and invested more than $1 million in genuine funds.
- Team member devices fell victim to a malicious TestFlight application and an exploited vulnerability in VSCode/Cursor development tools.
- Security researchers have connected the breach to UNC4736, alternatively identified as AppleJeus or Citrine Sleet, with ties to the North Korean government.
- Legal experts suggest potential civil negligence, with class action lawsuit advertisements already emerging.
On April 1, Drift Protocol suffered a devastating $270 million security breach following an elaborate infiltration campaign lasting approximately six months, orchestrated by hackers affiliated with the North Korean state.
Initial contact occurred at a prominent cryptocurrency conference during fall 2025. The threat actors presented themselves as representatives of a quantitative trading operation, demonstrating comprehensive technical knowledge, legitimate-appearing professional credentials, and deep familiarity with Drift’s ecosystem.
Communications continued through a Telegram channel established for ongoing discussions. Over the following months, conversations centered on typical institutional topics including vault integration procedures, trading methodologies, and operational protocols.
During the December 2025 to January 2026 timeframe, the group completed official onboarding for an Ecosystem Vault within Drift. They participated in numerous collaborative sessions with platform contributors and demonstrated legitimacy by depositing over $1 million in actual capital.
Drift contributors engaged in direct, face-to-face interactions with supposed representatives from the organization at multiple international conference venues throughout February and March 2026. By the time of the attack, the relationship had matured over nearly half a year.
Technical Details of the Security Breach
The compromise utilized two distinct infiltration methods. The first involved convincing a team member to install a TestFlight application — Apple’s pre-release testing platform that circumvents standard App Store security protocols — which the attackers promoted as their proprietary wallet solution.
The second vector exploited a documented security flaw within VSCode and Cursor, both popular code editing environments. The vulnerability allowed arbitrary code execution merely by opening a specially crafted file, with no user notification or consent required.
After successfully compromising team devices, the attackers collected the necessary credentials to secure two multisignature approvals. These pre-authorized transactions remained inactive for over a week before activation on April 1, facilitating the extraction of $270 million in less than sixty seconds.
Cybersecurity analysts have attributed the operation to UNC4736, which operates under the alternate designations AppleJeus and Citrine Sleet. Blockchain analysis revealed fund movement patterns connecting to the Radiant Capital compromise from October 2024, another incident with North Korean attribution. The individuals who attended conferences in person were not North Korean citizens — DPRK-affiliated operations frequently employ proxy actors with meticulously fabricated identities.
Potential Legal Consequences and Security Concerns
Cryptocurrency legal specialist Ariel Givner indicated the incident could meet the threshold for civil negligence claims. She emphasized that fundamental security practices — including maintaining signing keys on isolated, air-gapped systems and conducting thorough background verification on developers encountered at industry events — appear to have been inadequately implemented.
“Every reputable project understands these requirements. Drift failed to implement them,” Givner stated. Marketing materials for class action litigation against Drift have begun appearing publicly.
Drift representatives stated they possess “medium-high confidence” that identical threat actors executed the October 2024 Radiant Capital attack, where malicious software was distributed through Telegram by an individual impersonating a former contractor.


