Key Highlights
- A minimum of 12 cryptocurrency platforms have fallen victim to cybersecurity breaches following the $280 million Drift Protocol compromise on April 1, 2026.
- Rhea Finance suffered a $7.6 million loss when threat actors exploited its Margin Trading functionality through fraudulent token contracts.
- The Russia-associated Grinex platform experienced approximately $15 million in USDT drainage, subsequently converted to TRX and ETH to circumvent asset freezing.
- North Korean-affiliated threat groups are believed responsible for certain incidents, leveraging artificial intelligence and social engineering techniques for credential theft.
- DefiLlama reports indicate that more than $168.6 million was stolen across 34 DeFi platforms during the first quarter of 2026.
The cryptocurrency sector has witnessed a disturbing pattern of security breaches, with no fewer than 12 DeFi platforms and digital asset enterprises falling prey to sophisticated attacks over a mere two-week period following the massive $280 million [[LINK_START_0]]Drift Protocol[[LINK_END_0]] compromise that occurred on April 1, 2026.
The Drift Protocol incident stands among the year’s most significant cryptocurrency security breaches. Intelligence suggests the attack stemmed from an extended social engineering operation potentially orchestrated by North Korean-backed threat actors.
In the subsequent weeks, multiple platforms including CoW Swap, Hyperbridge, Bybit, Dango, Silo Finance, BSC TMM, Aethir, MONA, Zerion, Rhea Finance, and the Grinex trading platform have experienced security compromises.
Financial damages span a broad spectrum, ranging from several hundred thousand dollars to tens of millions per incident.
Major Losses at Rhea Finance and Grinex
Thursday witnessed a significant breach at DeFi platform Rhea Finance, resulting in a $7.6 million loss. Threat actors identified and exploited a security weakness within the platform’s Margin Trading infrastructure, executing a sophisticated pool manipulation assault on the Rhea Lend smart contract system.
Cybersecurity specialists at CertiK determined that perpetrators deployed fraudulent token contracts and injected liquidity into newly established pools, presumably deceiving both oracle systems and validation protocols.
Rhea Finance has publicly acknowledged the security incident and maintains ongoing communication with affected users regarding remediation efforts.
Coinciding with the Rhea Finance breach, Kyrgyzstan-based Grinex exchange suspended all withdrawal and trading operations following what platform officials characterized as a large-scale cyberattack.
Grinex’s preliminary assessment indicated losses exceeding 1 billion rubles, equivalent to approximately $13.1 million. However, blockchain intelligence provider Elliptic estimated the actual theft at roughly $15 million in USDT tokens.
The compromised USDT assets traversed both Tron and Ethereum blockchain networks before being exchanged for TRX and ETH. According to Elliptic analysts, this conversion strategy likely aimed to prevent Tether from freezing the stolen assets, as the stablecoin issuer maintains authority to blacklist USDT associated with criminal activities.
Grinex attributed the attack to “hostile states” possessing capabilities beyond those available to conventional cybercriminals. Industry observers widely regard the exchange as operating in succession to Garantex, a sanctioned platform that U.S. authorities dismantled last year after determining it had facilitated hundreds of millions in illicit fund transfers.
Cumulative Impact of Minor Breaches
Additional April incidents include Silo Finance’s $392,000 loss on April 3 resulting from oracle misconfiguration, Aethir’s $423,000 compromise via access control vulnerability on April 9, and bridge aggregator Dango’s $410,000 loss from smart contract exploitation on April 13.
The Binance Smart Chain TMM/USDT liquidity pool similarly experienced a breach in early April, sustaining approximately $1.67 million in losses through a reserve manipulation technique.
Security researchers have established connections between North Korean-affiliated groups and several recent attacks, noting their deployment of AI-powered tools and social engineering methodologies to infiltrate cryptocurrency organizations.
According to DefiLlama’s compiled data, malicious actors successfully extracted over $168.6 million from 34 separate DeFi protocols throughout the first quarter of 2026.
Subsequent investigation has revealed Grinex operates as a primary exchange point for ruble-to-cryptocurrency conversions and the ruble-pegged stablecoin A7A5, which Elliptic analysis suggests has facilitated transaction volumes exceeding $100 billion.


