Advertisement
AD

'Terrifying': Solana Founder Reacts to One of Biggest DeFi Hacks in History

Sun, 5/04/2026 - 6:47
Of course, the cryptocurrency industry is somewhat accustomed to smart contract vulnerabilities and phishing scams, but the Drift hack took things to a whole new level..
Advertisement
'Terrifying': Solana Founder Reacts to One of Biggest DeFi Hacks in History
Cover image via U.Today
Google

Solana co-founder Anatoly Yakovenko has described the recent Drift Protocol hack as "terrifying" after it was revealed that it was the result of a sophisticated social engineering attack that was pulled off by North Korean hackers. 

Advertisement

As reported by U.Today, Drift Protocol was recently drained of $270 million, which is the largest Solana hack to date within the ecosystem. The protocol was forced to halt all deposits and withdrawals, explicitly warning users that the incident was not an April Fools' joke.

Six months in the making 

The report, which was recently shared by Drift Protocol, has revealed that the bad actors behind the historic hack physically stalked and socially engineered the developers in real life. This required alarming patience and resources. 

HOT Stories
'Terrifying': Solana Founder Reacts to One of Biggest DeFi Hacks in History Shiba Inu (SHIB) Never Left Downtrend, Midnight (NIGHT)'s Fundamental Support Is In, What Are Three XRP Factors Needed for Bullish Reversal? Crypto Market Review

The operation is heavily suspected to be the work of a North Korean state-affiliated threat group. 

Advertisement

Starting in late 2025, third-party intermediaries (who were not North Korean nationals) physically approached Drift contributors at major crypto conferences. The attackers, who boasted verifiable professional backgrounds and technical fluency, posed as a quantitative trading firm looking to integrate with the protocol. 

You Might Also Like

The fake trading firm onboarded an Ecosystem Vault on Drift between December 2025 and January 2026 and deposited more than $1 million of their own capital. 

Advertisement

The attackers had managed to maintain the illusion for half a year. They were working closely with Drift contributors through multiple working sessions and meeting them face-to-face at various international conferences through February and March 2026.

By April, the attackers had successfully established a trusted business relationship. The Drift contributors did not suspect foul play when the group shared links to projects they claimed to be building.

One contributor cloned a code repository shared by the attackers. This repository likely contained a known vulnerability affecting the VSCode and Cursor text editors. A second contributor was convinced to download a fake TestFlight application.

The attackers scrubbed all of their Telegram chats and wiped the malicious software after the successful exploit.

Advertisement
Advertisement
Advertisement
Advertisement
Subscribe to daily newsletter

Recommended articles

Our social media
There's a lot to see there, too