Drift $280M crypto theft linked to 6-month in-person operation
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。好的,我先看看这篇文章讲的是什么。 文章主要讲的是Drift Protocol遭受了一次2.8亿美元的黑客攻击。黑客们进行了长期的策划,甚至伪装成量化交易公司,在多个加密货币会议上接近Drift的贡献者。攻击中他们利用了恶意代码仓库和TestFlight应用,最终盗取了资金。调查指出这次攻击可能与朝鲜的黑客组织有关。 我需要把这些信息浓缩到100字以内。首先,事件的基本情况:Drift Protocol被黑,损失2.8亿美元。然后是黑客手段:长期策划、伪装成公司、利用恶意代码和应用。最后是调查结果:可能与朝鲜黑客有关。 所以,我应该把这些关键点连贯地表达出来,确保不超过字数限制。 </think> Drift Protocol遭遇2.8亿美元黑客攻击,系长期策划的复杂行动。黑客伪装成量化交易公司,在多个加密会议中接近平台贡献者,并利用恶意代码和应用获取权限。调查显示此次攻击或由朝鲜相关威胁组织 UNC4736 实施。 2026-4-6 16:45:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

Drift $280M crypto theft linked to 6-month in-person operation

The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "a functioning operational presence inside the Drift ecosystem."

On April 1st, the Solana-based trading platform detected unusual activity that was followed by confirmation that funds had been lost in a sophisticated attack that allowed hijacking of the Security Council administrative powers.

Blockchain intelligence firms Elliptic and TRM Labs attributed the heist to North Korean hackers, who took about 12 minutes to drain user assets.

Wiz

The investigation revealed that the hackers had been preparing the attack for at least six months, posing as a quantitative firm and approaching Drift contributors in person at multiple crypto conferences.

“It is now understood that this appears to be a targeted approach, where individuals from this group continued to deliberately seek out and engage specific Drift contributors, in person, at multiple major industry conferences in multiple countries over the following six months,” Drift Protocol says.

The threat actor continued to communicate with their targets via Telegram, discussing trading strategies and potential vault integrations. They were technically proficient and demonstrated familiarity with how Drift worked, with interactions resembling typical onboarding exchanges between trading firms and the platform.

According to Drift, the Telegram goup used for engaging contributors was deleted immediately after the theft occurred.

The platform has not determined with certainty the attack vector, but believes that two contributors were compromised in the following ways:

  • A malicious code repository shared with a contributor, possibly exploiting a VSCode/Cursor vulnerability that allowed silent code execution
  • A malicious TestFlight application presented as a wallet product

Multiple indicators found in Elliptic and TRM Labs investigations point to a North Korean threat actor. Drift's findings also indicate with medium-high confidence that the attack was perpetrated by UNC4736 (a.k.a. AppleJeus and Labyrinth Chollima), a threat actor linked to North Korea by multiple security companies.

Incident response company Mandiant has previously associated UNC4736 with Lazarus. The same threat group is responsible for the 3CX supply-chain attack in 2023, the $50 million Radiant cryptocurrency theft in 2024, and it has also been linked to Chrome zero-day exploitation.

However, it is noted that the in-person actors who met with key Drift contributors at conferences were non-Korean intermediaries.

Currently, all Drift Protocol functions remain frozen, and the compromised wallets have been removed from the multisig process.

Drift says that the attackers’ wallets have been flagged across exchanges and bridge operators to prevent the threat actor from moving or withdrawing the funds.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/
如有侵权请联系:admin#unsafe.sh