By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
Computing

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

News Room
Last updated: 2026/04/03 at 5:54 AM
News Room Published 3 April 2026
Share
Drift Loses 5 Million in Durable Nonce Social Engineering Attack Linked to DPRK
SHARE

Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026.

“Earlier today, a malicious actor gained unauthorized access to Drift Protocol through a novel attack involving durable nonces, resulting in a rapid takeover of Drift’s Security Council administrative powers,” the company said in a series of posts on X.

“This was a highly sophisticated operation that appears to have involved multi-week preparation and staged execution, including the use of durable nonce accounts to pre-sign transactions that delayed execution.”

Drift noted that the attack did not exploit a vulnerability in its programs or smart contracts, and that there is no evidence of compromised seed phrases. Rather, the breach is said to have “involved unauthorized or misrepresented transaction approvals obtained prior to execution, likely facilitated through durable nonce mechanisms and sophisticated social engineering,” it explained.

To that end, the threat actors obtained sufficient multi-signature (multisig) approvals and executed a malicious admin transfer within minutes to gain control of protocol-level permissions, ultimately leveraging it to “introduce a malicious asset and remove all pre-set withdrawal limits, attacking existing funds.”

According to a timeline of events shared by Drift, preparations for the hack were underway as early as March 23, 2026. The company said it’s coordinating with multiple security firms to determine the cause of the incident, adding it’s working with bridges, exchanges, and law enforcement to trace and freeze the stolen assets.

In separate reports published Thursday, both Elliptic and TRM Labs said there are on-chain indications that North Korean crypto thieves may be behind the cryptocurrency heist.

This included the use of Tornado Cash for initial staging, as well as the cross-chain bridging patterns and the speed and scale of post-hack laundering that are consistent with hacks previously attributed to North Korean threat actors, including the massive Bybit exploit of 2025.

“The critical vulnerability was not a smart contract bug but a combination of social engineering multisig signers into pre-signing hidden authorizations and a zero-timelock Security Council migration that eliminated the protocol’s last line of defense,” TRM Labs said.

“The attacker manufactured an entirely fictitious asset — CarbonVote Token — with a few thousand dollars in seeded liquidity and wash trading, and Drift’s oracles treated it as legitimate collateral worth hundreds of millions of dollars.”

The blockchain intelligence firm also pointed out that the CarbonVote Token was deployed at 09:30 Pyongyang time.

Elliptic, in its own analysis of the security incident, said the on-chain behavior, laundering methodologies, and network-level indicators align with known tradecraft associated with threat actors from the Democratic People’s Republic of Korea (DPRK).

The company also noted that, if confirmed, this incident “would represent the eighteenth DPRK act” it has tracked since the start of the year, with more than $300 million stolen to date.

“It is a continuation of the DPRK’s sustained campaign of large-scale cryptoasset theft, which the US government has linked to the funding of its weapons programs,” Elliptic said. “DPRK-linked actors are believed to have stolen over $6.5 billion dollars in cryptoassets in recent years.”

The North Korean cryptoasset theft operation is estimated to have netted a record $2 billion in 2025, out of which approximately $1.46 billion originated from the hack of Bybit in February 2025.

The primary initial access pathway through which these attacks are executed remains social engineering, leveraging persuasive personas and decoys to target the cryptocurrency and Web3 sectors through campaigns tracked as DangerousPassword (aka CageyChameleon, CryptoMimic, and CryptoCore) and Contagious Interview. As of late February 2026, the combined gains from the twin campaigns total $37.5 million this year.

“The DPRK’s cryptoasset theft operation is not a series of isolated incidents. It is a sustained, well-resourced campaign that is growing in scale and sophistication,” Elliptic said.

“The evolution of the DPRK’s social engineering techniques, combined with the increasing availability of AI to refine and perfect these methods, means the threat extends well beyond exchanges. Individual developers, project contributors and anyone with access to cryptoasset infrastructure is a potential target.”

The development coincides with the supply chain compromise of the popular Axios npm package, which multiple security vendors, including Google, Microsoft, CrowdStrike, and Sophos, have attributed to a North Korean hacking group called UNC1069, which overlaps with BlueNoroff, CryptoCore, Nickel Gladstone, Sapphire Sleet, and Stardust Chollima.

“This state-sponsored group focuses on generating revenue for the North Korean regime,” Sophos said. “The artifacts include identical forensic metadata and command-and-control (C2) patterns, as well as connections to malware exclusively used by Nickel Gladstone. Based on these artifacts, it is highly likely that Nickel Gladstone is responsible for the Axios attacks.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article ‘I am trapped in a sweet-smelling cycle of video game-branded toiletries’: Lush’s Mario Galaxy range, reviewed ‘I am trapped in a sweet-smelling cycle of video game-branded toiletries’: Lush’s Mario Galaxy range, reviewed
Next Article I Gave Up on Windows 11. Linux Mint Is Simply Better in 7 Big Ways I Gave Up on Windows 11. Linux Mint Is Simply Better in 7 Big Ways
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

China’s state broadcaster takes small stake in iQIYI as revenue falls · TechNode
China’s state broadcaster takes small stake in iQIYI as revenue falls · TechNode
Computing
Can AI Find Your Next Obsession? I Tested Its Hobby Suggestions
Can AI Find Your Next Obsession? I Tested Its Hobby Suggestions
News
20+ Best Creator Tools For Content Creators in 2026 |
20+ Best Creator Tools For Content Creators in 2026 |
Computing
Musk Forces Banks to Use Grok, Ahead of SpaceX IPO
Musk Forces Banks to Use Grok, Ahead of SpaceX IPO
News

You Might also Like

China’s state broadcaster takes small stake in iQIYI as revenue falls · TechNode
Computing

China’s state broadcaster takes small stake in iQIYI as revenue falls · TechNode

1 Min Read
20+ Best Creator Tools For Content Creators in 2026 |
Computing

20+ Best Creator Tools For Content Creators in 2026 |

4 Min Read
hid-omg-detect: Linux Driver In Development To Detect Malicious HID Devices
Computing

hid-omg-detect: Linux Driver In Development To Detect Malicious HID Devices

1 Min Read
Tencent invests 1.16 billion euros in Ubisoft’s new subsidiary · TechNode
Computing

Tencent invests 1.16 billion euros in Ubisoft’s new subsidiary · TechNode

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?