How Do State-Sponsored Hackers Breach DeFi? An In-Depth Investigation into the Drift Exploit

Markets
Updated: 2026-04-07 12:53

The focus of crypto security incidents is rapidly shifting from code-level vulnerabilities to the human layer of trust.

On April 1, 2026, Drift Protocol—a leading decentralized derivatives platform in the Solana ecosystem—suffered an attack that resulted in losses of approximately $285 million. The platform’s total value locked (TVL) plunged from about $550 million before the incident to roughly $230 million afterward. Drift’s preliminary investigation confirmed that the operation was orchestrated by UNC4736, a hacker group linked to the North Korean government, describing it as a "six-month-long structured intelligence operation."

This conclusion signals a transformation that goes far beyond a single security breach. When nation-state hackers shift their focus from exploiting code vulnerabilities to months-long infiltration of interpersonal trust, the entire DeFi industry’s security paradigm is being systematically rewritten. Attacks no longer require complex smart contract exploits or private key theft—they just need a patient relationship, a carefully crafted identity, and enough time.

How Did the Attack Work?

UNC4736’s operation demonstrated a level of organization and resource commitment far beyond typical hacker groups. Starting in the fall of 2025, individuals posing as representatives of a quantitative trading firm proactively approached Drift contributors at multiple international crypto conferences. These individuals were technically proficient, had verifiable professional backgrounds, and were well-versed in Drift’s operations. Notably, those making contact in person were not North Korean nationals, but rather third-party intermediaries deployed by North Korean threat actors.

After establishing trust, the group joined the Drift ecosystem treasury between December 2025 and January 2026, depositing over $1 million of their own funds to build credibility. During this period, they engaged in detailed, professional discussions about product issues with several contributors.

The technical breach occurred via two vectors. One contributor was compromised after cloning a malicious code repository that exploited known vulnerabilities in VSCode and Cursor editors—vulnerabilities the security community had repeatedly warned about. Simply opening a file, folder, or repository in the editor could silently execute arbitrary code without any user prompt or click. Another contributor was lured into downloading a fake wallet app via Apple’s TestFlight platform. Once internal access was gained, the attackers used Solana’s native Durable Nonce feature to pre-sign transactions, then instantly drained funds after multisig approval.

What Are the Costs of This Attack Paradigm?

The Drift incident exposed costs on multiple fronts, far beyond the $285 million in direct losses.

The most immediate impact was the financial loss and market shock. This was the largest DeFi security incident of 2026 to date and the second-largest in Solana’s history. Following the attack, the DRIFT token price plummeted by over 90% from its all-time high.

More concerning is the contagion effect. The number of protocols affected by the Drift exploit has grown from 11 initially to over 20, including new victims such as PiggyBank, Perena, Vectis, and Prime Numbers Fi. Some protocols have suspended minting, redemption, or deposit/withdrawal functions. Decentralized lending protocol Project 0 halted operations and began a deleveraging process, resulting in an average 2.61% write-down for lenders.

The deepest and hardest-to-quantify cost is the erosion of trust at the foundation of DeFi security. Drift emphasized that all multisig members used cold wallets, yet the attack still succeeded. This demonstrates that when attackers target the human layer, even strict hardware controls can be bypassed. If attackers operate as a legitimate organization for months—investing funds and participating in the ecosystem—existing security systems are nearly powerless to detect them.

What Does This Mean for the DeFi Landscape?

The Drift incident is forcing the industry to re-examine a fundamental question: Do the core security assumptions of decentralized finance still hold?

One key area of industry reflection centers on the structural vulnerabilities of third-party trust systems. UNC4736’s attack path revealed that today’s DeFi ecosystem lacks systematic security vetting and ongoing monitoring for new partners. Activities considered standard business practice—conference networking, instant messaging, joining ecosystem treasuries—are precisely the cover nation-state hackers need for infiltration.

Another critical debate concerns compliance gaps in fund recovery. On-chain investigators noted that attackers bridged about $232 million in USDC from Solana to Ethereum using cross-chain protocols. Stablecoin issuers had a six-hour window to freeze these funds but took no action. This raises a deeper systemic issue: When DeFi protocol defenses fail, is it sustainable to rely on centralized stablecoin issuers for compliance-based intervention? Where do the boundaries of action lie for compliant entities when facing large-scale fund flows?

What’s Next?

Based on the current investigation and industry response, several trends are emerging.

Security budgets will be systematically reassessed. In 2025, global crypto security losses exceeded $3.4 billion, with 89 confirmed security incidents in the Web3 space totaling $2.54 billion in losses. As nation-state attacks become routine, relying solely on code audits and security testing is no longer sufficient. Expect more protocols to invest in operational security training, social engineering defense drills, and enhanced background checks.

Cross-protocol risk contagion will become a new focus. The Drift incident’s domino effect across more than 20 protocols shows that DeFi’s composability is a double-edged sword for security. Future responses may include: (1) protocol-level dependency isolation and security tiering, and (2) industry-wide event response and information-sharing mechanisms.

Regulatory and compliance boundaries will face further negotiation. The standards for stablecoin issuers’ actions in such incidents will become a focal point for regulatory debate, potentially leading to emergency frameworks for cross-border crypto asset flows.

What Risks Remain on the Radar?

Although Drift has frozen all protocol functions and removed compromised wallets from multisig, several risk dimensions warrant continued attention.

Irreversibility of fund recovery. Attackers quickly deleted instant messaging records and malware after the theft, and the stolen funds have already been bridged to Ethereum. North Korean hacker groups have mature money laundering and cross-chain mixing networks, making the majority of stolen funds likely unrecoverable.

Asymmetric security capabilities. Nation-state hacker organizations possess organizational resources, ongoing funding, and specialized roles, while most DeFi protocols operate with small teams and limited security resources. Attackers are systematically exploiting this asymmetry. The identities used by these attackers feature complete professional resumes, public credentials, and professional social networks, allowing them to pass standard business due diligence.

Trust fatigue hindering industry innovation. If every new partner requires stringent security vetting and ongoing monitoring, DeFi’s core strengths—openness and composability—are at risk of being eroded. Striking a balance between security defenses and operational efficiency will be a critical challenge for the industry.

Conclusion

The Drift hack exposed a long-overlooked reality: Security threats in DeFi have undergone a generational leap. From smart contract bugs to private key theft, and now to six-month-long nation-state social engineering infiltrations, attackers are evolving much faster than defense systems. When attackers no longer need to break code, but only need to break someone’s trust, the effectiveness of multisig, cold wallets, and hardware isolation must be re-evaluated.

The industry needs more than improved code audits and stricter access controls—it needs a new security mindset: treating "human trust" as an attack surface equal to "smart contract code." Every link in the chain—from background checks and operational security culture, to continuous monitoring of ecosystem partners and cross-protocol emergency response—must be redefined. In the new normal of nation-state actors entering crypto security, no protocol can stand alone—the security chain is only as strong as its weakest link.

FAQ

Q: Is UNC4736 the same as Lazarus?

UNC4736 is a code name used by security firms to track North Korea-linked threat actors. While there is overlap with the more widely known Lazarus Group, they are not exactly the same. UNC4736 is believed to focus on sustained baseline income operations in the crypto space, targeting small to mid-sized entities with persistent infiltration.

Q: Why didn’t multisig protect Drift from the attack?

Attackers didn’t directly steal multisig private keys. Instead, they gained multisig approval rights through social engineering, then used Solana’s Durable Nonce feature to pre-sign transactions and execute them instantly once they had sufficient permissions. This shows that the security of multisig relies on signers not being compromised through social engineering.

Q: Did this attack involve a smart contract vulnerability?

No. Drift has confirmed that the core of this attack was social engineering and abuse of the Durable Nonce feature—not a traditional smart contract code exploit.

Q: What actions did Drift take after the incident?

Drift froze all protocol functions, removed compromised wallets from multisig, and invited security firms to conduct a thorough forensic investigation. The protocol team stated they are cooperating with law enforcement agencies to trace the stolen funds.

The content herein does not constitute any offer, solicitation, or recommendation. You should always seek independent professional advice before making any investment decisions. Please note that Gate may restrict or prohibit the use of all or a portion of the Services from Restricted Locations. For more information, please read the User Agreement
Like the Content