Six months of preparation for twelve minutes of execution. On April 1, 2026, the North Korean group UNC4736 drained $285 million from Drift Protocol on Solana. It wasn't a code bug: it was an intelligence operation that combined social engineering against individual contributors, oracle manipulation, abuse of Solana's durable nonces, and a governance migration where the timelock was removed to speed things up. And it worked.
This article reconstructs the operation in its three layers — human, technical, and governance —, places it alongside recent major hacks (Bybit, Wormhole, Ronin), and extracts concrete lessons for anyone with funds in a DeFi protocol. It is not just another technical post-mortem: it is a case study of how a sanctioned state actor can turn a small human chain of trust into 285 million evaporated in the time it takes to have a coffee.
Editorial Context: This article is informative and does not constitute investment advice or a recommendation on the use of Drift or other protocols. Its objective is to document the incident and the operational practices that made it possible. The names of groups, tools, and protocols are used exclusively for public safety analysis purposes.
What happened to Drift Protocol on April 1 and 2, 2026?
Drift is one of the largest perpetual derivatives protocols on the Solana network. On April 1, 2026, at 16:05 UTC, an unknown actor triggered a chain of pre-signed transactions that transferred the protocol's administrative authority to an address under their control. Ten seconds later, they had drained the main vaults. In total, about $285 million in real assets fell — USDC, JLP, cbBTC, USDT, and several others —, more than 50% of the protocol's total value locked (TVL) at that time.
| Asset Drained | Value (USD) | % of Total |
|---|---|---|
| JLP (Jupiter LP Token) | 159,300,000 | 55.9% |
| USDC (Circle) | 71,400,000 | 25.1% |
| cbBTC (Coinbase Wrapped BTC) | 11,300,000 | 4.0% |
| USDT (Tether) | 5,600,000 | 2.0% |
| USDS (Sky / MakerDAO) | 5,300,000 | 1.9% |
| Others (WETH, dSOL, WBTC, etc.) | 32,100,000 | 11.1% |
| Total | 285,000,000 | 100% |
The theft makes Drift the largest DeFi exploit of 2026 to date and the second most significant incident in Solana's history, second only to the Wormhole bridge in 2022. But what's relevant isn't the headline: it's that the attackers didn't exploit a bug in Drift's code. What they exploited were the people and processes surrounding that code.
Who is UNC4736 and why did they attack Drift?
The group attributed to the attack is tracked under several labels in the industry: UNC4736, AppleJeus, Citrine Sleet, or Golden Chollima. It is a specialized unit of North Korean intelligence that has been operating in the crypto sector since at least 2018, and whose primary mission is not personal enrichment but the generation of foreign currency to fund the Pyongyang regime's military programs — including nuclear submarines and reconnaissance satellites.
Firms such as CrowdStrike, Chainalysis, and TRM Labs have attributed the attack to UNC4736 with medium-high confidence based on the modus operandi, the financial architecture of the laundering, and infrastructure reuse patterns. In 2025, DPRK-linked actors were responsible for 76% of all crypto service compromises worldwide. It is not a group of amateurs: it is an industrial force.
| Feature | UNC4736 / Golden Chollima |
|---|---|
| Affiliation | Nation-state (DPRK) |
| Relevant Precedents | 3CX (2023), Radiant Capital $53M (2024), Bybit $1,500M (February 2025) |
| Distinctive Tactic | Long-term social engineering + niche malware |
| Financial Objective | Funding of submarines, satellites, and strategic weaponry |
| Operation Time Horizon | Six months or more before execution |
As we already analyzed when studying DeFi bridge hacks, the sophistication of Lazarus Group and its subunits has evolved from mass phishing to building near-perfect identities and multi-layer infiltration. Drift demonstrates that this threat is no longer limited to bridges: it reaches the native protocols of an L1.
How did the attackers build their entry point in six months?
The operation officially began in the fall of 2025. The attackers presented themselves as a legitimate quantitative trading firm, with LinkedIn profiles that withstood basic scrutiny, verifiable work backgrounds, and physical attendance at international conferences to establish links with key Drift contributors. The key was to replace phishing friction with the warmth of prolonged human contact.
To formalize the relationship, they proposed integrating an "Ecosystem Vault" into Drift. Between December 2025 and January 2026, the agents constantly interacted with the team, demonstrating detailed technical knowledge of the platform. And they took the decisive step: they deposited more than a million dollars of their own into the protocol. It wasn't a loss. It was the operational price of entering the internal trust channels.
In parallel, they executed lateral technical compromises against the workstations of key contributors. Two vectors have been clearly identified:
- Weaponized VS Code projects: a contributor cloned a shared repository "to collaborate on the vault frontend." The project used a malicious configuration of the
tasks.jsonfile to execute commands automatically when opening the folder in the editor. - Apps distributed via TestFlight: a second contributor was induced to download a supposed beta wallet through Apple's testing program. The app contained a backdoor that extracted session cookies and credentials.
The pattern is the same as we have seen in other exploits targeting DeFi developers in 2026: the development environment is the vector, not the production protocol. If you share a folder with someone, that folder is already a potential attack.
How was the oracle manipulated to manufacture fake value?
Starting in March 2026, the operation moved to the blockchain. On March 12, the attackers deployed a token called CarbonVote (CVT) on Solana, funded with funds previously extracted by Tornado Cash. The token was purely fictitious: they controlled approximately 80% of the total supply of 750 million units.
To give it the appearance of an asset with real value, they executed a liquidity manipulation campaign on Raydium. With only a few thousand dollars of authentic liquidity, wash trading bots generated a stable price history around $1 USD. The final piece was to insert that manipulated price into Drift's risk logic through a SwitchboardOnDemand oracle that they controlled themselves.
| Fictitious Token CVT Parameter | Value |
|---|---|
| Creation Date | March 12, 2026 |
| Total Supply | 750,000,000 CVT |
| Supply Controlled by Attacker | ~80% (600,000,000 CVT) |
| Manipulated Price | ~1.00 USD |
| Initial Real Liquidity | $500 to $3,000 |
| Price Oracle | SwitchboardOnDemand (under attacker control) |
Drift's automated risk systems ingested that signal as legitimate data. In the protocol's eyes, CVT was a billion-dollar asset in circulation with stable volume. In the eyes of anyone looking at the Raydium pool, it was a token with three thousand dollars of liquidity.
What are Solana's durable nonces and how did they become a weapon?
A standard transaction on Solana requires a recent blockhash, which expires in approximately 90 seconds. This prevents a transaction signed today from being executed an hour from now. Durable nonces are an exception: they use a special account with a persistent nonce value that allows signing transactions that do not expire. The feature exists for legitimate scenarios such as offline signing and institutional custody where delayed execution is part of the design.
Between March 23 and 30, the attackers leveraged the relationships built over months to induce members of Drift's Security Council to sign a series of transactions linked to durable nonces. They presented themselves as routine maintenance or technical steps of a planned governance migration. The signers saw plausible instructions; what they didn't see was that the transactions contained, hidden, the transfer of the protocol's administrative authority to the attacker's address.
Because durable nonces do not expire, the attackers were able to accumulate signatures asynchronously and leave them "in reserve" without anything unusual appearing on the chain. The Trojan Horse was inside, waiting for the trigger.
Why was the March 27 governance migration the fatal mistake?
On March 27, Drift executed a scheduled migration of its Security Council to a new 2-of-5 multisig configuration. To make the process more agile, the team temporarily removed the timelock — the mandatory waiting period between the proposal of an administrative action and its execution.
A 24-48 hour timelock would have been enough so that, when the malicious transaction was detonated, another member of the council or even the community could have detected the anomaly and executed a revocation. Without a timelock, execution is instantaneous and definitive. By March 30, the attackers had already secured valid signatures from both the old and new multisigs. They had latent total control before the end of the month.
This pattern — a small Security Council combined with a window without a timelock — is the same vector that turned the Ronin breach (2022) into a $625M loss. As we reviewed in the historical list of major hacks, governance layer failures are today the leading cause of systemic losses, ahead of code bugs.
How was the drain executed in twelve minutes?
On April 1 at 16:05 UTC, the attackers detonated the pre-signed transactions. Since they had valid signatures and there was no timelock, Solana processed the change of administration instantly. From there, the sequence was automated:
- CVT Whitelisting: the fictitious token was added as accepted collateral throughout the protocol.
- Removal of Limits: withdrawal limits were removed and risk parameters were adjusted to allow maximum leverage.
- Deposit + Loan: the attackers deposited 500 million CVT artificially valued at $500M, and withdrew $285M in real assets against that fictitious collateral.
According to analysis by PIF Research Labs, the main withdrawals were executed in a ten-second interval between the first and last outgoing transaction. By the time Drift's internal monitors detected the anomaly and attempted to pause the protocol, the funds had already begun to cross the bridges to Ethereum.
Why didn't Circle block the stolen USDC?
Of the $285M drained, $71.4M was USDC issued by Circle. Circle is a centralized issuer: it can technically freeze any wallet from its compliance panel. Just nine days before the Drift hack, it had frozen 16 commercial wallets in a civil litigation, proving that the infrastructure worked.
In the case of Drift, the attackers used CCTP (Circle's official cross-chain protocol) to move millions in USDC from Solana to Ethereum for almost six hours, including during business hours in the United States. Researcher ZachXBT publicly accused the company of being "asleep." The law firm Gibbs Mura has initiated a preliminary investigation for a possible class-action lawsuit for negligence.
The rest of the laundering followed the classic DPRK pattern: small tranches, typically below $500,000 USD, to minimize alerts on exchanges and OTC channels in Asia. This micro-tranching technique complicates automated tracking and allows funds to slowly filter into informal networks in Southeast Asia. We covered the details of laundering routes and the role of private stablecoins as an exit path in our analysis of AI-assisted exploits, and the pattern repeats.
How does the Drift hack compare with Bybit, Wormhole, and Ronin?
To understand where Drift fits into the history of major crypto thefts, it is useful to place it alongside the three benchmark incidents of the last decade. The comparison reveals something unsettling: the absolute value decreases, but operational sophistication increases.
| Incident | Date | Losses (USD) | Network | Main Vector | Attribution |
|---|---|---|---|---|---|
| Wormhole | Feb 2022 | 326M | Solana ↔ Ethereum | Signature verification bug in the bridge | Not publicly attributed |
| Ronin (Axie) | Mar 2022 | 625M | Ronin Bridge | 5 of 9 validators compromised via social engineering | Lazarus / DPRK |
| Bybit | Feb 2025 | 1,500M | Ethereum (CEX custody) | Hot wallet compromise + malicious UI | Lazarus / DPRK (~$1,100M still unrecovered) |
| Drift Protocol | Apr 2026 | 285M | Solana | Social engineering + durable nonces + migration without timelock | UNC4736 / DPRK |
Three observations from this table. First: pure code failures (Wormhole) are increasingly rare — the community has matured in audits, fuzzing, and bug bounties. Second: the dominant vectors are human — social engineering, workstation compromise, signer manipulation. Third: the DPRK appears in all recent major hacks with a discipline that no private actor matches. Bybit lost $1,500M in February 2025; barely $400M has been tracked and only a fraction recovered. The probability of recovering Drift's $285M is, conservatively, low.
What does this mean for your security as a DeFi user?
The operational message for anyone with funds in a DeFi protocol boils down to three practices. None are technical; all are about diligence.
Audit the protocol's Security Council before depositing
If the protocol where you have funds depends on a small multisig (3-of-5 or less) with short or deactivatable timelocks, you are accepting a governance risk equivalent to counterparty risk in a bank — but without deposit insurance. The more signers, the more geographically distributed, and the longer the minimum timelocks, the better. A timelock that can be deactivated "to speed up a migration" is a clause that, when activated, eats 50% of the TVL.
If you contribute to a protocol, assume that trust channels are hostile
The mistakes in Drift were not made by careless users: they were made by professional contributors operating with apparently legitimate collaborators. Minimal countermeasures are: do not open VS Code folders without reviewing tasks.json and other settings, do not accept TestFlight builds from third parties, separate development environments from environments where you store keys, and treat any initial deposit from a "potential partner" as an operational investment rather than proof of good faith.
Diversify among protocols with a track record and multiple audits
No small Security Council is inviolable. Diversification among protocols with different teams, different audits, and different governance architectures is a hedge against the type of attack that ended Drift. And, more importantly, a periodic review: a protocol may be secure today and have a migration window without a timelock scheduled for next week.
How to reduce this risk with CleanSky
When an exploit like Drift's hits the headlines, the first operational question is "do I have funds exposed to that protocol, directly or indirectly through another that depends on it?". CleanSky answers that question in seconds. You paste your wallet address — it's read-only, doesn't ask for an account, doesn't ask for permissions, doesn't have access to your money — and it scans more than 50 networks and 484 protocols, showing every deposit, every LP token, every margin position, and every active staking in a single unified dashboard.
The idea is that your DeFi portfolio behaves like your banking app for DeFi: just as a banking app shows you accounts, cards, and investments at a glance, CleanSky shows you which protocols each euro of your capital is in. If Drift, Morpho, Aave, or any other appears as a host of part of your funds, you'll see it without having to go protocol by protocol — with the security events affecting each one next to it.
Conclusion: decentralization is not a shield against patience
The Drift Protocol hack will not be remembered for the money stolen but for the relationship between six months of preparation and twelve minutes of execution. That ratio defines the new era: nation-state sponsored attackers do not look for bugs in Rust or Solidity; they look for tired signers, rushed migrations, and communication channels where no one distrusts anymore because everyone has known each other for months.
The resilience of DeFi protocols in 2026 no longer depends as much on code correctness as on the robustness of human processes — who signs, how many sign, how long the chain waits before executing a sensitive action, and whether the developers maintaining the protocol are operating in isolated environments or in unknowingly infiltrated teams. Drift demonstrates that decentralization, by itself, is not a shield against the adversary's patience. Operational discipline is.