Drift Protocol, a decentralized cryptocurrency alternate (DEX), says the latest exploit towards the platform was a six-month-long, extremely coordinated assault.
“The preliminary investigation exhibits that Drift skilled a structured intelligence operation requiring organizational backing, vital sources, and months of deliberate preparation,” Drift stated in an X submit on Saturday.
The decentralized alternate was exploited on Wednesday, with exterior estimates placing losses at round $280 million.
All of it started at a “main crypto convention”
In response to Drift, the assault plan could be traced again to round October 2025, when malicious actors posing as a quantitative buying and selling agency first approached Drift contributors at a “main crypto convention,” claiming to be all for integrating with the protocol.

The group continued to interact contributors in individual at a number of business occasions over the next six months. “It’s now understood that this seems to be a focused method, the place people from this group continued to intentionally search out and interact particular Drift contributors,” Drift stated.
“They have been technically fluent, had verifiable skilled backgrounds, and have been acquainted with how Drift operated,” Drift stated.
After gaining belief and entry to Drift Protocol over six months, they used shared malicious hyperlinks and instruments to compromise contributors’ gadgets, execute the exploit, after which wiped their presence instantly after the assault.
The incident serves as a reminder for crypto business members to stay cautious and skeptical, even throughout in-person interactions, as crypto conferences could be prime targets for stylish menace actors.
Drift flags a excessive likelihood of a Radiant Capital hack hyperlink
Drift stated, with “medium-high confidence,” that the exploit was carried out by the identical actors behind the October 2024 Radiant Capital hack.
In December 2024, Radiant Capital stated the exploit was carried out by malware despatched through Telegram from a North Korea-aligned hacker posing as an ex-contractor.

“This ZIP file, when shared for suggestions amongst different builders, in the end delivered malware that facilitated the following intrusion,” Radiant Capital stated.
Drift stated it’s “necessary to notice” that the people who appeared in individual “weren’t North Korean nationals.”
Associated: Naoris launches post-quantum blockchain as quantum safety dangers achieve consideration
“DPRK menace actors working at this stage are identified to deploy third-party intermediaries to conduct face-to-face relationship-building,” Drift stated.
Drift stated that it’s working with legislation enforcement and others within the crypto business to “construct a whole image of what occurred through the April 1st assault.”
Journal: Bitcoin 85% crashes ‘achieved,’ CLARITY Act hypothesis mounts: Hodler’s Digest, Mar. 29 – April 4