In the investigation into the cyber attack that left Drift without $285 million on 1 April 2026, which initially seemed a quick blow has been revealed as the outcome of a social engineering operation planned for months and led by actors linked to the Democratic People's Republic of Korea (DPRK). Drift describes the incident as "a six-month preparation attack", and notes with average confidence a set of actors known in cybersecurity circles such as UNC4736 - also cited under the names AppleJeus, Citrine Sleet, Golden Chollima and Gleaming Pisces -, a group with a long history of cryptomoneda theft since at least 2018. Drift's own appreciation, which is working with law enforcement and forensic experts to rebuild the chain of events, can be found in his communications and technical entries published by the firm: https: / / drift.trade / blog /.
What makes this attack particularly worrying was not a simple technical vulnerability, but the meticulousness with which the attackers built confidence within the community. According to Drift's public explanations, since the fall of 2025 individuals who presented themselves as a quantitative trading firm began to establish face-to-face relationships with key Drift contributors during international conferences of the critical ecosystem. These were successive meetings, with carefully mounted professional profiles, which led to continued technical conversations and the creation of a Telegram group where strategies, integration and tools were discussed for months. This praxis - aiming, gaining confidence and professionally validating a false identity - fits sophisticated social engineering tactics described in other recent incidents.

The operation included deliberate steps to appear legitimacy: deposits over $1 million, the discharge of an Ecosystem Vault in Drift with strategic documentation, the exchange of links to projects and, according to Drift, a pattern of highly informed technical questions that simulated the typical behavior of a commercial partner. All this created a functional operational presence that, until the final phase, seemed authentic. Shortly after the assault, the messaging channels and certain software that the attackers had used were eliminated, complicating traceability.
The key technical piece behind the intrusion could be double: on the one hand, a collaborator could have executed code after clone a repository shared by the alleged firm; on the other, another contributor was persuaded to install through Apple TestFlight a version of a wallet that had to be tested in beta. The repository vector would have abused a legitimate Microsoft Visual Studio Code mechanism: the automatic execution of tasks defined in the tasks.json file using the option "RunOn: folderOpen," which allows an action to be fired when the workspace is opened in the editor. It is a method of exploitation that was detected in campaigns attributed to North Korean actors since December 2025 and that caused changes in VS Code; Microsoft documents the security updates and controls in its version notes: https: / / code.visualstudio.com / updates.
The links between this operation and other North Korean seal campaigns are not just circumstantial. Drift points to on@-@ chain tests that connect flows of funds used to test and mount this operation with actors responsible for the assault on Radiant Capital, who suffered a $53 million robbery in October 2024. In addition, the techniques and identities manufactured show overlap with activities previously attributed to the DPRK. This type of technical and operational intelligence analysis has also been the subject of publications in the industry - for example, CrowdStrike's reports on variants such as Golden Chollima, which describe a branch of the North Korean program specifically aimed at the theft of crypto-currency by attacks on small and medium-sized fintechs in the West and Asia -: https: / / www.crowdstrike.com / blog /.
The economic motivation is clear and, according to experts, persistent. Recent reports argue that, even with some diplomatic and economic advances with allies like Russia, the DPRK needs to generate out-of-sanctions revenues to support ambitious military programmes, from new ships to space projects. In this context, the systematic exploitation of the critical sector has become a regular source of funding. Organizations like Chainalysis have repeatedly documented how cryptomonedas facilitate the recycling and evasion of sanctions, and how payments from cyber operations flow to networks that favour Pionyang: https: / / blog.chainalysis.com /.
But North Korean operational architecture is not limited to isolated hackers: DomainTools research points to a deliberately fragmented malware development strategy and operations. According to these analyses, the ecosystem has been organized on separate work tracks - espionage, generation of illicit funds and impact operations such as ransomware or wipers - with shared tools, infrastructure and operating patterns to minimize exposure risk and to embed attribution. DomainTools' own analysis summarizes how this fragmentation complicates a failure in a campaign to reveal the program as a whole: https: / / www.domaintools.com / blog /.
This fragmentation also includes complex human tactics and logistics. Documented techniques include "IT worker fraud" campaigns in which North Korean operators and a network of facilitators create false identities, recruit developers abroad and place these people in remote jobs in Western organizations. Workers can use laptops submitted by facilitators in "laptop farms" and are guided to pass interviews, update curriculums and assume legitimate roles that they then exploit to enter backdoors, exfilter data or steal digital assets. Reports from IBM X-Force and other analysts have described the magnitude and systematiicity of these programs; IBM maintains resources and analysis in: https: / / www.ibm.com / security / xforce.
The geographical scope of recruitment networks is also not anecdotal: recent evidence shows attempts at recruitment in countries such as Iran, Syria, Lebanon and Saudi Arabia, with some actual recruitment and offers issued by US employers. In addition, facilitators contact candidates on professional platforms, prepare them for interviews and even act as "callers" to overcome technical tests. Studies of signatures such as Flare have documented examples of this process and the connection between cryptomoneda remuneration and the flow of funds to the DPRK.

For the critical community and for any organization that integrates third-party code, the attack on Drift is a severe reminder that security is not only technical but also human. Advanced social engineering, identity validation and vetting of external integration are as important as code audits and infrastructure reviews. The operation of daily workflows - clone a repository, open a project in an editor, test an app in TestFlight - can be the entry door for an operation that is cooked for months.
The lessons left by this episode are already driving changes: from renewed attention to default development tool configurations to the need for stricter controls in onboarding processes and in managing relationships with counterparts. They also stress the importance of collaboration between critical projects, security companies and government agencies to track on- chain transactions, dismantle washing infrastructure and share commitment indicators. If you want to go into specific measures and alerts on specific techniques, public safety notes from companies such as Microsoft and public sector analyses are required to read: https: / / code.visualstudio.com / updates and the publications of the incident response teams in CrowdStrike, IBM X-Force and Chainalysis provide additional context.
In short, the assault on Drift is not an isolated event, but one more example of how a resource-intensive state actor and an organized program can combine social engineering, supply chain and apparently harmless technical holdings to remove massive amounts of value. As the community learns from this incident and hardens practices, history shows that adversaries also evolve; the advantage, for now, is better integrated human and technical security into all the links of the ecosystem.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...