Drift Protocol, a decentralized cryptocurrency trade (DEX), says the current exploit in opposition to the platform was a six-month-long, extremely coordinated assault.
“The preliminary investigation exhibits that Drift skilled a structured intelligence operation requiring organizational backing, vital sources, and months of deliberate preparation,” Drift stated in an X submit on Saturday.
The decentralized trade was exploited on Wednesday, with exterior estimates placing losses at round $280 million.
All of it started at a “main crypto convention”
Based on Drift, the assault plan might be traced again to round October 2025, when malicious actors posing as a quantitative buying and selling agency first approached Drift contributors at a “main crypto convention,” claiming to be curious about integrating with the protocol.

The group continued to interact contributors in individual at a number of trade occasions over the next six months. “It’s now understood that this seems to be a focused method, the place people from this group continued to intentionally hunt down and interact particular Drift contributors,” Drift stated.
“They had been technically fluent, had verifiable skilled backgrounds, and had been conversant in how Drift operated,” Drift stated.
After gaining belief and entry to Drift Protocol over six months, they used shared malicious hyperlinks and instruments to compromise contributors’ gadgets, execute the exploit, after which wiped their presence instantly after the assault.
The incident serves as a reminder for crypto trade contributors to stay cautious and skeptical, even throughout in-person interactions, as crypto conferences might be prime targets for stylish menace actors.
Drift flags a excessive likelihood of a Radiant Capital hack hyperlink
Drift stated, with “medium-high confidence,” that the exploit was carried out by the identical actors behind the October 2024 Radiant Capital hack.
In December 2024, Radiant Capital stated the exploit was carried out via malware despatched by way of Telegram from a North Korea-aligned hacker posing as an ex-contractor.

“This ZIP file, when shared for suggestions amongst different builders, finally delivered malware that facilitated the next intrusion,” Radiant Capital stated.
Drift stated it’s “essential to notice” that the people who appeared in individual “weren’t North Korean nationals.”
Associated: Naoris launches post-quantum blockchain as quantum safety dangers achieve consideration
“DPRK menace actors working at this degree are identified to deploy third-party intermediaries to conduct face-to-face relationship-building,” Drift stated.
Drift stated that it’s working with legislation enforcement and others within the crypto trade to “construct a whole image of what occurred throughout the April 1st assault.”
Journal: Bitcoin 85% crashes ‘achieved,’ CLARITY Act hypothesis mounts: Hodler’s Digest, Mar. 29 – April 4
















