North Korea's Six-Month Con Job Steals $285M from Solana DEX Drift
North Korean hackers didn't smash windows at Drift—they wined, dined, and Telegram-chatted devs for six months before pocketing $285 million. This wasn't brute force; it was a masterclass in patience and deception.
⚡ Key Takeaways
- DPRK's UNC4736 ran a six-month social engineering op using conference meetups and Telegram to infiltrate Drift. 𝕏
- On-chain evidence links the $285M theft to prior hacks like Radiant Capital, funding North Korea's military. 𝕏
- DeFi's tech focus ignores human weak spots—expect more patient cons unless opsec evolves fast. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by The Hacker News