HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔓 Breach

North Korean APT UNC4736 Poses as Trading Firm, Steals $285 M from Drift Protocol

North Korean hackers masquerading as a legitimate trading firm infiltrated the Drift Protocol platform for six months, ultimately diverting $285 million in crypto assets. The breach underscores the critical need for rigorous third‑party verification and transaction monitoring in fintech supply chains.

🛡️ LiveThreat™ Intelligence · 📅 April 06, 2026· 📰 hackread.com
🟠
Severity
High
🔓
Type
Breach
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
hackread.com

North Korean APT UNC4736 Poses as Trading Firm, Steals $285 M from Drift Protocol

What Happened — UNC4736, a North Korean state‑sponsored hacking group, created a fake trading‑firm identity and maintained the ruse for six months. By convincing Drift Protocol’s finance team that they were a legitimate counterpart, the actors gained access to internal payment workflows and transferred roughly $285 million in cryptocurrency to offshore wallets.

Why It Matters for TPRM

  • Long‑term social‑engineering campaigns can bypass technical controls and compromise financial transactions.
  • State‑backed actors are targeting fintech and crypto‑trading platforms, expanding the attack surface of third‑party ecosystems.
  • The loss demonstrates the need for continuous verification of counterparties and real‑time transaction monitoring.

Who Is Affected — Financial services, crypto‑trading platforms, fintech SaaS providers, and any organization that integrates with Drift Protocol’s APIs.

Recommended Actions

  • Re‑evaluate vendor onboarding processes; require multi‑factor authentication and documented proof of corporate identity.
  • Implement strict transaction‑threshold alerts and anomaly detection for outbound payments.
  • Conduct periodic “red‑team” social‑engineering assessments on third‑party relationships.
  • Review and harden email security controls (DMARC, SPF, DKIM) to reduce phishing success.

Technical Notes — Attack vector: sophisticated phishing/social‑engineering campaign; no software vulnerability disclosed. The actors leveraged spoofed email domains, fake corporate branding, and insider‑knowledge of Drift’s payment procedures to exfiltrate funds. Source: HackRead

📰 Original Source
https://hackread.com/north-korean-hackers-trading-firm-drift-protocol/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.