On April 1, 2026, as the $285 million was drained, the attackers scrubbed their Telegram chats and vanished.
Incident Background Update from Drift:
Posts by Christina Lekati
One contributor may have been compromised after cloning a code repository shared by the group as part of efforts to deploy a frontend for their vault. A second contributor was persuaded into downloading a wallet product via Apple's TestFlight to beta test the app.
๐น ๐ ๐ซ๐๐ฅ๐๐ญ๐ข๐จ๐ง๐ฌ๐ก๐ข๐ฉ ๐ก๐๐ ๐๐๐๐ง ๐๐ฌ๐ญ๐๐๐ฅ๐ข๐ฌ๐ก๐๐, ๐๐จ๐ง๐ญ๐ซ๐ข๐๐ฎ๐ญ๐จ๐ซ๐ฌ ๐๐ข๐๐ง'๐ญ ๐ญ๐ก๐ข๐ง๐ค ๐ญ๐ฐ๐ข๐๐ ๐ฐ๐ก๐๐ง ๐๐จ๐ฅ๐ฅ๐๐๐จ๐ซ๐๐ญ๐ข๐ง๐ ๐๐ข๐ ๐ข๐ญ๐๐ฅ๐ฅ๐ฒ. Drift presumes there may have been multiple technical attack vectors:
..๐๐ก๐๐ฌ๐ ๐ฐ๐๐ซ๐ ๐ง๐จ๐ญ ๐ฌ๐ญ๐ซ๐๐ง๐ ๐๐ซ๐ฌ; ๐ญ๐ก๐๐ฒ ๐ฐ๐๐ซ๐ ๐ฉ๐๐จ๐ฉ๐ฅ๐ ๐๐ซ๐ข๐๐ญ ๐๐จ๐ง๐ญ๐ซ๐ข๐๐ฎ๐ญ๐จ๐ซ๐ฌ ๐ก๐๐ ๐ฐ๐จ๐ซ๐ค๐๐ ๐ฐ๐ข๐ญ๐ก ๐๐ง๐ ๐ฆ๐๐ญ ๐ข๐ง ๐ฉ๐๐ซ๐ฌ๐จ๐ง. (...) Links were shared for projects, tools, and apps they claimed to be building"
๐น (excerpt from Drift's Incident Update): "Integration conversations continued through February & March 2026. (...) By this point, the relationship was nearly half a year old...
๐น Dec. 2025 - Jan. 2026: To checkmate the game, the group onboarded an Ecosystem Vault on Drift. They engaged with the Drift contributors in working sessions, asked informed questions and eventually, they deposited over $1 Million of their own funds into the protocol
๐น "What a pleasant coincidence running into you again!"
Over the next 6 months, the attackers deliberately sought out these same contributors at multiple global conferences. They wanted to continue building trust and credibility.
๐น After the initial discussions, they moved their conversations to Telegram, where they spent months discussing legitimate trading strategies.
๐น This group, posing as employees of a quantitative trading firm, first approached specific Drift contributors at a major crypto conference face-to-face. They wanted to discuss integrating with the platform.
Here is how it unfolded:
๐นFall of 2025, a group of individuals (later linked to North Korea) started attending international crypto conferences, with a goal in mind.They were technically fluent,had fully constructed professional identities, & looked nothing like a North Korean
We know it happens, we talk about it in training, yet there is always a veil of doubt. Here is a rare public account of a #socialengineering op that started IN-PERSON & in a targeted way, ran for about 6 months, & cost Drift (a Solana-based DEX) $285 Million.
This is a truly sophisticated attack.๐งต
Want a free ticket to Layer 8 Con? Sign up for "Social Engineering for Security Teams" by @christinalekati.bsky.social! A two-day immersive hands-on class that will teach all aspects of social engineering testing!
layer8conference.com www.zeffy.com/en-US/ticket...
VERY excited that Iโll be part of the @layer8conference.com this year delivering a keynote and a 2-day training class on Social Engineering!
Looking forward to meeting the Social Engineering & OSINT community in Boston. This will be fun! โ๐ป
"Proven play? Replay".
This is not a one time hit. Mandiant has observed UNC1069 using these techniques to target both corporate entities and individuals within the cryptocurrency industry, as well as venture capital firms and their employees or executives. The list will expand.
๐ธ Embedded within the string of commands is a single command that initiates a multi-stage infection chain, ultimately deploying 7 distinct malware families (described in the report).
๐ธ And then hey, "the audio is broken!". If only that could quickly get fixed...there are only 20 minutes left in the call.
This is where the ClickFix-style social engineering begins. The the threat actor directs the victim to run troubleshooting commands on their system to fix the issue.
๐ธ The call begins. The victim sees the video of a CEO from another company.
Or, purportedly, their deepfake version.
๐๐ถ๐ต, ๐ธ๐ฉ๐ฆ๐ฏ ๐ข ๐ต๐ฉ๐ณ๐ฆ๐ข๐ต ๐ข๐ค๐ต๐ฐ๐ณ ๐ต๐ข๐ฌ๐ฆ๐ด ๐ต๐ฉ๐ฆ ๐ต๐ช๐ฎ๐ฆ ๐ต๐ฐ ๐ฃ๐ถ๐ช๐ญ๐ฅ ๐ต๐ณ๐ถ๐ด๐ต ๐ธ๐ช๐ต๐ฉ ๐ข ๐ต๐ข๐ณ๐จ๐ฆ๐ต ๐ง๐ช๐ณ๐ด๐ต, ๐ต๐ฉ๐ฆ ๐ต๐ณ๐ถ๐ด๐ต-๐ต๐ณ๐ข๐ฏ๐ด๐ง๐ฆ๐ณ๐ฆ๐ฏ๐ค๐ฆ ๐ฎ๐ฆ๐ค๐ฉ๐ข๐ฏ๐ช๐ด๐ฎ ๐ฌ๐ช๐ค๐ฌ๐ด ๐ช๐ฏ. ๐๐ฏ๐ฅ ๐ต๐ฉ๐ฆ๐ฏ, ๐ต๐ฉ๐ฆ ๐ญ๐ช๐ต๐ต๐ญ๐ฆ ๐ณ๐ฆ๐ฅ ๐ง๐ญ๐ข๐จ๐ด ๐ต๐ฉ๐ข๐ต ๐ง๐ฐ๐ญ๐ญ๐ฐ๐ธ ๐ต๐ฆ๐ฏ๐ฅ ๐ต๐ฐ ๐จ๐ฆ๐ต ๐ฐ๐ท๐ฆ๐ณ๐ญ๐ฐ๐ฐ๐ฌ๐ฆ๐ฅ. ๐๐ด ๐ต๐ฉ๐ฆ๐บ ๐ฅ๐ช๐ฅ.
๐ธ The Calendly link redirects to a spoofed Zoom meeting hosted on the threat actor's infrastructure: zoom[.]uswe05[.]us
๐๐ฉ๐ช๐ด ๐ช๐ด ๐ต๐ฉ๐ฆ ๐ง๐ช๐ณ๐ด๐ต ๐ฐ๐ฃ๐ท๐ช๐ฐ๐ถ๐ด ๐ณ๐ฆ๐ฅ ๐ง๐ญ๐ข๐จ ๐ต๐ฉ๐ข๐ต *๐ค๐ฐ๐ถ๐ญ๐ฅ* ๐ฉ๐ข๐ท๐ฆ ๐ฃ๐ฆ๐ฆ๐ฏ ๐ด๐ฑ๐ฐ๐ต๐ต๐ฆ๐ฅ.
๐๐ก๐๐ญ ๐ก๐๐ฉ๐ฉ๐๐ง๐๐?
๐ธ The threat actor initiates contact with a specific victim via Telegram, using a legit but compromised account of an executive,leverageing existing trust.
๐ธ After building rapport through industry-specific conversation, they invite the victim to a call & send a Calendly link.
If you think AI and deepfakes are THE name of the game in "sophisticated" social engineering attacks, think again. AI-gen deepfakes are often just one step (a final blow) in a larger social engineering kill-chain.
In this week's SE case, we see a layered intrusion.
cloud.google.com/blog/topics/...
You will learn how to conduct an in-depth digital investigation on a subject, discover new leads, uncover and utilize all the evidence that are hiding in plain sight (and beyond) & conduct virtual HUMINT in an uncomplicated, step-by-step process.
P.S. There will be a class challenge, and a reward :)
Join @osintgeek.de and me on the 21st & 22nd of April for two days full of learning, hands-on exercises, real life case studies and the latests developments in #OSINT #SOCMINT and #HUMINT.
๐๐ฎ๐ซ "๐
๐ฎ๐ง๐๐๐ฆ๐๐ง๐ญ๐๐ฅ๐ฌ ๐จ๐ ๐๐ฒ๐๐๐ซ ๐๐ง๐ฏ๐๐ฌ๐ญ๐ข๐ ๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐ง๐ ๐๐ฎ๐ฆ๐๐ง ๐๐ง๐ญ๐๐ฅ๐ฅ๐ข๐ ๐๐ง๐๐" ๐๐ฅ๐๐ฌ๐ฌ ๐ข๐ฌ ๐ซ๐๐ญ๐ฎ๐ซ๐ง๐ข๐ง๐ ๐ญ๐ก๐ข๐ฌ ๐ฌ๐ฉ๐ซ๐ข๐ง๐ ๐ญ๐จ @blackhatevents.bsky.social ๐๐ฌ๐ข๐ ๐ข๐ง ๐๐ข๐ง๐ ๐๐ฉ๐จ๐ซ๐! ๐
For details & registrations:
blackhat.com/asia-26/trai...
Aim for less detail in what can be visible, even through crowdsourced images.
๐น Prioritize based on risk and take practical steps to implement better security measures on those vulnerable, identified spots before an adversary exploits them.
May the odds ever be in our favor โจ๏ธ
What can be done? If you work on securing a critical infrastructure entity:
๐น Run your own OSINT analysis to identify vulnerabilities in advance. Know your level of exposure.
Control what you can:
๐น Where possible, ask platforms to add blur or remove certain imagery.
It is scary easy for saboteurs or other attackers to find vulnerabilities on critical infrastructure free & available online, and to focus on the locations/points where an attack could have the maximum impact.
This incident has not been an isolated event.
There is more publicly available information and databases that can be researched, found, and used in similar acts of sabotage (or worse, given the geopolitical state we are currently in).
The Google street view imagery provides some extra help in reviewing some of the physical security and the surrounding area in preparation of a better plan.
The OpenInfraMap in combination with Google maps is just one simple example of potential adversarial OSINT.
Looking at the OpenInfraMap data in combination with satellite imagery, it is easy to see why this point of attack was chosen: all the 110 ฮilovolt high-voltage lines that supply southwest Berlin converge into a single cable bridge that is overground, and easily accessible.