Advertisement ยท 728 ร— 90

Posts by Christina Lekati

Post image Post image Post image

On April 1, 2026, as the $285 million was drained, the attackers scrubbed their Telegram chats and vanished.

Incident Background Update from Drift:

1 week ago 1 0 0 0

One contributor may have been compromised after cloning a code repository shared by the group as part of efforts to deploy a frontend for their vault. A second contributor was persuaded into downloading a wallet product via Apple's TestFlight to beta test the app.

1 week ago 0 0 1 0

๐Ÿ”น ๐€ ๐ซ๐ž๐ฅ๐š๐ญ๐ข๐จ๐ง๐ฌ๐ก๐ข๐ฉ ๐ก๐š๐ ๐›๐ž๐ž๐ง ๐ž๐ฌ๐ญ๐š๐›๐ฅ๐ข๐ฌ๐ก๐ž๐, ๐œ๐จ๐ง๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐จ๐ซ๐ฌ ๐๐ข๐๐ง'๐ญ ๐ญ๐ก๐ข๐ง๐ค ๐ญ๐ฐ๐ข๐œ๐ž ๐ฐ๐ก๐ž๐ง ๐œ๐จ๐ฅ๐ฅ๐š๐›๐จ๐ซ๐š๐ญ๐ข๐ง๐  ๐๐ข๐ ๐ข๐ญ๐š๐ฅ๐ฅ๐ฒ. Drift presumes there may have been multiple technical attack vectors:

1 week ago 0 0 1 0

..๐“๐ก๐ž๐ฌ๐ž ๐ฐ๐ž๐ซ๐ž ๐ง๐จ๐ญ ๐ฌ๐ญ๐ซ๐š๐ง๐ ๐ž๐ซ๐ฌ; ๐ญ๐ก๐ž๐ฒ ๐ฐ๐ž๐ซ๐ž ๐ฉ๐ž๐จ๐ฉ๐ฅ๐ž ๐ƒ๐ซ๐ข๐Ÿ๐ญ ๐œ๐จ๐ง๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐จ๐ซ๐ฌ ๐ก๐š๐ ๐ฐ๐จ๐ซ๐ค๐ž๐ ๐ฐ๐ข๐ญ๐ก ๐š๐ง๐ ๐ฆ๐ž๐ญ ๐ข๐ง ๐ฉ๐ž๐ซ๐ฌ๐จ๐ง. (...) Links were shared for projects, tools, and apps they claimed to be building"

1 week ago 0 0 1 0

๐Ÿ”น (excerpt from Drift's Incident Update): "Integration conversations continued through February & March 2026. (...) By this point, the relationship was nearly half a year old...

1 week ago 0 0 1 0

๐Ÿ”น Dec. 2025 - Jan. 2026: To checkmate the game, the group onboarded an Ecosystem Vault on Drift. They engaged with the Drift contributors in working sessions, asked informed questions and eventually, they deposited over $1 Million of their own funds into the protocol

1 week ago 0 0 1 0

๐Ÿ”น "What a pleasant coincidence running into you again!"

Over the next 6 months, the attackers deliberately sought out these same contributors at multiple global conferences. They wanted to continue building trust and credibility.

1 week ago 0 0 1 0

๐Ÿ”น After the initial discussions, they moved their conversations to Telegram, where they spent months discussing legitimate trading strategies.

1 week ago 0 0 1 0

๐Ÿ”น This group, posing as employees of a quantitative trading firm, first approached specific Drift contributors at a major crypto conference face-to-face. They wanted to discuss integrating with the platform.

1 week ago 0 0 1 0

Here is how it unfolded:
๐Ÿ”นFall of 2025, a group of individuals (later linked to North Korea) started attending international crypto conferences, with a goal in mind.They were technically fluent,had fully constructed professional identities, & looked nothing like a North Korean

1 week ago 0 0 1 0
Advertisement

We know it happens, we talk about it in training, yet there is always a veil of doubt. Here is a rare public account of a #socialengineering op that started IN-PERSON & in a targeted way, ran for about 6 months, & cost Drift (a Solana-based DEX) $285 Million.
This is a truly sophisticated attack.๐Ÿงต

1 week ago 3 1 1 0
Layer 8 Conference โ€“ Social Engineering and OSINT โ€“ Boston, MA

Want a free ticket to Layer 8 Con? Sign up for "Social Engineering for Security Teams" by @christinalekati.bsky.social! A two-day immersive hands-on class that will teach all aspects of social engineering testing!

layer8conference.com www.zeffy.com/en-US/ticket...

3 weeks ago 1 2 0 0

VERY excited that Iโ€™ll be part of the @layer8conference.com this year delivering a keynote and a 2-day training class on Social Engineering!

Looking forward to meeting the Social Engineering & OSINT community in Boston. This will be fun! โœŒ๐Ÿป

1 month ago 4 1 0 0

"Proven play? Replay".

This is not a one time hit. Mandiant has observed UNC1069 using these techniques to target both corporate entities and individuals within the cryptocurrency industry, as well as venture capital firms and their employees or executives. The list will expand.

2 months ago 0 0 0 0

๐Ÿ”ธ Embedded within the string of commands is a single command that initiates a multi-stage infection chain, ultimately deploying 7 distinct malware families (described in the report).

2 months ago 0 0 1 0

๐Ÿ”ธ And then hey, "the audio is broken!". If only that could quickly get fixed...there are only 20 minutes left in the call.

This is where the ClickFix-style social engineering begins. The the threat actor directs the victim to run troubleshooting commands on their system to fix the issue.

2 months ago 0 0 1 0

๐Ÿ”ธ The call begins. The victim sees the video of a CEO from another company.

Or, purportedly, their deepfake version.

2 months ago 1 0 1 0

๐˜‰๐˜ถ๐˜ต, ๐˜ธ๐˜ฉ๐˜ฆ๐˜ฏ ๐˜ข ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ต๐˜ข๐˜ฌ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ช๐˜ฎ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข ๐˜ต๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ต ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต, ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต-๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฆ๐˜ณ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฎ๐˜ฆ๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜ช๐˜ด๐˜ฎ ๐˜ฌ๐˜ช๐˜ค๐˜ฌ๐˜ด ๐˜ช๐˜ฏ. ๐˜ˆ๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ, ๐˜ต๐˜ฉ๐˜ฆ ๐˜ญ๐˜ช๐˜ต๐˜ต๐˜ญ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ง๐˜ญ๐˜ข๐˜จ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ง๐˜ฐ๐˜ญ๐˜ญ๐˜ฐ๐˜ธ ๐˜ต๐˜ฆ๐˜ฏ๐˜ฅ ๐˜ต๐˜ฐ ๐˜จ๐˜ฆ๐˜ต ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ญ๐˜ฐ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ฅ. ๐˜ˆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ๐˜บ ๐˜ฅ๐˜ช๐˜ฅ.

2 months ago 0 0 1 0
Advertisement

๐Ÿ”ธ The Calendly link redirects to a spoofed Zoom meeting hosted on the threat actor's infrastructure: zoom[.]uswe05[.]us

๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ช๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต ๐˜ฐ๐˜ฃ๐˜ท๐˜ช๐˜ฐ๐˜ถ๐˜ด ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ง๐˜ญ๐˜ข๐˜จ ๐˜ต๐˜ฉ๐˜ข๐˜ต *๐˜ค๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ* ๐˜ฉ๐˜ข๐˜ท๐˜ฆ ๐˜ฃ๐˜ฆ๐˜ฆ๐˜ฏ ๐˜ด๐˜ฑ๐˜ฐ๐˜ต๐˜ต๐˜ฆ๐˜ฅ.

2 months ago 0 0 1 0

๐–๐ก๐š๐ญ ๐ก๐š๐ฉ๐ฉ๐ž๐ง๐ž๐?

๐Ÿ”ธ The threat actor initiates contact with a specific victim via Telegram, using a legit but compromised account of an executive,leverageing existing trust.

๐Ÿ”ธ After building rapport through industry-specific conversation, they invite the victim to a call & send a Calendly link.

2 months ago 0 0 1 0
Preview
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering | Google Cloud Blog North Korean threat actors target the cryptocurrency industry using AI-enabled social engineering such as deepfakes, and ClickFix.

If you think AI and deepfakes are THE name of the game in "sophisticated" social engineering attacks, think again. AI-gen deepfakes are often just one step (a final blow) in a larger social engineering kill-chain.

In this week's SE case, we see a layered intrusion.

cloud.google.com/blog/topics/...

2 months ago 2 0 1 0

You will learn how to conduct an in-depth digital investigation on a subject, discover new leads, uncover and utilize all the evidence that are hiding in plain sight (and beyond) & conduct virtual HUMINT in an uncomplicated, step-by-step process.
P.S. There will be a class challenge, and a reward :)

2 months ago 0 0 0 0

Join @osintgeek.de and me on the 21st & 22nd of April for two days full of learning, hands-on exercises, real life case studies and the latests developments in #OSINT #SOCMINT and #HUMINT.

2 months ago 0 0 1 0
Post image

๐Ž๐ฎ๐ซ "๐…๐ฎ๐ง๐๐š๐ฆ๐ž๐ง๐ญ๐š๐ฅ๐ฌ ๐จ๐Ÿ ๐‚๐ฒ๐›๐ž๐ซ ๐ˆ๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ง๐ ๐‡๐ฎ๐ฆ๐š๐ง ๐ˆ๐ง๐ญ๐ž๐ฅ๐ฅ๐ข๐ ๐ž๐ง๐œ๐ž" ๐œ๐ฅ๐š๐ฌ๐ฌ ๐ข๐ฌ ๐ซ๐ž๐ญ๐ฎ๐ซ๐ง๐ข๐ง๐  ๐ญ๐ก๐ข๐ฌ ๐ฌ๐ฉ๐ซ๐ข๐ง๐  ๐ญ๐จ @blackhatevents.bsky.social ๐€๐ฌ๐ข๐š ๐ข๐ง ๐’๐ข๐ง๐ ๐š๐ฉ๐จ๐ซ๐ž! ๐ŸŽ‰

For details & registrations:
blackhat.com/asia-26/trai...

2 months ago 0 0 1 0

Aim for less detail in what can be visible, even through crowdsourced images.

๐Ÿ”น Prioritize based on risk and take practical steps to implement better security measures on those vulnerable, identified spots before an adversary exploits them.

May the odds ever be in our favor โœจ๏ธ

3 months ago 2 0 0 0

What can be done? If you work on securing a critical infrastructure entity:

๐Ÿ”น Run your own OSINT analysis to identify vulnerabilities in advance. Know your level of exposure.

Control what you can:
๐Ÿ”น Where possible, ask platforms to add blur or remove certain imagery.

3 months ago 1 0 1 0

It is scary easy for saboteurs or other attackers to find vulnerabilities on critical infrastructure free & available online, and to focus on the locations/points where an attack could have the maximum impact.
This incident has not been an isolated event.

3 months ago 2 0 1 0
Advertisement

There is more publicly available information and databases that can be researched, found, and used in similar acts of sabotage (or worse, given the geopolitical state we are currently in).

3 months ago 1 0 1 0
Post image

The Google street view imagery provides some extra help in reviewing some of the physical security and the surrounding area in preparation of a better plan.
The OpenInfraMap in combination with Google maps is just one simple example of potential adversarial OSINT.

3 months ago 1 0 1 0
Post image Post image

Looking at the OpenInfraMap data in combination with satellite imagery, it is easy to see why this point of attack was chosen: all the 110 ฮšilovolt high-voltage lines that supply southwest Berlin converge into a single cable bridge that is overground, and easily accessible.

3 months ago 1 0 1 0