The biggest bottleneck in DeFi development
Author: Chloe, ChainCatcher
Last week, the Solana lending protocol Drift was hacked, resulting in approximately $285 million in user assets being stolen. According to official statements, this was not a typical smart contract vulnerability attack, but rather a six-month-long, meticulously planned social engineering attack by state-sponsored hackers.
There is even investigative evidence suggesting that the same group of threat actors may have already infiltrated the core development of multiple DeFi protocols, not as attackers, but as contributors.
North Korean hackers commonly infiltrate early targets but rarely invest large sums of money
According to the statement regarding the Drift incident, the core strategy of the attackers was to "become part of the ecosystem."
Since the fall of 2025, they disguised themselves as a quantitative trading company and began to engage with Drift's core contributors at major crypto industry conferences. This engagement was not a one-time occurrence, but rather multiple interactions across different countries and conferences, deliberately conducted over six months. These individuals were technically proficient, had verifiable backgrounds, and were well-acquainted with how Drift operated.
Moreover, their interactions were not limited to Drift's core members. The team also exploited the open mechanism of Drift's Ecosystem Vault, successfully listing their own vault as a legitimate trading company, depositing over $1 million of their own funds, participating in multiple working meetings, and posing in-depth product questions, thereby solidifying trust with the project team.
Blockchain technology expert Steven, in an interview with ChainCatcher, stated: "North Korean hackers have been infiltrating targets from early on, which is common practice, but investing large sums of money as a basis for trust is relatively rare. However, for the attackers, this $1 million is essentially a risk-free investment; as long as they do not launch an attack, this money is merely normal funds existing in the vault, which can be withdrawn at any time; and the actual operations are conducted by unwitting third-party personnel, resulting in almost no economic loss to the organization itself."
Additionally, during their long-term collaboration with Drift, the team shared code projects and applications stored on GitHub under the pretext of showcasing their own development tools. Given the circumstances at the time, it was entirely normal for partners to review each other's code. However, subsequent investigations by Drift revealed that one contributor had copied a GitHub code project containing malicious code, while another contributor was induced to download a TestFlight application disguised as a wallet product.
The reason the code project pathway is difficult to guard against is that it is fully embedded in the developers' daily workflow. Developers typically use code editors like VSCode or Cursor when writing code, which can be thought of as the Word for engineers, something they open and use daily.
The security research community discovered a serious vulnerability in such editors by the end of 2025: when developers opened code projects shared by others, hidden malicious commands within the projects would automatically execute in the background, completely covertly, without any confirmation windows popping up on the screen, requiring no clicks to agree, and providing no warnings. Developers believed they were merely "looking at code," but their computers had actually been implanted with backdoors. The attackers exploited this vulnerability to hide malware within the daily operations that developers routinely performed.
By the time the Drift attack occurred on April 1, the attackers' Telegram chat records and all traces of malware had been completely erased, leaving only a $285 million gap.
Is Drift just the tip of the iceberg?
According to an investigation by the emergency security response organization SEAL 911 in the crypto industry, this attack was carried out by the same group of threat actors responsible for the October 2024 Radiant Capital hack. The connections include on-chain fund flows (the funds used to prepare and test this operation trace back to the Radiant attackers) and operational patterns (the personas deployed in this operation show identifiable overlaps with known North Korean activities). Mandiant, a well-known security forensics company hired by Drift (now part of Google), had previously attributed the Radiant incident to the North Korean state-affiliated organization UNC4736, but Mandiant has not yet formally attributed the Drift incident, and complete device forensics are still ongoing.
Notably, the individuals who personally attended the meetings were not North Korean nationals. Steven stated: "North Korean hackers should not be viewed as a typical hacking organization, but rather as an intelligence agency; it is a large organization with thousands of people and clearly defined roles. Among them, the North Korean hacker Lazarus is formally known in the international security field as APT38, while another affiliated organization, Kimsuky, is designated as APT43."
This explains why they are able to deploy real people offline. They establish companies overseas under various names, recruiting local personnel, who may not even be aware of who they are working for. "He might think he joined a normal remote work company, and after a year is sent to meet a client; everything seems normal, but behind it is a hacking organization. When law enforcement comes to investigate, that person knows nothing."
Now, Drift may just be the tip of the iceberg.
If the Drift incident reveals a vulnerability in a single protocol, subsequent investigations point to a larger issue: the same methods may have been operating across the entire DeFi ecosystem for years.
According to blockchain researcher Tayvano's investigation, since the rapid expansion of DeFi in 2020, code contributions associated with North Korean IT workers have spread across several well-known projects, including SushiSwap, THORChain, Harmony, Ankr, and Yearn Finance.
The methods used by these individuals are strikingly similar to those in the Drift incident: using forged identities, obtaining development roles through freelance platforms and direct contacts, entering Discord channels, developer communities, and even attending developer meetings. Once inside the project, they contribute code, participate in development cycles, and build trust with the team until they understand the entire protocol architecture and wait for the right moment to act.
Steven believes that in traditional intelligence agencies, they can even lie in wait for a lifetime, with the next generation continuing the unfinished tasks of the previous generation. For them, Web3 projects are short-term with high returns, and the nature of remote work allows one person to hold multiple roles across various projects, which is quite common in the Web3 industry and does not raise suspicion.
"The North Korean hacker organization includes all Web3 projects in their attack scope, carefully screening each project and gathering information on team members. Their understanding of the projects is clearer than that of the project teams themselves," Steven said. The reason Web3 has become a primary target is that this ecosystem has a large amount of funds, lacks unified global regulation, and the prevalence of remote work often makes it impossible to verify the true identities of collaborators and employees. Additionally, the generally young and inexperienced nature of practitioners provides an ideal infiltration environment for North Korean intelligence agencies.
Hacking incidents are common; project teams can only sit and wait?
Looking back at major incidents in recent years, social engineering has always been a core tactic of North Korean hacker groups. Recently, Binance founder CZ's memoir "Binance Life" was released, recounting the incident in May 2019 when Binance was hacked for 7,000 bitcoins. According to CZ, the hackers first infiltrated the laptops of several employees using advanced malware, then implanted malicious commands during the final step of the withdrawal process, stealing all 7,000 bitcoins from the hot wallet at 1 AM (worth approximately $40 million at the time). CZ wrote in the book that, based on the attack methods, the hackers had been lurking in the Binance network for some time and were highly suspected to be from North Korea's Lazarus, possibly even bribing internal employees.
The 2022 Ronin Network incident is also a classic case. Ronin is the sidechain behind the popular blockchain game Axie Infinity, responsible for handling all cross-chain transfers of in-game assets, with a large amount of locked funds at the time. The attack was triggered when a developer received a seemingly high-paying job offer from a well-known company and downloaded a file containing malware during the interview process, allowing the attackers to gain internal system access and ultimately steal $625 million.
The 2023 CoinsPaid incident employed almost identical tactics. CoinsPaid is a service provider for cryptocurrency payments, and the attackers similarly approached employees through a forged recruitment process, inducing them to install malware before infiltrating the system. More recent hacking methods have become even more diverse: forged video calls, compromised social accounts, and malware disguised as meeting software.
Victims received seemingly normal Calendly meeting links, and upon clicking, were guided to install a fake meeting application, allowing the malware to steal wallets, passwords, recovery phrases, and communication records. It is estimated that through such methods, North Korean hacker groups have stolen over $300 million.
At the same time, the ultimate destination of the stolen funds is also worth noting. Steven stated that the stolen funds ultimately fall under the control of the North Korean government. Money laundering is carried out by a specialized team within the organization, which sets up mixers and opens accounts with fake identities at numerous exchanges, following a complete and complex process: the funds are cleaned through mixers immediately after being stolen, then exchanged for privacy coins, and subsequently transferred across different DeFi projects, circulating repeatedly between exchanges and DeFi.
"The entire process is completed within about 30 days, and the final funds end up in casinos in Southeast Asia, small exchanges that do not require KYC, and OTC service providers in Hong Kong and Southeast Asia, where they are cashed out."
So, in the face of this new threat model, where the adversaries are not only attackers but also participants, how should the crypto industry respond?
Steven believes that project teams managing large amounts of funds should hire professional security teams, establish dedicated security positions within the team, and ensure that all core members strictly adhere to security protocols. It is especially important that development devices and devices responsible for financial signatures are strictly physically isolated. He specifically mentioned that a key issue in the Drift incident was the cancellation of the time-lock buffer mechanism, "which should never be canceled at any time."
However, he also admitted that if North Korean intelligence agencies truly want to infiltrate deeply, even rigorous background checks would be difficult to fully identify. But bringing in security teams is still crucial. He suggested that project teams introduce blue teams (the defensive side in cyber offense and defense), as blue teams can not only assist in enhancing the security of devices and behaviors but also continuously monitor key nodes, allowing for immediate detection and response to attacks in case of abnormal fluctuations. "Relying solely on the project team's own security capabilities is insufficient to withstand this level of attack."
He added that North Korea's cyber warfare capabilities rank among the top five in the world, second only to the United States, Russia, China, and Israel. In the face of such adversaries, relying solely on code audits is far from enough.
Conclusion
The Drift incident proves that the greatest threats facing DeFi today are not just market conditions or liquidity; in terms of security, it is not only about preventing code vulnerabilities, as spies may be hiding right next to you.
When attackers are willing to spend six months and invest millions of dollars to cultivate a relationship, traditional code audits and security defenses are simply inadequate. Moreover, according to existing investigations, this set of tactics may have been operating in multiple projects for years, just not yet discovered.
Whether DeFi can maintain decentralization and openness is no longer the core issue; the real question is: can it resist the infiltration of those well-packaged adversaries while remaining open?
You may also like

Consumer-grade Crypto Global Survey: Users, Revenue, and Track Distribution

Prediction Markets Under Bias

Stolen: $290 million, Three Parties Refusing to Acknowledge, Who Should Foot the Bill for the KelpDAO Incident Resolution?

ASTEROID Pumped 10,000x in Three Days, Is Meme Season Back on Ethereum?

ChainCatcher Hong Kong Themed Forum Highlights: Decoding the Growth Engine Under the Integration of Crypto Assets and Smart Economy

Why can this institution still grow by 150% when the scale of leading crypto VCs has shrunk significantly?

Anthropic's $1 trillion, compared to DeepSeek's $100 billion

Geopolitical Risk Persists, Is Bitcoin Becoming a Key Barometer?

Annualized 11.5%, Wall Street Buzzing: Is MicroStrategy's STRC Bitcoin's Savior or Destroyer?

An Obscure Open Source AI Tool Alerted on Kelp DAO's $292 million Bug 12 Days Ago

Mixin has launched USTD-margined perpetual contracts, bringing derivative trading into the chat scene.
The privacy-focused crypto wallet Mixin announced today the launch of its U-based perpetual contract (a derivative priced in USDT). Unlike traditional exchanges, Mixin has taken a new approach by "liberating" derivative trading from isolated matching engines and embedding it into the instant messaging environment.
Users can directly open positions within the app with leverage of up to 200x, while sharing positions, discussing strategies, and copy trading within private communities. Trading, social interaction, and asset management are integrated into the same interface.
Based on its non-custodial architecture, Mixin has eliminated friction from the traditional onboarding process, allowing users to participate in perpetual contract trading without identity verification.
The trading process has been streamlined into five steps:
· Choose the trading asset
· Select long or short
· Input position size and leverage
· Confirm order details
· Confirm and open the position
The interface provides real-time visualization of price, position, and profit and loss (PnL), allowing users to complete trades without switching between multiple modules.
Mixin has directly integrated social features into the derivative trading environment. Users can create private trading communities and interact around real-time positions:
· End-to-end encrypted private groups supporting up to 1024 members
· End-to-end encrypted voice communication
· One-click position sharing
· One-click trade copying
On the execution side, Mixin aggregates liquidity from multiple sources and accesses decentralized protocol and external market liquidity through a unified trading interface.
By combining social interaction with trade execution, Mixin enables users to collaborate, share, and execute trading strategies instantly within the same environment.
Mixin has also introduced a referral incentive system based on trading behavior:
· Users can join with an invite code
· Up to 60% of trading fees as referral rewards
· Incentive mechanism designed for long-term, sustainable earnings
This model aims to drive user-driven network expansion and organic growth.
Mixin's derivative transactions are built on top of its existing self-custody wallet infrastructure, with core features including:
· Separation of transaction account and asset storage
· User full control over assets
· Platform does not custody user funds
· Built-in privacy mechanisms to reduce data exposure
The system aims to strike a balance between transaction efficiency, asset security, and privacy protection.
Against the background of perpetual contracts becoming a mainstream trading tool, Mixin is exploring a different development direction by lowering barriers, enhancing social and privacy attributes.
The platform does not only view transactions as execution actions but positions them as a networked activity: transactions have social attributes, strategies can be shared, and relationships between individuals also become part of the financial system.
Mixin's design is based on a user-initiated, user-controlled model. The platform neither custodies assets nor executes transactions on behalf of users.
This model aligns with a statement issued by the U.S. Securities and Exchange Commission (SEC) on April 13, 2026, titled "Staff Statement on Whether Partial User Interface Used in Preparing Cryptocurrency Securities Transactions May Require Broker-Dealer Registration."
The statement indicates that, under the premise where transactions are entirely initiated and controlled by users, non-custodial service providers that offer neutral interfaces may not need to register as broker-dealers or exchanges.
Mixin is a decentralized, self-custodial privacy wallet designed to provide secure and efficient digital asset management services.
Its core capabilities include:
· Aggregation: integrating multi-chain assets and routing between different transaction paths to simplify user operations
· High liquidity access: connecting to various liquidity sources, including decentralized protocols and external markets
· Decentralization: achieving full user control over assets without relying on custodial intermediaries
· Privacy protection: safeguarding assets and data through MPC, CryptoNote, and end-to-end encrypted communication
Mixin has been in operation for over 8 years, supporting over 40 blockchains and more than 10,000 assets, with a global user base exceeding 10 million and an on-chain self-custodied asset scale of over $1 billion.

$600 million stolen in 20 days, ushering in the era of AI hackers in the crypto world

Vitalik's 2026 Hong Kong Web3 Summit Speech: Ethereum's Ultimate Vision as the "World Computer" and Future Roadmap

On the same day Aave introduced rsETH, why did Spark decide to exit?

Full Post-Mortem of the KelpDAO Incident: Why Did Aave, Which Was Not Compromised, End Up in Crisis Situation?

After a $290 million DeFi liquidation, is the security promise still there?

ZachXBT's post ignites RAVE nearing zero, what is the truth behind the insider control?


