Kim Jong-un's DeFi Portfolio Growing: Elliptic Says DPRK Suspected in $285M Drift Protocol Heist
Blockchain analytics firm Elliptic has flagged the $285 million Drift Protocol exploit as carrying "multiple indicators" of involvement by North Korea's state-sponsored DPRK hacker groups. The attack marks the largest exploit recorded this year. Because apparently, Kim Jong-un isn't just building missiles—he's building a rather aggressive yield farming strategy.
Drift Protocol, Solana's largest decentralized perpetual futures exchange, saw its token plunge over 40% to roughly $0.06 following the incident. The platform has become the eighteenth DPRK-linked attack Elliptic has tracked in 2026, with total stolen funds exceeding $300 million across these operations. That's not a hacking spree—that's a Q4 performance review.
"It is a continuation of the DPRK's sustained campaign of large-scale cryptoasset theft, which the U.S. government has linked to the funding of its weapons programs," Elliptic noted. DPRK-linked actors are believed responsible for billions in cryptoasset theft in recent years. Someone should tell these guys that rug pulls are more profitable than regime changes.
Arkham data revealed over $250 million was moved from Drift to an interim wallet within hours, then fragmented across various addresses. This follows a December Chainalysis report showing DPRK hackers pilfered a record $2 billion in crypto during 2025—including the $1.4 billion Bybit breach—representing a 51% year-over-year increase. The gas fees alone on these transactions must be astronomical. North Korea's on-chain activity is basically printing money while the rest of us are stuck paying $50 for a rejected transaction.
The Treasury Department confirmed North Korea funnels stolen crypto into weapons of mass destruction programs. Nothing says "diamond hands" quite like weaponizing your DeFi gains.
Elliptic's analysis describes the operation as "premeditated and carefully staged," with early test transactions and pre-positioned wallets preceding the main exploit. Funds were rapidly consolidated, swapped, bridged across chains, and converted into liquid assets—a structured, repeatable laundering workflow designed to obscure origin while maintaining control. These guys aren't just degens—they're operating with more operational security than a CIA safe house. Professional AF.
Solana's account model presents unique tracing challenges. Since each asset resides in a separate token account, a single actor's activity can appear fragmented across multiple addresses. Elliptic emphasizes that without linking these fragments, investigators only see "fragments of the attacker's activity, not the complete picture." Their clustering approach reconnects token accounts to a single entity, enabling exposure identification regardless of screened address. It's like trying to solve a jigsaw puzzle where someone dealt with the pieces by throwing them into a blender.
Mentioned Coins
Share Article
Quick Info
Disclaimer: This content is for information and entertainment purposes only. It does not constitute financial, investment, legal, or tax advice. Always do your own research and consult with qualified professionals before making any financial decisions.
See our Terms of Service, Privacy Policy, and Editorial Policy.