Diverg Profile picture
Automated security scans + on-chain investigations, with clear and actionable results.
Apr 3 10 tweets 4 min read
1/10

We've been investigating the @DriftProtocol exploit ($285M) since April 1.

We can confirm along with TRM Labs and Elliptic that North Korea's Lazarus Group (TraderTraitor). Same unit behind Bybit ($1.5B), Ronin ($625M). Was involved.

Here's what our independent on-chain forensics uncovered that hasn't been published. 2/10

The attacker didn't just compromise the multisig once.

Drift migrated to a new Security Council on March 27 (member departure). 2-of-5 threshold, zero timelock.

Within 3 days, the attacker re-compromised the NEW multisig and pre-signed a fresh durable nonce (Mar 31).