Automated security scans + on-chain investigations, with clear and actionable results.
Apr 3 • 10 tweets • 4 min read
1/10
We've been investigating the @DriftProtocol exploit ($285M) since April 1.
We can confirm along with TRM Labs and Elliptic that North Korea's Lazarus Group (TraderTraitor). Same unit behind Bybit ($1.5B), Ronin ($625M). Was involved.
Here's what our independent on-chain forensics uncovered that hasn't been published.
2/10
The attacker didn't just compromise the multisig once.
Drift migrated to a new Security Council on March 27 (member departure). 2-of-5 threshold, zero timelock.
Within 3 days, the attacker re-compromised the NEW multisig and pre-signed a fresh durable nonce (Mar 31).