What Happened
On April 1, 2026, Solana-based decentralized exchange Drift Protocol confirmed that approximately $285 million USD was stolen from its platform in an attack it described as six months in the making. The theft is the largest DeFi exploit of 2026 and the second-largest Solana-based theft in history, behind only the 2022 Wormhole bridge compromise.
Drift attributed the attack with medium confidence to UNC4736, a North Korean state-sponsored threat group tracked by Mandiant, Google Threat Intelligence Group, and others. UNC4736 is also known as AppleJeus, Citrine Sleet, Golden Chollima, and Gleaming Pisces — a financially motivated DPRK cluster with a documented history of cryptocurrency sector intrusions and supply chain attacks.
The operation began in fall 2025 when UNC4736 operatives created a fictitious asset called CarbonVote Token, seeded it with a small amount of liquidity, and used wash trading to give it the appearance of market activity. Drift’s oracle infrastructure treated CarbonVote as legitimate collateral worth hundreds of millions of dollars. Between December 2025 and March 2026, the operatives engaged Drift contributors in detailed product discussions while depositing more than $1 million of their own funds to build credibility within the ecosystem.
The final attack involved social engineering multisig signers into pre-signing hidden transaction authorizations and triggering a zero-timelock Security Council migration — eliminating the protocol’s last line of defense. The attackers then used the fabricated token’s inflated oracle price to drain the protocol’s legitimate liquidity pools. The Hacker News
Why This Matters for Canadian Organizations
Canada is home to a significant and growing cryptocurrency and decentralized finance sector. Canadian retail investors, crypto-native firms, blockchain development teams, and established financial institutions with digital asset exposure all operate in the same threat environment targeted by UNC4736 and affiliated DPRK actors.
The Drift Protocol attack is not an isolated incident. North Korean state-sponsored groups stole an estimated $1.3 billion USD in cryptocurrency in 2024 alone, according to blockchain analytics firm Chainalysis. These funds finance North Korea’s weapons programs and sanctions evasion activities. The scale and sophistication of these operations — including multi-month infiltration of target organizations before executing the attack — put them in a category beyond typical financial fraud.
The attack’s mechanics are directly relevant to Canadian crypto firms, DeFi protocol operators, fintech companies, and financial institutions assessing custody and governance risk. Oracle manipulation, governance token social engineering, and multisig authorization abuse are attack vectors present across the DeFi ecosystem, not just in Drift. Any Canadian organization with governance responsibilities over DeFi protocols, smart contract administration, or digital asset custody should review whether its authorization workflows contain equivalent single points of failure.
Canada’s Financial Transactions and Reports Analysis Centre (FINTRAC) and the Department of Finance have both signalled increased attention to crypto sector vulnerabilities. Firms under Canadian AML and securities regulations should document their incident response and governance controls in anticipation of regulatory interest following high-profile attacks of this scale.
What to Do
For Canadian crypto and DeFi organizations: audit all multisig authorization processes for hidden pre-signing risks and ensure zero-timelock governance actions are disabled or require supermajority approval. Implement independent oracle pricing verification and anomaly detection that flags unusual collateral valuations before they affect protocol liquidity.
Vet all new contributor and integration relationships thoroughly. UNC4736 operatives spent six months building credibility before executing. Background verification, separation of signing authority, and requiring multiple independent approvals for governance actions above defined thresholds are baseline mitigations.
Canadian organizations that hold, custody, or transact significant digital asset volumes should report suspicious social engineering approaches or governance manipulation attempts to the Canadian Centre for Cyber Security at contact@cyber.gc.ca and FINTRAC as appropriate.

