Transcript
A (0:00)
Hey everyone. Welcome to Unchained, your no hype resource for all things crypto. I'm your host, Laura Shin. Thanks for joining this live stream. Before we get started, a quick reminder. Nothing new here on Unchained is investment advice. This show is for informational and entertainment purposes only and my guest tonight may hold assets discussed in the show. For more disclosures, visit unchained crypto.com Bitcoin changed how Money works Cetraya changes how Bitcoin scales with a trust minimized BTC and a native stablecoin ctusd Satraya enables Bitcoin capital markets with lending privacy, Bitcoin yield and more. Get started at Citraya XYZ Unchained Etherfi is giving Unchained listeners 15% cash back on food and ride apps. And that's on top of the 3% you get on everything else your bank is charging you to use your own money. I switched Go to Ether Fi Unchained to claim your discount. Today's topic is the Hollywood thriller backstory to the Drift hack and and the backlash against Circle. Here to discuss are Amanda Wick, head of Americas at Verify VASP and Michael Llewellyn, head of Solutions engineering at Turnkey. Welcome Amanda and Michael, Good to be here.
B (1:10)
Hi, thanks for having us.
A (1:12)
When we originally booked this podcast, we thought we were going to focus on how Circle handled the Drift hack. But over the weekend when Drift gave its postmortem on how the attack was actually six months in the making, we realized we needed to cover that huge story as well. So let's start with that for listeners who weren't on Crypto Twitter this Easter weekend. Michael, do you want to catch people up to speed on what exactly Drift said about how they got compromised?
C (1:43)
Yeah, I'd love to. It definitely took up a lot of my Sunday and the Sunday of many other security professionals in the space that have been commenting on it. I mean the short version, like we knew this was prolikely a sophisticated attacker when the hack happened. I was actually having dinner with some security professionals at ECC in conference when this all went down. So I've been hearing the play by play since. But then Sunday I think what we learned was, you know, lots of speculation that this was going to be a sophisticated attacker, possibly DPRK link We haven't confirmed that, but it feels very likely. And what it looks like based on what the Drift team reported is that this was a long term, at least six month intelligence operation. And what's really wild about this is that involved in person professionals or crypto professionals ostensibly interacting with the Drift team, building their confidence, interacting with them, showing competence and understanding of their protocol as a legitimate actor that might be wanting to do an integration with their protocol. And through that it seems like they were able to convince certain engineers to install or clone certain repositories on their systems, take advantage of known vulnerabilities in VS code and other things. And then it was very likely they were then able to get signatures on these admin wallets, including this 2 out of 5 multisig that specifically was the vector for the attack, that they were able to essentially get those signatures weeks in advance of the actual attack and then through. And that was using durable nonces, something on Solana, but basically just a signed transaction ready to go at a moment's notice when the attack was ready to be launched. And it, and it does seem like they were rehearsing this based on some on chain analytics as well. So overall what we've learned is that we knew this was likely sophisticated, but it was sophisticated to the degree of a nation state actor using proxies, using in person communications from people that didn't appear to be North Korean, even though this seems likely that that was the attacker. So in short, it means that like okay, we have nation state level attackers and very sophisticated in person intelligence operations targeting crypto companies like Drift. And the feedback that we're getting from the community of like other security professionals is basically okay, this seems like something that other teams are likely being targeted with like at this moment it's very likely, like Drift is not the only one and we have to consider like who else might be maybe not compromised but at least being targeted and needs to increase the level of protections they have. So I think that's like the big takeaway is realizing like this is serious and you know, one month to the day from the Bybit hack, it feels like the intensity of attacks on crypto is, is increasing, not decreasing.
