Ledger CTO: The Drift attack method is similar to the Bybit hacking incident, and the attacker may be a North Korean hacker
Ledger's Chief Technology Officer Charles Guillemet stated that the attack method used in the Drift Protocol exploit is similar to the 2025 Bybit hacking incident, which is widely believed to be linked to North Korean hackers.
Guillemet pointed out that this attack did not target any smart contracts; instead, the attackers infiltrated the devices of multi-signature signers over a long period, tricking them into approving malicious transactions. The signers may have always thought they were authorizing legitimate operations. He emphasized that the root of the problem lies in the lack of security at the personnel and operational levels, rather than in the code itself.
You may also like

Why is a16z Crypto raising another $2.2 billion to heavily invest in Web3?

Polymarket Underlying Algorithm Explained

What do projects born in the crypto bear market do?

a16z founder's Stanford lecture: Whenever Wall Street and Silicon Valley have different ideas, it's Wall Street that ends up being wrong

Michael Saylor: After three consecutive quarters of losses, Strategy will sell Bitcoin to pay dividends

The toll station at Hormuz and the RMB that cannot be bought

Interview with Coinbase Institutional's Strategic Head: The Institutionalization of Crypto Reaches a Critical Point

Dialogue with Agora CEO Nick: The battle for stablecoin licenses has just begun

Morning Report | a16z Crypto completes $2.2 billion fundraising for its fifth fund; Bullish invests $4.2 billion to acquire share transfer agency Equiniti; PayPal's Q1 performance exceeds expectations

a16z Crypto: What We See Behind the $2.2 Billion New Fund

Web3 is dead, Web2+3 should rise

Stablecoins and Latin American Remittances: The Misunderstood $174 Billion Market

The arrival of the Web 3.0 era: A review of Hong Kong court rulings on digital assets

Track Markets At a Glance: New WEEX Price Widgets for iOS & Android
To streamline your market data access, WEEX has officially launched "Market Watchlist" desktop widgets

The billion-dollar lesson: The focus of DeFi security is shifting from code to operational governance

A Brief Analysis of Stablecoin Licenses and On-Chain Funding

BVNK Founder: Three Stages of Stablecoin Development


