Drift Protocol's treasury was recently compromised, with the suspected attacker's address (HkG…ZES) identified by developer aryan from SendAI. This address, inactive for a long period, received funds via Near Intents eight days prior to the theft and then suddenly acquired a large sum from the Drift treasury. The funds were subsequently transferred or exchanged to multiple addresses suspected of being involved in money laundering, which had received funding through Backpack the previous day. The laundered funds were then moved cross-chain to an Ethereum address via Wormhole. This Ethereum address is suspected to have previously been funded by Tornado Cash, a known privacy tool often associated with obfuscating transaction origins.