TLDR: The attacker used durable nonce accounts to pre-sign transactions weeks before executing the $280M drain on Drift Protocol.  No smart contract bug was involvedTLDR: The attacker used durable nonce accounts to pre-sign transactions weeks before executing the $280M drain on Drift Protocol.  No smart contract bug was involved

Drift Protocol Loses $280M as Attacker Uses Durable Nonce Accounts to Seize Admin Control

2026/04/02 16:20
Okuma süresi: 3 dk
Bu içerikle ilgili geri bildirim veya endişeleriniz için lütfen crypto.news@mexc.com üzerinden bizimle iletişime geçin.

TLDR:

  • The attacker used durable nonce accounts to pre-sign transactions weeks before executing the $280M drain on Drift Protocol. 
  • No smart contract bug was involved — the breach relied on social engineering to obtain 2/5 multisig approvals in advance. 
  • Even after a Security Council migration on March 27, the attacker regained access to required signers within a short period. 
  • All borrow/lend balances, vault deposits, and trading funds were affected, while DSOL and Insurance Fund assets remained safe.

The Drift Protocol exploit has rattled the decentralized finance space, with attackers draining approximately $280 million from the platform. The breach involved a coordinated admin takeover rather than any smart contract vulnerability.

How the Attacker Gained Control of Drift’s Security Council

The attacker secured access to Drift’s Security Council admin using pre-signed transactions via durable nonce accounts.

This approach allowed transactions to be signed in advance and executed at a later time. There was no evidence of compromised seed phrases linked to the breach. The attack was not the result of any smart contract bug or exploit.

As early as March 23, multiple durable nonce accounts were established across multisig members and attacker-controlled wallets. This pointed to weeks of advance planning and careful staged execution before the attack was carried out.

The attacker likely obtained 2/5 multisig approvals through sophisticated social engineering tactics. Misrepresented transaction approvals are also considered a likely method used to gain those approvals.

On March 27, Drift carried out a Security Council multisig migration, apparently to address the existing security concerns. Shortly after, the attacker regained effective access to the required signers.

This showed that the compromise was persistent and extended well beyond the migration event. The migration did not successfully block the attacker’s ability to proceed with the plan.

According to initial findings shared by SolanaFloor, the attack was highly coordinated and involved weeks of preparation. On April 1, a legitimate insurance fund test transaction took place on the platform.

Just minutes later, two pre-signed nonce transactions were executed in rapid succession. This enabled a near-instant takeover of the protocol’s admin controls.

Withdrawal of Funds and Drift’s Ongoing Response

With full admin control secured, the attacker introduced a malicious asset into the protocol. Withdrawal limits were then removed, and protocol permissions were exploited to drain funds from users.

The total amount withdrawn reached approximately $280 million across the platform. All funds held in borrow/lend, vault deposits, and trading balances were affected by the drain.

Funds not deposited into Drift, including DSOL, were unaffected by the exploit. Insurance Fund assets are currently being moved to safer locations for protection.

All protocol functions have since been frozen to limit further damage. The compromised multisig wallet has also been removed to prevent continued access.

Drift is now actively working with security firms, bridges, and exchanges to trace the stolen assets. Law enforcement agencies have also been brought into the investigation.

The team is coordinating across multiple channels to explore potential recovery options. A full postmortem report is expected to be published in the near future.

No timeline has been shared by Drift for when platform operations might resume. The team confirmed that recovery coordination remains the current priority at this time.

Drift is also working with law enforcement to identify the individuals behind the attack. Further updates are expected as the investigation continues to develop.

The post Drift Protocol Loses $280M as Attacker Uses Durable Nonce Accounts to Seize Admin Control appeared first on Blockonomi.

Piyasa Fırsatı
Drift Protocol Logosu
Drift Protocol Fiyatı(DRIFT)
$0.0437
$0.0437$0.0437
-19.07%
USD
Drift Protocol (DRIFT) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen crypto.news@mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Sui’s Beep Wallet Unleashes AI Power: Agentic Trading Expands to 300+ Assets

Sui’s Beep Wallet Unleashes AI Power: Agentic Trading Expands to 300+ Assets

BitcoinWorld Sui’s Beep Wallet Unleashes AI Power: Agentic Trading Expands to 300+ Assets In a significant leap for decentralized finance, the Sui blockchain’s
Paylaş
bitcoinworld2026/04/03 02:10
Most Expensive NFT: Record-Breaking Digital Art Sales

Most Expensive NFT: Record-Breaking Digital Art Sales

Discover the most expensive NFT sales in history, from Pak’s "The Merge" to Beeple’s "Everydays." Learn what makes digital art valuable and how to start your NFT
Paylaş
Stealthex2026/04/03 03:19
CME Group to launch Solana and XRP futures options in October

CME Group to launch Solana and XRP futures options in October

The post CME Group to launch Solana and XRP futures options in October appeared on BitcoinEthereumNews.com. CME Group is preparing to launch options on SOL and XRP futures next month, giving traders new ways to manage exposure to the two assets.  The contracts are set to go live on October 13, pending regulatory approval, and will come in both standard and micro sizes with expiries offered daily, monthly and quarterly. The new listings mark a major step for CME, which first brought bitcoin futures to market in 2017 and added ether contracts in 2021. Solana and XRP futures have quickly gained traction since their debut earlier this year. CME says more than 540,000 Solana contracts (worth about $22.3 billion), and 370,000 XRP contracts (worth $16.2 billion), have already been traded. Both products hit record trading activity and open interest in August. Market makers including Cumberland and FalconX plan to support the new contracts, arguing that institutional investors want hedging tools beyond bitcoin and ether. CME’s move also highlights the growing demand for regulated ways to access a broader set of digital assets. The launch, which still needs the green light from regulators, follows the end of XRP’s years-long legal fight with the US Securities and Exchange Commission. A federal court ruling in 2023 found that institutional sales of XRP violated securities laws, but programmatic exchange sales did not. The case officially closed in August 2025 after Ripple agreed to pay a $125 million fine, removing one of the biggest uncertainties hanging over the token. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/cme-group-solana-xrp-futures
Paylaş
BitcoinEthereumNews2025/09/17 23:55

Trade GOLD, Share 1,000,000 USDT

Trade GOLD, Share 1,000,000 USDTTrade GOLD, Share 1,000,000 USDT

0 fees, up to 1,000x leverage, deep liquidity