Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
#DriftProtocolHacked
$286 million gone in 12 minutes. Not because the smart contracts were buggy. Not because someone forgot to patch a dependency. Because humans trusted other humans, and one of those humans was playing a completely different game.
On April 1, 2026, Drift Protocol, a Solana-based perpetual futures exchange that at its peak held over $1.5 billion in total value locked, was emptied. The attack did not start that day. It started three weeks earlier, on March 23, when the attacker quietly created a set of durable nonce accounts on Solana. This detail matters enormously, because durable nonces are a legitimate, intended Solana feature that allows transactions to be pre-signed and executed later, with no expiration. The attacker used this feature as a weapon.
The mechanics of what happened next were methodical and cold. The Drift Security Council operates as a multisig, meaning multiple signers must approve administrative changes before they take effect. This is standard practice in DeFi and is designed to be a safeguard. The attacker social-engineered at least two of the five council members into pre-signing transactions that appeared routine. The signers likely believed they were authorizing something ordinary, perhaps part of the planned multisig migration that occurred on March 27. They were not. They were pre-signing the protocol's death warrant, set to execute on a timer.
On April 1, the sequence was triggered. A small test withdrawal went through first, confirming the pre-signed administrative transactions would execute. Four Solana slots later, approximately 1.6 seconds in real time, admin control was seized. What followed was systematic: CVT tokens, which the attacker had manufactured and listed as valid collateral within the protocol's risk engine, were deposited. The engine, following its own rules, issued real assets against this fake collateral. Over 20 vaults were drained across roughly 12 minutes. USDC, wrapped Bitcoin, JLP tokens, and SOL flowed out.
The stolen funds crossed to Ethereum. On April 3, Drift posted on-chain messages to four Ethereum wallet addresses holding the proceeds, inviting negotiation. Blockchain analytics firm Elliptic noted suspected DPRK links, a pattern consistent with Lazarus Group operations that have netted North Korea an estimated $2 billion or more in crypto thefts over the past several years, funds that intelligence agencies believe finance weapons programs and sanctions evasion.
At the time of attack, Drift's TVL collapsed from $1.5 billion to $247 million. The DRIFT governance token fell to an all-time low of $0.040, down more than 41% in 24 hours. Users of dependent protocols, including Pyra and Carrot, found themselves locked out of funds with no timeline for resolution.
Several things deserve to be said plainly about what this event reveals.
First, the weakest link in DeFi security is still human. Smart contract audits, formal verification, bug bounty programs, all of it becomes secondary when the people holding signing keys can be deceived into using them. Social engineering is not exotic; it is the oldest attack vector in existence. The industry continues to under-invest in operational security training for the actual humans who hold administrative access.
Second, multisig governance structures are not as safe as the community assumes when the signing process is conducted remotely and asynchronously. A signer who reviews a transaction on their own screen, without real-time coordination with co-signers, without independent verification of what each transaction actually does on-chain, is a vulnerability, not a safeguard. The durable nonce mechanism amplified this because it decoupled the moment of signing from the moment of execution. Signers had no reason to believe their approved transactions would execute weeks later in a different context.
Third, the use of fake collateral to drain a lending protocol is not a new technique. What made this version sophisticated was the access required to list the collateral in the first place. This was not a price oracle manipulation. This was not a flash loan attack. This required administrative credentials that the attacker patiently constructed over weeks. That patience is itself a signal pointing toward state-level actors, who operate on timelines and with resources that purely profit-motivated criminal groups rarely sustain.
Fourth, the speed of drain, $286 million across 20+ vaults in 12 minutes, highlights how irreversible Solana's execution model is once a sequence begins. There was no circuit breaker that triggered fast enough. There was no time for a human to intervene. The protocol's own speed, one of its marketed advantages, became the attacker's operational advantage.
What happens from here tends to follow a predictable DeFi trauma script. A post-mortem is published. Compensation is discussed and debated. Some users recover partial funds. The DRIFT token stabilizes at a new, lower baseline. Competing protocols absorb displaced liquidity. The industry takes notes, updates its multisig procedures for a few months, and then the urgency fades.
The harder question is whether decentralized governance at this asset scale is structurally compatible with the security practices required to protect retail depositors. When $285 million of user funds can be emptied because two out of five humans made a mistake under social pressure, the decentralization was always partial. The risk was never distributed. It was concentrated in a Security Council that most depositors probably did not know existed, whose members they could not vet, and whose signing procedures they had no visibility into.
That is not a criticism specific to Drift. It is the condition of almost every significant DeFi protocol operating today.