Drift Loses $285 Million in Social Engineering Attack

Basically, Drift lost a lot of money because hackers tricked them into giving away access.
Drift, a Solana-based decentralized exchange, lost $285 million in a social engineering attack linked to North Korean hackers. This incident highlights the increasing sophistication of crypto theft tactics. Users are urged to monitor their accounts and stay informed about security measures being implemented.
What Happened
On April 1, 2026, Drift, a decentralized exchange built on the Solana blockchain, confirmed a staggering loss of $285 million due to a social engineering attack. The attackers executed a highly sophisticated operation that involved gaining unauthorized access to the Drift Protocol. This was achieved through a novel technique involving durable nonces, which allowed them to pre-sign transactions and delay execution, ultimately leading to a rapid takeover of the platform's administrative powers.
Who's Affected
The attack primarily affects users and investors of Drift, as the stolen funds represent a significant portion of the platform's assets. The incident raises concerns across the decentralized finance (DeFi) community, as it highlights vulnerabilities that can be exploited through social engineering rather than technical flaws in smart contracts or programs.
What Data Was Exposed
While there is no evidence of compromised seed phrases or direct vulnerabilities in Drift's smart contracts, the attackers managed to manipulate transaction approvals. They obtained sufficient multi-signature approvals to execute a malicious admin transfer, which allowed them to introduce a fictitious asset named CarbonVote Token. This token was treated as legitimate collateral worth hundreds of millions, despite being a manufactured asset with minimal initial liquidity.
What You Should Do
For users and investors, the first step is to monitor their accounts closely for any unauthorized transactions. Additionally, users should consider moving their assets to more secure platforms. Drift is currently working with security firms, exchanges, and law enforcement to trace and freeze the stolen assets. Users should stay informed about updates from Drift regarding the incident and any measures being implemented to enhance security.
The Threat
This incident is believed to be linked to North Korean threat actors, who have a history of orchestrating large-scale cryptoasset thefts. Reports from blockchain intelligence firms like Elliptic and TRM Labs indicate that the techniques used in this attack align with patterns previously attributed to North Korean hackers. The attack showcases how social engineering tactics can bypass traditional security measures in decentralized finance.
Tactics & Techniques
The attackers employed a combination of social engineering and technical manipulation to execute their plan. They misled multi-signature signers into pre-signing hidden authorizations, which allowed for a zero-timelock migration of the Security Council, effectively removing the last line of defense for the protocol. This method of attack is a reminder of the evolving landscape of cyber threats in the cryptocurrency space.
Defensive Measures
To safeguard against such attacks, organizations in the crypto space must enhance their security protocols. This includes regular audits of administrative access, educating users about social engineering tactics, and implementing multi-factor authentication wherever possible. The increasing sophistication of these attacks necessitates a proactive approach to security in the rapidly evolving DeFi landscape.