Solana-based Drift Protocol has suffered the most important exploit of 2026 thus far, shedding practically $300 million in a “extremely refined operation” that has raised considerations concerning the rising menace of human-targeted assaults within the crypto area.
Associated Studying
Solana DEX Loses $285M On April Idiot’s Day
On Wednesday, Solana-based decentralized alternate (DEX) Drift Protocol was the sufferer of an exploit that stole a whole bunch of hundreds of thousands of {dollars} from its vaults. After on-line experiences flagged uncommon on-chain exercise yesterday afternoon, Drift’s official channels confirmed the assault, rapidly suspending deposits and withdrawals.
In response to experiences, the assault lasted lower than 20 minutes and stole round $285 million in a number of belongings, together with USDC, JPL, USDT, JUP, USDS, WBTC, and WETH, from practically 20 vaults. This marks the most important crypto exploit of 2026 thus far, and one of many largest hacks within the trade, simply above WazirX’s $235 million hack.
The hack worn out half of the Solana-based venture’s complete worth locked (TVL), which fell from roughly $550 million to $252 million, per DeFiLlama information. Drift protocol’s token, DRIFT, additionally plunged, retracing practically 40% over the previous 24 hours.
Inside hours, the exploiter had swapped $270.9 million into USDC, bridged them from Solana to Ethereum through the CCTP TokenMessengerMinterV2, and bought 129,000 ETH, splitting them throughout a number of wallets.
In a Thursday submit, Drift shared the small print of the incident, affirming that “a malicious actor gained unauthorized entry to Drift Protocol by a novel assault involving sturdy nonces, leading to a fast takeover of Drift’s Safety Council administrative powers.”
Solana’s sturdy nonces are a sophisticated mechanism that enables transactions to bypass the everyday brief expiration date of normal transactions. This allows customers to pre-sign transactions for future execution, offline signing, or complicated multisig workflows.
“This was a extremely refined operation that seems to have concerned multi-week preparation and staged execution, together with using sturdy nonce accounts to pre-sign transactions that delayed execution,” the submit continued.
Malicious Actors Concentrating on People, Not Sensible Contracts
The Solana-based DEX emphasised that the exploit was not the results of a bug in Drift’s applications or good contracts, noting that they discovered no proof of compromised see phrases both.
“The assault concerned unauthorized or misrepresented transaction approvals obtained previous to execution, seemingly facilitated by sturdy nonce mechanisms and complicated social engineering,” the venture underscored.
Lily Liu, President of the Solana Basis, addressed the incident, asserting that it’s a blow to the entire Solana ecosystem. Liu identified that “Sensible contracts held up. The actual targets now are people: social engineering and opsec weaknesses greater than code exploits.”
Associated Studying
Ledger CTO Charles Guillemet linked Drift’s assault technique to Bybit’s $1.4 billion hack, which was attributed to North Korean hacking teams. As he defined, the attackers seemingly compromised a number of machines belonging to multisig signers by long-term infiltration and misled operators into approving the malicious transactions.
This modus operandi is just like the Bybit hack final yr, broadly attributed to DPRK-linked actors. The sample is turning into acquainted: affected person, refined supply-chain-level compromise concentrating on the human and operational layer, not the good contracts themselves.
Guillemet affirmed that the incident is “yet one more wake-up name for the trade” to boost the bar on safety. “In the end, safety isn’t just about code audits. It’s about giving operators and customers the fitting info on the proper time, to allow them to make knowledgeable selections about what they signal,” he concluded.

Featured Picture from Unsplash.com, Chart from TradingView.com












