Solana-based Drift Protocol has suffered the most important exploit of 2026 to this point, dropping almost $300 million in a “extremely refined operation” that has raised issues in regards to the rising menace of human-targeted assaults within the crypto house.
Associated Studying
Solana DEX Loses $285M On April Idiot’s Day
On Wednesday, Solana-based decentralized change (DEX) Drift Protocol was the sufferer of an exploit that stole a whole lot of tens of millions of {dollars} from its vaults. After on-line experiences flagged uncommon on-chain exercise yesterday afternoon, Drift’s official channels confirmed the assault, shortly suspending deposits and withdrawals.

In line with experiences, the assault lasted lower than 20 minutes and stole round $285 million in a number of belongings, together with USDC, JPL, USDT, JUP, USDS, WBTC, and WETH, from almost 20 vaults. This marks the most important crypto exploit of 2026 to this point, and one of many largest hacks within the business, simply above WazirX’s $235 million hack.
The hack worn out half of the Solana-based challenge’s whole worth locked (TVL), which fell from roughly $550 million to $252 million, per DeFiLlama knowledge. Drift protocol’s token, DRIFT, additionally plunged, retracing almost 40% over the previous 24 hours.
Inside hours, the exploiter had swapped $270.9 million into USDC, bridged them from Solana to Ethereum by way of the CCTP TokenMessengerMinterV2, and bought 129,000 ETH, splitting them throughout a number of wallets.
In a Thursday put up, Drift shared the small print of the incident, affirming that “a malicious actor gained unauthorized entry to Drift Protocol via a novel assault involving sturdy nonces, leading to a speedy takeover of Drift’s Safety Council administrative powers.”
Solana’s sturdy nonces are a sophisticated mechanism that permits transactions to bypass the standard brief expiration date of standard transactions. This permits customers to pre-sign transactions for future execution, offline signing, or complicated multisig workflows.
“This was a extremely refined operation that seems to have concerned multi-week preparation and staged execution, together with the usage of sturdy nonce accounts to pre-sign transactions that delayed execution,” the put up continued.
Malicious Actors Concentrating on People, Not Good Contracts
The Solana-based DEX emphasised that the exploit was not the results of a bug in Drift’s packages or good contracts, noting that they discovered no proof of compromised see phrases both.
“The assault concerned unauthorized or misrepresented transaction approvals obtained previous to execution, possible facilitated via sturdy nonce mechanisms and complicated social engineering,” the challenge underscored.
Lily Liu, President of the Solana Basis, addressed the incident, asserting that it’s a blow to the entire Solana ecosystem. Liu identified that “Good contracts held up. The actual targets now are people: social engineering and opsec weaknesses greater than code exploits.”
Associated Studying
Ledger CTO Charles Guillemet linked Drift’s assault technique to Bybit’s $1.4 billion hack, which was attributed to North Korean hacking teams. As he defined, the attackers possible compromised a number of machines belonging to multisig signers via long-term infiltration and misled operators into approving the malicious transactions.
This modus operandi is much like the Bybit hack final 12 months, broadly attributed to DPRK-linked actors. The sample is changing into acquainted: affected person, refined supply-chain-level compromise concentrating on the human and operational layer, not the good contracts themselves.
Guillemet affirmed that the incident is “yet one more wake-up name for the business” to boost the bar on safety. “Finally, safety isn’t just about code audits. It’s about giving operators and customers the suitable info on the proper time, to allow them to make knowledgeable selections about what they signal,” he concluded.

Featured Picture from Unsplash.com, Chart from TradingView.com
