BTC
ETH
HTX
SOL
BNB
View Market
简中
繁中
English
日本語
한국어
ภาษาไทย
Tiếng Việt

In-Depth Restoration of Drift's $285 Million Hack: How Should DeFi Governance Move Beyond "Amateur Operations"?

BIT
特邀专栏作者
2026-04-13 11:54
This article is about 2248 words, reading the full article takes about 4 minutes
Contract security is no longer the biggest threat to DeFi; business governance and compliant operations cannot be neglected.
AI Summary
Expand
  • Core Viewpoint: The Solana ecosystem DeFi protocol Drift Protocol suffered a social engineering attack amounting to as much as $285 million due to governance and key management vulnerabilities. This incident exposed the severe inadequacies in the security architecture of the current DeFi industry when managing large funds and foreshadows a new security paradigm evolving towards hardware security, intent verification, and professional custody.
  • Key Elements:
    1. The attacker, by posing as a market maker, lurked for an extended period to gain trust and induced security committee members to "blind sign" a transaction transferring protocol control.
    2. The protocol had recently updated to a 2/5 multi-signature architecture and removed the timelock, allowing arbitrary instructions to be executed instantly with just two signatures, significantly lowering the attack threshold.
    3. The hacker, leveraging legitimately obtained administrator permissions, added fake tokens to the whitelist and manipulated oracle prices, "legitimately" borrowing treasury assets using worthless tokens as collateral.
    4. The incident exposed the fatal flaws of traditional multi-signature schemes: inability to defend against social engineering attacks and lack of risk verification mechanisms for transaction intent.
    5. Industry consensus points to the core directions for future security upgrades: adopting Hardware Security Modules (HSM), introducing intent-based policy engines, and entrusting fund custody to professional third-party institutions.

On April 1, 2026, Drift Protocol, the largest decentralized perpetual contract exchange on Solana, suffered an epic blow. Within just over ten minutes, a staggering $285 million worth of crypto assets were looted, marking the largest security incident in the DeFi space this year.

As on-chain data was meticulously dissected and security firms delved deeper, the full picture of this suspected APT attack, allegedly led by a North Korean hacker group, gradually came to light. What's lamentable is that what destroyed this billion-dollar DeFi fortress was not some ingenious zero-day exploit, but a meticulously planned, months-long social engineering hunt that preyed on human nature.

This disaster was not only Drift's darkest hour but also starkly exposed the "amateurish" state of current DeFi industry governance and key management.

A Long-Planned Hunt: How Did Drift Fall Step by Step?

Reviewing the hacker's attack path reveals an extremely meticulous, patient, multi-pronged coordinated operation. The attackers perfectly exploited the Web3 geek community's blind faith in "code is law" and their neglect of the "human" element as the weakest link.

Step 1: Infiltration Disguised as a "Market Maker"

As early as six months before the incident, the attackers posed as a well-funded quantitative trading firm. They not only socialized with Drift's core team at major crypto summits but also genuinely deposited millions of dollars into the protocol. By participating in product testing and offering high-quality strategic suggestions, the hackers successfully infiltrated Drift's internal communication groups, building fatal trust.

Step 2: Planting a Time Bomb Using "Durable Nonces"

After gaining the trust of core contributors, the hackers began exploiting Solana's unique "Durable Nonces" mechanism. This mechanism allows transactions to be signed offline in advance and broadcast for execution at any future time. Through clever rhetoric and disguised testing needs, the hackers induced members of Drift's security committee to perform "Blind Signing" on several seemingly ordinary transactions. The real payload of these transactions was to transfer the highest control authority of the protocol administrator (Admin).

Step 3: The Fatal 2/5 Multisig and Zero Timelock

On March 27, Drift implemented a fatal governance update: migrating the security committee to a new 2/5 multisig architecture and removing the timelock. This meant that with just two signatures, any instruction to modify the protocol's underlying logic would be executed instantly, leaving no reaction time to even "pull the plug."

Step 4: The Mirage-like "Fake Coin" ATM

On April 1, the hackers simultaneously detonated all their deployments. They broadcast the multisig instructions obtained in advance, instantly seizing the protocol's Admin authority. Subsequently, the hackers added a fake token named CVT (CarbonVote Token) to the whitelist and maxed out its borrowing limit. Coupled with oracle price manipulation, the hackers used a pile of worthless tokens as collateral to "legitimately borrow" $285 million worth of USDC, SOL, and ETH from Drift's treasury.

Legitimate Signature ≠ Legitimate Intent: The Achilles' Heel of DeFi Security

What feels most powerless in the Drift incident is this: in the eyes of the blockchain virtual machine, every step the hackers took was "legitimate." They didn't exploit overflow vulnerabilities or reentrancy attacks; they simply obtained legitimate admin keys and then walked openly into the vault.

This exposes a massive misalignment in current DeFi protocol fund management: using retail-level tools designed for managing a few hundred dollars to manage institutional-level treasuries worth hundreds of millions.

Currently, most mainstream DeFi protocols still heavily rely on traditional smart contract-based multisignature wallets (like Safe or native multisig mechanisms). This architecture has two fatal flaws:

  1. Vulnerable to Social Engineering: The defense collapses as soon as hackers compromise (via phishing, coercion, or bribery) a few key individuals holding private keys.
  2. Lack of Intent Verification: Multisig only verifies "whether these specific people signed," but not "whether what they signed is a contract selling themselves into slavery."

From Geek Experiment to Financial Infrastructure: The Inevitable Evolution of Web3 Security

Drift's $285 million loss bought an extremely expensive lesson: as Web3 accelerates its integration with traditional finance, DeFi protocols must abandon governance models that rely solely on developer self-discipline and simple multisig, and move towards institutional-grade security standards.

Currently, leading industry players and security observers have reached a consensus. The next security iteration for DeFi infrastructure must include upgrades in the following core dimensions:

Upgrading the Cryptographic Foundation: Moving Towards HSM (Hardware Security Module)

Compared to the software aggregation of multisig, HSM stores a protocol's private keys within certified, military-grade encrypted chips from which the keys cannot be exported. This hardware-level physical isolation and security control fundamentally eliminates risks arising from social engineering attacks on insiders or device compromise, providing vault security far superior to traditional multisig.

Introducing an "Intent-Based" Policy Engine

Future DeFi management permission approvals cannot remain solely at the "signature verification" stage. Systems need built-in risk control logic. For example, when a transaction attempts to modify the borrowing limit of an unknown token (like CVT in the Drift case) to unlimited, the policy engine should automatically recognize its anomalous intent, trigger a circuit breaker, and mandate higher-level verification (such as multi-tiered manual risk control, video verification, or enforced timelocks).

Embracing Independent, Compliant Custodial Power

As TVL continues to swell, protocol developers should focus their energy on code logic and business innovation, while entrusting the control and security defense of billion-dollar treasuries to professional third-party compliant custodians. Just as in traditional finance, exchanges don't keep user assets in the CEO's personal safe. Introducing institutional-grade risk control processes with strong offensive and defensive capabilities, and which are audited, is a necessary path for DeFi's journey towards mass adoption.

As advocated by institutional service providers like Cactus Custody, which have long been deeply involved in digital asset security: DeFi's decentralization should not be an excuse to evade systemic risk control.

The Drift hack may be a watershed moment. It declares the bankruptcy of "amateurish" governance and heralds the arrival of a new security paradigm centered on hardware architecture, intent verification, and professional custody. Only by fortifying this line of defense can Web3 truly bear the weight of a trillion-dollar future.

Safety
Welcome to Join Odaily Official Community