top of page

Drift's $285 Million Durable Nonce Hack: DPRK-Linked Social Engineering Attack Raises Questions About Protocol Security

  • Apr 3
  • 3 min read

Key Findings


  • Drift Protocol, a Solana-based decentralized exchange, lost approximately $285 million on April 1, 2026 in a sophisticated social engineering attack

  • Attackers exploited durable nonce mechanisms to obtain unauthorized multisig approvals and gain control of the Security Council administrative powers

  • The attack involved multi-week preparation starting as early as March 23, 2026, with staged execution and pre-signed transactions

  • Threat actors created a fictitious asset called CarbonVote Token to manipulate oracle pricing and drain funds

  • Blockchain intelligence firms Elliptic and TRM Labs attribute the attack to North Korean threat actors, consistent with DPRK tradecraft

  • No smart contract vulnerability or compromised seed phrases were involved; the breach stemmed entirely from social engineering and permission layer exploitation


Background


Drift Protocol is an exchange-grade composite DeFi platform on Solana that launched in 2021. By 2024, it had accumulated over $350 million in total value locked, served more than 175,000 traders, and generated $20 billion in cumulative trading volume. The protocol combines perpetuals trading, spot trading, and lending functions. In September 2024, Drift completed a $25 million Series B funding round, bringing total funding to $52.5 million. The platform had implemented multiple safeguards against price manipulation, including oracle validity checks, TWAP trimming, price-deviation bands, and circuit breakers designed to restrict actions when oracle prices became invalid.


The Attack Mechanism


The breach exploited the permission layer rather than the underlying smart contracts. Attackers obtained sufficient multisig approvals through sophisticated social engineering, then executed a malicious admin transfer within minutes to seize protocol-level control. With administrative access, they modified risk parameters that were supposed to protect the protocol. The attackers then introduced a fictitious asset called CarbonVote Token, seeding it with a few thousand dollars and engaging in wash trading to inflate its perceived legitimacy. Drift's oracles treated the token as legitimate collateral worth hundreds of millions of dollars, enabling the massive fund drain.


Preparation and Execution Timeline


According to Drift's investigation, preparations began as early as March 23, 2026, nearly a week before the actual attack. The operation employed durable nonce accounts to pre-sign transactions whose execution was delayed, allowing attackers to stage their approach carefully. This multi-week preparation phase enabled the threat actors to conduct reconnaissance, identify targets within the multisig structure, and craft convincing social engineering narratives. The actual exploitation occurred rapidly once the necessary approvals were obtained, with the attacker removing all pre-set withdrawal limits and introducing the malicious asset to facilitate the fund transfer.


North Korean Attribution


Both Elliptic and TRM Labs identified on-chain indicators linking the attack to North Korean threat actors. Evidence includes the use of Tornado Cash for initial staging, cross-chain bridging patterns consistent with DPRK actors, and the speed and scale of post-hack laundering matching previous North Korean operations like the 2025 Bybit exploit. TRM Labs noted that the CarbonVote Token was deployed at 09:30 Pyongyang time, a telling detail. If confirmed, Elliptic stated this would represent the eighteenth DPRK-linked attack it has tracked since the start of 2026, with over $300 million stolen to date.


Broader DPRK Crypto Campaign


The Drift attack is part of a sustained, well-resourced DPRK campaign to fund weapons programs. Elliptic estimates North Korean actors have stolen over $6.5 billion in cryptoassets in recent years, with 2025 representing a record $2 billion take. Approximately $1.46 billion of the 2025 total came from the Bybit hack alone. The primary attack vector remains social engineering, with campaigns tracked as DangerousPassword, CageyChameleon, CryptoMimic, CryptoCore, and Contagious Interview. As of late February 2026, these twin campaigns had generated $37.5 million for the threat actors. The escalating sophistication of social engineering techniques, amplified by AI refinement capabilities, poses an expanding threat to individual developers, project contributors, and anyone with access to cryptoasset infrastructure.


Ongoing Investigation and Response


Drift is coordinating with multiple security firms to determine how the attack succeeded despite existing safeguards. The company is also working with bridges, exchanges, and law enforcement to trace and freeze stolen assets. All assets deposited into Drift's lending module, vaults, and trading accounts have been affected. Unaffected assets include DSOL tokens not deposited into Drift, assets staked to the Drift Validator, and insurance fund assets. Drift has suspended deposits and withdrawals while the investigation continues.


Sources


  • https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html

  • https://wublock.substack.com/p/drift-loses-285-million-did-hackers

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page