A Hack Built Over Weeks, Executed in Minutes
On April 1, 2026, Drift Protocol, one of the largest decentralized perpetuals exchanges on Solana, lost approximately $285 million in user funds. The attack did not exploit a bug in Drift’s smart contracts. No seed phrase was compromised. What failed was governance, and the failure had been quietly engineered over ten days before anyone noticed.
According to Drift’s own post-incident timeline, the attacker spent the week of March 23 to March 30 creating durable nonce accounts linked to members of Drift’s Security Council, a 2-of-5 multisig that controlled administrative permissions over the protocol. By exploiting a planned council migration on March 27, the attacker effectively inserted two compromised signers into the updated multisig configuration, meeting the threshold required to authorize an admin transfer.
On April 1 at approximately 16:05 UTC, a routine test withdrawal from the insurance fund gave the attacker the final confirmation they needed. Within minutes, two pre-signed durable nonce transactions executed four slots apart, handing them full administrative control of Drift’s protocol state. What followed took roughly 12 minutes: a fake token (CVT) was listed as a valid market, withdrawal limits were removed, and 31 rapid transactions drained real user collateral, including USDC, SOL, wrapped BTC, JLP, and JTO.
According to DefiLlama, Drift’s total value locked collapsed from approximately $550 million to under $250 million within hours. It is the largest DeFi hack of 2026 to date and the second-largest exploit in Solana‘s history, behind the $326 million Wormhole bridge incident in 2022.

Table 1 — Drift Protocol Exploit: Attack Timeline
| Event / Date | What Happened | Impact |
|---|---|---|
| March 23 | Attacker creates 4 durable nonce accounts; 2 linked to Drift Security Council members | Silent pre-positioning begins |
| March 27 | Drift executes planned Security Council migration (member change) | Attack window opens |
| March 30 | New durable nonce created for updated multisig member; attacker controls 2/5 signers | Threshold reached for exploit |
| April 1, 16:05 UTC | Test withdrawal from insurance fund triggers attack; admin transfer executed in 2 transactions, 4 slots apart | Full admin control seized |
| April 1, ~16:17 UTC | CVT fake token listed, withdrawal limits removed, 31 rapid drains executed | $285M drained in ~12 minutes |
| April 1–2 | Stolen assets swapped to USDC via Jupiter DEX, bridged to Ethereum via CCTP, converted to ETH | ~38,820 ETH ($82M+) acquired |
| April 2 | Elliptic flags DPRK indicators; ZachXBT criticizes Circle for 6-hour delay in freezing USDC | 18th DPRK-linked act of 2026 |
What Is a Durable Nonce and Why Did It Matter Here
On most blockchains, transactions expire if they are not submitted within a certain block window. Solana’s durable nonces solve this problem by allowing a transaction to be pre-signed offline and submitted at any future point, bypassing the usual expiration mechanism. The feature is legitimate and widely used for multisig workflows, cold wallet setups, and batch operations.
The problem is that pre-signed transactions can be created days in advance and stored, waiting for the right moment. In Drift’s case, the attacker pre-signed admin transfer transactions using compromised multisig approvals obtained before the exploit was triggered. By the time the test withdrawal on April 1 signaled the opportunity, the transactions were ready to execute immediately with no additional authorization required.
Security audits by Trail of Bits (2022) and ClawSecure (February 2026) both cleared Drift. Neither review flagged the governance configuration or the introduction of the CVT market as risks. The attack vector fell entirely outside standard smart contract auditing scope.

DPRK Indicators and the Circle Freeze Question
Blockchain analytics firm Elliptic published an analysis on April 2 identifying multiple indicators of North Korean state-sponsored involvement. The firm pointed to pre-positioned wallets created eight days before the exploit, a structured cross-chain laundering flow, and onchain behavior consistent with prior DPRK-attributed operations. If confirmed, Elliptic said this would represent the 18th DPRK-linked act it has tracked in 2026, with over $300 million stolen this year alone.
BitMEX co-founder and Drift Protocol advisor Arthur Hayes directed questions at Solana’s architecture, asking publicly whether native multisig addresses would have prevented the attack. Ledger CTO Charles Guillemet drew a direct comparison to the $1.4 billion Bybit hack of 2025, attributed by the FBI to North Korea’s Lazarus Group: compromised multisig signers, social engineering, and malicious transactions disguised as routine operations.
A separate controversy emerged around Circle, the issuer of USDC. After draining the protocol, the attacker rapidly swapped the stolen assets to USDC via Jupiter DEX, then bridged approximately $267 million to Ethereum using Circle’s Cross-Chain Transfer Protocol (CCTP). On-chain investigator ZachXBT noted that the bridging occurred over several hours during U.S. business hours, with Circle taking no action to freeze the funds.
“Circle was asleep while many millions in stolen USDC was swapped via CCTP from Solana to Ethereum for hours from the 9-figure Drift hack during US hours.” — ZachXBT, April 2, 2026
The criticism takes on added weight given that Circle had, days earlier, frozen 16 unrelated business hot wallets in a sealed U.S. civil case, demonstrating both the technical ability and regulatory willingness to act. Some industry observers noted the contrast points to a gap in GENIUS Act implementation: the stablecoin framework, now in effect, may not yet specify clear response obligations during active exploits.
What This Means for DeFi Governance
The Drift incident is the third major DeFi hack in early 2026 to stem from key management failures rather than contract logic. Step Finance lost $27.3 million in January following a device compromise. Resolv Labs lost $24.5 million in March after an AWS KMS breach. In each case, audits passed and code was clean.
The pattern points to a structural blind spot: the crypto industry has invested heavily in smart contract security while governance key hygiene has remained inconsistent. A 2-of-5 multisig controlling $550 million in TVL with no timelock, no circuit breaker, and no guardian pause mechanism created a single point of failure equivalent, as security firm NomosLabs put it, to a bank with one master key and no vault door.
For Solana’s broader DeFi ecosystem, the incident raised immediate questions about cross-chain transaction monitoring and the response obligations of centralized stablecoin issuers. Several protocols connected to Drift’s liquidity paused operations on April 1, and Wormhole warned that some Solana cross-chain transactions could face delays as security teams assessed exposure.
Drift has stated it is working on compensation mechanisms and a full forensic handoff to law enforcement. The team has asked all users to revoke protocol approvals pending further guidance. A detailed security report is expected in the coming days.


