Solana-based Drift Protocol has suffered the biggest exploit of 2026 so far, shedding almost $300 million in a “extremely subtle operation” that has raised issues in regards to the rising menace of human-targeted assaults within the crypto area.
Associated Studying
Solana DEX Loses $285M On April Idiot’s Day
On Wednesday, Solana-based decentralized change (DEX) Drift Protocol was the sufferer of an exploit that stole a whole bunch of hundreds of thousands of {dollars} from its vaults. After on-line reviews flagged uncommon on-chain exercise yesterday afternoon, Drift’s official channels confirmed the assault, rapidly suspending deposits and withdrawals.

In accordance with reviews, the assault lasted lower than 20 minutes and stole round $285 million in a number of belongings, together with USDC, JPL, USDT, JUP, USDS, WBTC, and WETH, from almost 20 vaults. This marks the biggest crypto exploit of 2026 so far, and one of many largest hacks within the trade, simply above WazirX’s $235 million hack.
The hack worn out half of the Solana-based mission’s whole worth locked (TVL), which fell from roughly $550 million to $252 million, per DeFiLlama knowledge. Drift protocol’s token, DRIFT, additionally plunged, retracing almost 40% over the previous 24 hours.
Inside hours, the exploiter had swapped $270.9 million into USDC, bridged them from Solana to Ethereum through the CCTP TokenMessengerMinterV2, and bought 129,000 ETH, splitting them throughout a number of wallets.
In a Thursday publish, Drift shared the main points of the incident, affirming that “a malicious actor gained unauthorized entry to Drift Protocol by means of a novel assault involving sturdy nonces, leading to a fast takeover of Drift’s Safety Council administrative powers.”
Solana’s sturdy nonces are a complicated mechanism that permits transactions to bypass the standard quick expiration date of standard transactions. This permits customers to pre-sign transactions for future execution, offline signing, or advanced multisig workflows.
“This was a extremely subtle operation that seems to have concerned multi-week preparation and staged execution, together with using sturdy nonce accounts to pre-sign transactions that delayed execution,” the publish continued.
Malicious Actors Concentrating on People, Not Good Contracts
The Solana-based DEX emphasised that the exploit was not the results of a bug in Drift’s applications or good contracts, noting that they discovered no proof of compromised see phrases both.
“The assault concerned unauthorized or misrepresented transaction approvals obtained previous to execution, probably facilitated by means of sturdy nonce mechanisms and complex social engineering,” the mission underscored.
Lily Liu, President of the Solana Basis, addressed the incident, asserting that it’s a blow to the entire Solana ecosystem. Liu identified that “Good contracts held up. The actual targets now are people: social engineering and opsec weaknesses greater than code exploits.”
Associated Studying
Ledger CTO Charles Guillemet linked Drift’s assault methodology to Bybit’s $1.4 billion hack, which was attributed to North Korean hacking teams. As he defined, the attackers probably compromised a number of machines belonging to multisig signers by means of long-term infiltration and misled operators into approving the malicious transactions.
This modus operandi is just like the Bybit hack final yr, broadly attributed to DPRK-linked actors. The sample is turning into acquainted: affected person, subtle supply-chain-level compromise focusing on the human and operational layer, not the good contracts themselves.
Guillemet affirmed that the incident is “one more wake-up name for the trade” to lift the bar on safety. “Finally, safety is not only about code audits. It’s about giving operators and customers the correct data on the proper time, to allow them to make knowledgeable selections about what they signal,” he concluded.

Featured Picture from Unsplash.com, Chart from TradingView.com


