Close Menu
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
What's Hot

Attorney Says Drift Protocol May Be Liable for Damages After Attack

April 5, 2026

Why the mind-bending physics of quantum computing is terrifying for bitcoin and crypto

April 5, 2026

Odds of a US Invasion of Iran Spike After Trump’s Threat of Escalation

April 5, 2026
Facebook X (Twitter) Instagram
Monday, April 6 2026
  • Contact Us
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms of Use
  • DMCA
Facebook X (Twitter) Instagram
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
StreamLineCrypto.comStreamLineCrypto.com

Attorney Says Drift Protocol May Be Liable for Damages After Attack

April 5, 2026Updated:April 6, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Attorney Says Drift Protocol May Be Liable for Damages After Attack
Share
Facebook Twitter LinkedIn Pinterest Email
ad


The hack of the Solana-based decentralized finance (DeFi) platform Drift Protocol might have been prevented if normal operational safety procedures have been adopted by the Drift group, and will represent “civil negligence,” in accordance with lawyer Ariel Givner.

“In plain phrases, civil negligence means they failed their fundamental obligation to guard the cash they have been managing,” Givner mentioned in response to the autopsy replace supplied by the Drift group and the way it dealt with Wednesday’s $280 million exploit.

The Drift group didn’t comply with “fundamental” safety procedures, together with preserving signing keys on separate, “air-gapped” programs which are by no means used for developer work, and conducting due diligence on blockchain builders met by way of trade conferences.

Attorney Says Drift Protocol May Be Liable for Damages After Attack
Supply: Ariel Givner

“Each critical undertaking is aware of this. Drift didn’t comply with it,” she mentioned, including, “They knew crypto is filled with hackers, particularly North Korean state groups.” Givner continued: 

“But their group spent months chatting on Telegram, assembly strangers at conferences, opening sketchy code repos, and downloading pretend apps on gadgets tied to multisignature controls.”

Ads for sophistication motion lawsuits towards Drift Protocol are already circulating, she mentioned. Cointelegraph reached out to the Drift Workforce however didn’t obtain a response by the point of publication.

Cybercrime, North Korea, Cybersecurity, Hacks, Lazarus Group
Supply: Ariel Givner

The incident is a reminder that social engineering and undertaking infiltration by malicious actors are main assault vectors for cryptocurrency builders that would drain consumer funds and completely erode buyer belief in compromised platforms.

Associated: Drift explains $280M exploit as critics query Circle over USDC freeze

Drift Protocol says assault took “months” of planning

The Drift Protocol group revealed an replace on Saturday outlining how the exploit occurred and claimed that the attackers deliberate the assault for six months earlier than execution.

Menace actors first approached the Drift group at a “main” crypto trade convention in October 2025, expressing curiosity in protocol integrations and collaboration.

The malicious actors continued to construct rapport with the Drift growth group within the ensuing six months, and as soon as sufficient belief was constructed, they started sending the Drift group malicious hyperlinks and embedding malware that compromised developer machines.

These people, who’re suspected of working for North Korea state-affiliated hackers and bodily approached the Drift builders, weren’t North Korean nationals, in accordance with the Drift group.

Drift mentioned, with “medium-high confidence,” that the exploit was carried out by the identical actors behind the October 2024 Radiant Capital hack.

In December 2024, Radiant Capital mentioned the exploit was carried out by way of malware despatched by way of Telegram from a North Korea-aligned hacker posing as an ex-contractor. 

Journal: Meet the hackers who might help get your crypto life financial savings again