Litecoin

Drift, $285 million blackout: How does DeFi go about saying goodbye to the "grasshouse team"

2026/04/14 02:09
👤ODAILY
🌐en

Contractual security is no longer the greatest threat to DeFi, and operational governance and compliance cannot be neglected。

Drift, $285 million blackout: How does DeFi go about saying goodbye to the "grasshouse team"

On April 1, 2026, Solana's largest eco-decent contract exchange, Drift Protocol, was hit by epicism. In just a dozen minutes, $285 million of encrypted assets were looted, creating the largest security incident in the DeFi field since this year。

The whole picture of the APT attack, which appears to have been led by the Korean hacker organization, has gradually surfaced with the deep involvement of the chain of data ripples and security agencies. It is shameful that the destruction of the hundreds of millions of dollars of DeFi fortress was not a perfect zero-day loophole (0-day), but a months-long, direct-on-human social engineering hunt。

The disaster was not just a dark moment for Drift, but even more the current DeFi industry’s “grass table” pants on governance and key management。

How did Drift fall

A repeat hacking path, we will find it an extremely tight, very patient multi-line operation. The attackers made perfect use of the blind self-confidence of the Web3 extremist community in the “code is the law” and the weakest neglect of the “person”。

Step one: the lurking in a "marketer" suit

Already in the first half of the year of the incident, the attackers were disguised as a well-funded quantitative trading agency. Not only did they replace the Drift core team at the major encryption summits, they actually deposited millions of dollars in the agreement. Through participation in product testing and high-quality strategic advice, hackers have successfully infiltrated the Drift internal communication community to build fatal trust。

Step 2: The time bomb is buried using a sustained random number

After gaining the trust of core contributors, hackers began to use the "Durable Nonces" mechanism unique to the Solana network. The mechanism allows transactions to be signed offline in advance and broadcast at any time in the future. The hackers induced the members of the Drift Security Committee to “blind signing” several seemingly ordinary transactions through clever words and disguised testing requirements. And the true Payload of these transactions is the highest control of the transfer agreement administrator (Admin)。

Step 3: Deadly 2/5 multiple signature and zero-time lock

On 27 March, Drift carried out a fatal governance update: the relocation of the Security Committee to a new 2/5 multi-sign structure and the removal of the Timelock. This means that with two signatures, any instruction to modify the bottom logic of the agreement will be executed instantaneously, without even the reaction time of the out-line。

Step four: City of the sea-like “false” money-calling machines

On 1 April, the hacker detonated all deployments simultaneously. They broadcast multiple signature instructions that had been fraudulently obtained in advance, indirectly and instantaneously regulated the agreement's Admin powers. Subsequently, hackers added a false token called CVT (CarbonVote Token) to the white list and fully capped their lending. In conjunction with the price manipulation of the prophecy machine, hackers used a bunch of acne as collateral to legally “borrow” $285 million of USDC, SOL and ETH from the Drift vault。

The signature is legal

In the Drift incident, the most debilitating thing is that in the eyes of the virtual machine of the block chain, hackers are “legal” at every step. They did not take advantage of the leaks, nor did they re-attack; they simply took the legitimate administrator key and then walked into the vault。

This exposes the huge misdirection of the current DeFi agreement on the management of funds: to manage hundreds of millions of dollars in bulk, to manage hundreds of millions of dollars in institutional-level treasury。

Currently, most mainstream DeFi agreements remain highly dependent on traditional multiple signatures based on smart contracts (e.g., Safe or original multiple signature mechanisms). There are two fatal flaws in this structure:

  1. Social engineering: As long as hackers handle a few key people with private keys (fishing, coercion or buying), the line breaks down。
  2. Lack of proof of intent: Signing more only to verify whether “it was signed by these persons” and not “it was signed by them or not”。

From the trials of the extremists to the financial infrastructure: Web3 The inevitable evolution of security

Drift's $285 million buys an extremely expensive lesson: With the accelerated integration of Web3 with traditional finance, the DeFi agreement must move away from a simple developmentist self-regulation and a simple multi-signature model of governance, aligning it with institutional safety standards。

At present, there is a consensus among industry heads and security observers that the next security phase of the DeFi infrastructure must include the following core dimensions:

UPGRADE OF THE PASSWORD BASE: TO HSM (HARDWARE SECURITY MODULE)

COMPARED TO MULTIPLE SOFTWARE AGGREGATIONS, HSM STORES THE PROTOCOL'S PRIVATE KEY IN A CERTIFIED, MILITARY-INDUSTRIALLY ENCRYPTED CHIP THAT CANNOT BE EXPORTED. THIS HARDWARE-GRADE PHYSICAL ISOLATION AND SECURITY CONTROL HAS FUNDAMENTALLY ELIMINATED THE RISKS ASSOCIATED WITH INTERNAL PERSONNEL SOCIO-ENGINEERING ATTACKS OR THE INVASION OF EQUIPMENT, AND HAS PROVIDED MUCH MORE THAN TRADITIONAL MULTIPLE KEY SECURITY FOR THE AGREEMENT VAULT。

Introduction of an “intent-based” strategy engine

The approval of the future DeFi regulatory authority cannot stop at the “signature authentication” stage. The system needs to incorporate a set of wind-control logics, such as: when a transaction attempts to change the borrowing ceiling of an unknown currency (e.g., the CVT in the Drift case) to an unlimited level, the strategic engine should be able to automatically recognize its unusual intent, trigger a melting mechanism and enforce verification of higher dimensions (e.g., multi-level artificial wind control, video authentication or mandatory time lock)。

Embracing independent compliance forces

With the expansion of TVL, protocol developers should concentrate on code logic and business innovation, leaving hundreds of millions of dollars of treasury control and security defense to professional third-party compliance custodians. As in traditional finance, the exchange does not place user assets in the owner ' s personal safe. The introduction of a robust and audited corporate-level wind control process is a necessary road to popularization for DeFi。

As advocated by institutional service providers like Cactus Custody, who have long-term deep-growing digital asset security: De-centreization of DeFi should not be an excuse to avoid systemic control。

Drift hacking may be a watershed. It declared bankruptcy of “grass table” governance and heralded the arrival of a new security paradigm centred on hardware architecture, intent on certification and professional trusteeship. Web3 can really carry trillions of the future if it is built。

QQlink

ไม่มีแบ็คดอร์เข้ารหัสลับ ไม่มีการประนีประนอม แพลตฟอร์มโซเชียลและการเงินแบบกระจายอำนาจที่ใช้เทคโนโลยีบล็อกเชน คืนความเป็นส่วนตัวและเสรีภาพให้กับผู้ใช้

© 2024 ทีมวิจัยและพัฒนา QQlink สงวนลิขสิทธิ์