From an on-chain outreach to cross-chain fund movements, this piece analyzes the drift exploit and its governance implications for DeFi.From an on-chain outreach to cross-chain fund movements, this piece analyzes the drift exploit and its governance implications for DeFi.

Drift exploit prompts on-chain outreach to $280M stolen ETH after Solana–Ethereum attack

2026/04/03 17:07
6분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다
drift exploit

In the wake of a major DeFi attack, Drift Protocol has begun direct outreach over the drift exploit as investigators trace funds across multiple blockchains.

Drift targets hacker wallets with on-chain messages

On April 3, Drift Protocol escalated its response to the recent hack by sending on-chain messages to four Ethereum wallets holding the bulk of the stolen assets. According to blockchain data, these addresses together control roughly 129,000 ETH, tied to what has become one of the largest DeFi exploits of 2026.

The exploit drained an estimated $270 million to $285 million from the protocol, severely disrupting trading and liquidity conditions. However, the team now claims to have identified key parties linked to the incident and is publicly urging them to open a dialogue rather than remain silent.

The outreach was made from a known Drift-controlled address, which transmitted a standardized message to each of the four target wallets. Moreover, the move signals that the protocol is willing to explore negotiated resolutions, a path other crypto projects have taken in previous large-scale thefts.

Message calls for communication via Blockscan chat

The content of the message was concise. Drift told the wallet owners it is “ready to speak” and requested that they respond using Blockscan chat, an off-chain communication tool linked to Ethereum addresses. This mirrors prior cases where attacked projects sought to open a communication channel with hackers.

Historically, such efforts have produced mixed outcomes. In some high-profile hacks, dialogue led to partial or even full recovery of assets, sometimes under the label of a “white-hat” arrangement. That said, in other situations, attackers ignored messages and continued moving funds, leaving victims with little hope of restitution.

In this case, security teams and on-chain analytics providers are also examining whether the theft and subsequent transfers show patterns associated with organized cybercrime. However, any potential attribution remains unconfirmed, and the focus for now is on tracking flows and preserving evidence.

How the attack bypassed smart contracts

The drift exploit stands out because it did not rely on a traditional smart contract bug. Instead, it exploited a system-level weakness around Solana durable nonces, a legitimate feature that lets developers prepare and sign transactions in advance for later submission.

The attacker used pre-signed transactions that had been created weeks earlier, then managed to obtain partial control over the protocol’s multisig governance setup. With that influence, they disabled or bypassed several risk controls designed to protect user funds. Consequently, once safeguards were weakened, the hacker could drain capital from multiple vaults in rapid succession.

The entire operation unfolded quickly, resulting in the loss of more than half of Drift Protocol’s total value locked. Moreover, the event underscores how governance design and key management can be as critical as contract code in safeguarding DeFi platforms.

Cross-chain transfers and stolen ETH concentration

After emptying the vaults, the attacker did not leave the assets on Solana. Instead, they used cross-chain infrastructure to move the funds to Ethereum, converting a large share into ETH. On-chain data, highlighted by analytics firms like Arkham, shows approximately 129,000 ETH now distributed across four key wallets.

This pattern fits a broader trend where attackers use cross chain bridged funds to complicate tracking and recovery. However, such moves also create highly visible concentrations of value that can be watched in real time by exchanges, law enforcement, and independent researchers.

Despite active monitoring, there has been criticism from some community members over what they view as a slow operational response. Specifically, users have questioned why certain tokens or positions were not frozen sooner or hedged more aggressively once anomalous governance activity was detected.

Organized crime suspicions and ongoing investigation

Several industry observers have speculated about possible links between the attacker and known cybercrime organizations, especially given the sophistication of the governance take-over and transaction planning. That said, public statements from Drift and external security teams emphasize that there is no definitive attribution yet.

Law enforcement and private incident response groups are reportedly coordinating to follow the blockchain on chain message trail and the flows of the stolen ETH. Moreover, investigators are examining historical activity on the impacted wallets to see whether older transactions connect to previously flagged entities.

For now, Drift has committed to releasing more information once third-party audits and forensic reviews are complete. The protocol’s social channels, including its official X account, have been used to aggregate updates and reference key on-chain transactions for the community.

Impact on Drift, DRIFT token, and DeFi liquidity

The fallout extends beyond the protocol’s immediate losses. Recent data indicates that nearly 20 interconnected DeFi projects suffered knock-on effects from the incident. Some protocols temporarily paused services or restricted certain operations to prevent potential contagion and manage defi liquidity impact.

The native DRIFT token reacted sharply, posting a steep decline as news of the exploit and governance compromise spread. Market confidence in leverage and derivatives products on Solana also took a hit, reflecting broader risk reassessments by professional and retail traders alike.

However, it is important to note that Solana’s base layer continues to function normally. The breach occurred at the application and governance level, not due to a consensus or protocol failure. This distinction matters for long-term ecosystem perception and for investors evaluating smart contract risk.

Lessons for governance and security design

The attack highlights how even well-reviewed code can be undermined by weaknesses in governance structures, key sharing, and operational processes. In this case, the partial multisig governance compromise enabled the attacker to weaponize previously signed transactions and legitimate protocol features.

Security experts argue that more robust key rotation policies, tighter access controls, and real-time monitoring of governance actions could have limited the damage. Moreover, clearer incident playbooks and automated circuit breakers might help protocols react faster when abnormal changes in permissions or vault behavior occur.

As the investigation into the Drift Protocol exploit continues, the case is likely to become a reference point for risk frameworks and security reviews across DeFi. In summary, the incident underlines that code audits alone are not enough; resilient governance, key management, and cross-chain monitoring are essential to prevent similar large-scale losses.

시장 기회
Drift Protocol 로고
Drift Protocol 가격(DRIFT)
$0.0481
$0.0481$0.0481
+7.12%
USD
Drift Protocol (DRIFT) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!