Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

518+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Drift Loses $280 Million as Hackers Seize Security Council Powers
Drift Loses $280 Million as Hackers Seize Security Council Powers
NEWS

Drift Loses $280 Million as Hackers Seize Security Council Powers

The Drift Protocol DeFi platform lost at least $280 million after a sophisticated threat actor executed a planned governance attack, seizing control of the protocol's Security Council multisig to drain the treasury in one of the largest DeFi exploits of 2026.

Dylan H.

News Desk

April 2, 2026
6 min read

The Drift Protocol, a major decentralised perpetuals and spot trading platform built on Solana, has lost at least $280 million after a sophisticated threat actor executed a governance attack to seize control of the protocol's Security Council multisig — using those elevated administrative powers to drain the platform's treasury in one of the largest DeFi exploits of 2026.

The attack was first reported by BleepingComputer on April 2, 2026, based on on-chain analysis and official communications from the Drift team.

What Happened

The Drift Protocol uses a Security Council — a multisig wallet controlled by a designated group of trusted individuals — as an administrative backstop with elevated powers over the protocol. These powers exist to allow rapid emergency response to bugs or exploits, including the ability to pause contracts, adjust parameters, or move funds to safe custody.

In a planned and coordinated operation, a threat actor successfully compromised enough Security Council members — or their signing keys — to achieve threshold control of the multisig. With effective control over the Security Council powers, the attacker then used those privileges to authorise transactions that drained the protocol's treasury.

Attack DetailValue
Target ProtocolDrift Protocol (Solana DeFi)
Funds StolenAt least $280 million
Attack VectorSecurity Council multisig takeover
MethodGovernance / admin key compromise
ChainSolana
ClassificationSophisticated, planned operation

How the Governance Attack Unfolded

1. Attacker identifies Drift Protocol's Security Council as a high-value target
   — threshold control = administrative power over protocol funds and parameters
 
2. Pre-attack reconnaissance:
   — Maps all Security Council signers and their public key identities
   — Identifies most accessible or vulnerable signers for compromise
 
3. Credential/key acquisition:
   — Compromise of private signing keys from Security Council member(s)
   — Potentially via targeted phishing, malware, or direct credential theft
 
4. Threshold achieved:
   — Attacker gains signing capability from enough members to meet the multisig
     threshold required for administrative transactions
 
5. Execution:
   — Attacker crafts and signs transactions using Security Council privileges
   — Transactions authorise fund transfers from Drift treasury
   — $280+ million drained before detection and emergency response
 
6. Fund movement:
   — Stolen assets bridged and dispersed across chains to obscure trail

The Governance Paradox

This attack illustrates a fundamental tension in DeFi protocol design: the safety mechanisms designed to protect protocols can themselves become the highest-value attack targets.

Security Councils and multisigs exist precisely because smart contract bugs can put user funds at risk — they provide a human-controlled override layer. But that same override layer, if compromised, provides an attacker with the exact same powers it was designed to give emergency responders.

The more capable the Security Council — the more fund-access and parameter-override power it holds — the more devastating its compromise becomes.

Design GoalAttack Implication
Rapid emergency response capabilityHigh-value target with privileged access
Fund custody as emergency backstopDirect path to asset theft
Low signer threshold for speedFewer keys to compromise
Broad parameter controlEnables attacker to disable circuit breakers

Scale of the Loss

$280 million places this incident among the largest DeFi exploits in history. For context:

ProtocolExploitAmount
Drift Protocol (2026)Security Council takeover~$280M
Ronin Network (2022)Validator key compromise~$625M
Poly Network (2021)Smart contract exploit~$611M
Wormhole (2022)Smart contract exploit~$320M
Euler Finance (2023)Flash loan exploit~$197M

The scale of the Drift loss reflects both the platform's significant total value locked (TVL) and the operational efficiency of an attacker who controlled the highest-privilege access level in the protocol.

Drift's Response

The Drift team acknowledged the incident and stated that the attack was a "planned, sophisticated operation." The protocol has:

  • Suspended operations pending investigation and security review
  • Engaged blockchain security firms to trace stolen funds on-chain
  • Notified relevant exchanges to flag addresses associated with the stolen assets
  • Opened communication with law enforcement and chain analytics providers

Recovery of the stolen funds is uncertain given the dispersal and bridging operations typically used to launder DeFi exploits, though on-chain traceability offers some investigative opportunity.

Implications for DeFi Security

The Drift incident reinforces several persistent security lessons for DeFi protocols:

Multisig Threshold Design

The threshold required to execute Security Council actions directly affects attack feasibility. A 3-of-5 multisig is significantly easier to compromise than a 7-of-11. Protocols should evaluate whether their threshold provides adequate resistance against targeted key compromise campaigns.

Signer Key Security

Security Council signers represent high-value targets and should treat their signing keys with commensurate security discipline:

  • Hardware security modules (HSMs) or hardware wallets for signing
  • Air-gapped signing environments for high-value transactions
  • Regular key rotation and audit of authorised addresses
  • Multi-factor authentication on all systems that could expose signing keys

Time-Locks on Critical Transactions

Implementing time-locks on Security Council transactions — even short ones — provides a detection and response window. A 24–48 hour time-lock on treasury movements would have allowed the Drift community and monitoring services to detect the unauthorised transaction before it finalised.

// Example: Timelock modifier pattern
// All Security Council treasury movements require 48-hour delay
modifier timelocked(uint256 txId) {
    require(
        block.timestamp >= pendingTransactions[txId].scheduledAt + TIMELOCK_DELAY,
        "Timelock: not yet elapsed"
    );
    _;
}

On-Chain Monitoring

Real-time monitoring of Security Council multisig addresses should be standard practice for any DeFi protocol with significant TVL. Services like Forta, OpenZeppelin Defender, and custom on-chain alerting can flag unusual multisig activity within seconds of it occurring on-chain.

What Users Should Do

  • Withdraw funds from Drift Protocol while the platform is under incident review
  • Monitor official Drift channels for updates on the investigation and any potential user compensation plans
  • Treat all funds on paused or compromised DeFi protocols as at risk until official clearance is given
  • Document any losses for potential legal or recovery claims

Source: BleepingComputer — April 2, 2026

#DeFi#Crypto Heist#Governance Attack#Drift Protocol#Solana#BleepingComputer#Threat Intelligence

Related Articles

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors are weaponizing vacant properties as drop addresses for mail interception, blending physical access with digital fraud. A Flare threat intelligence report exposes how postal abuse enables identity theft, account takeover, and financial fraud at scale.

5 min read

Crypto Platform Drift Suspends Services After Hundreds of Millions Stolen

Decentralized finance platform Drift has suspended operations after a cyberattack resulted in the theft of hundreds of millions of dollars in cryptocurrency from its Solana-based protocol.

4 min read

GlassWorm Escalates: 72 Malicious Open VSX Extensions Use

The GlassWorm self-propagating worm campaign has compromised 72 Open VSX extensions using invisible Unicode Private Use Area characters and a Solana...

7 min read
Back to all News