Drift Protocol Loses $285 Million in Sophisticated Exploit Linked to North Korea
- John Jordan

- 2 hours ago
- 2 min read
Solana-based decentralized exchange Drift Protocol has been hit by a massive exploit, resulting in the loss of approximately $285 million. The sophisticated attack, which occurred on April 1, 2026, exploited a novel method involving "durable nonces" and social engineering, rather than a vulnerability in the protocol's smart contracts. Security experts are pointing to on-chain indicators that suggest North Korean state-sponsored hackers may be responsible for the heist.
Key Takeaways
Massive Financial Loss: Drift Protocol lost an estimated $285 million in a single incident.
Sophisticated Attack Vector: The exploit utilized "durable nonces" and social engineering, bypassing traditional smart contract security.
North Korean Involvement Suspected: On-chain analysis suggests a link to North Korean hacking groups, known for similar large-scale exploits.
Human Element Targeted: The attack highlights a growing trend of targeting human operators and operational security weaknesses rather than code vulnerabilities.
The Exploit Unfolds
The attack began with preparations as early as March 23, 2026. The malicious actor gained unauthorized access to Drift Protocol by leveraging durable nonce accounts to pre-sign transactions, which allowed for delayed execution. This enabled the attacker to rapidly gain control of Drift's Security Council administrative powers. Once in control, the attacker introduced a fictitious asset, "CarbonVote Token," and manipulated its value to an irrational level, effectively rewriting the protocol's rules to allow for the withdrawal of existing funds without limits.
Drift confirmed that the incident did not stem from a smart contract bug or compromised seed phrases. Instead, it involved unauthorized or misrepresented transaction approvals obtained prior to execution, likely facilitated through the durable nonce mechanism and advanced social engineering tactics. The protocol has since suspended deposits and withdrawals and is working with security firms, law enforcement, and exchanges to trace and freeze the stolen assets.
Tracing the Attackers
Security firms Elliptic and TRM Labs have identified on-chain patterns consistent with North Korean cybercriminal activity. These include the use of Tornado Cash for initial staging, cross-chain bridging methods, and rapid laundering techniques that mirror previous attacks attributed to the Democratic People's Republic of Korea (DPRK). This modus operandi is similar to the massive Bybit exploit in 2025, which was also linked to DPRK-backed actors. Experts believe these operations are part of a sustained campaign to fund the North Korean regime's weapons programs.
A Shift in Attack Strategies
The Drift Protocol exploit underscores a significant shift in the threat landscape within the cryptocurrency space. Instead of targeting code vulnerabilities, attackers are increasingly focusing on the human element. This involves sophisticated social engineering, supply chain compromises, and exploiting operational security weaknesses to trick individuals into approving malicious transactions. The incident serves as a stark reminder for the industry to bolster defenses beyond code audits, focusing on user education, secure operational practices, and robust multi-signature security protocols.
Sources
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK, The Hacker News.
$285M Bug Or Human Error? Solana-Based Drift Protocol Suffers Largest Exploit Of 2026 — TradingView News, TradingView.
Did Hackers Deal a Fatal Blow to Bear-Market DeFi?, Wu Blockchain.
Solana-Based Drift Protocol Suffers $285M Hack, Largest Of 2026, Bitget.
