Drift Protocol Hacked for $285M: What Went Wrong and What Happens Next

Drift Protocol lost $285M in a April 1, 2026 exploit on Solana. Here's exactly how the attack worked, where the funds went, and what it means for DeFi security.
Soumen Datta
April 2, 2026
Table of Contents
On April 1, 2026, Solana-based Drift Protocol was exploited for approximately $285 million, making it the largest DeFi hack of the year, to date. The attacker used a multi-week setup involving a fake token, manipulated price feeds, and pre-signed transactions to seize admin control of the protocol, then drained real user funds in under 12 minutes.
#PeckShieldAlert Drift Protocol @DriftProtocol has been exploited, resulting in a loss of over $285M - more than 50% of its TVL. $DRIFT has plummeted by -37%.
— PeckShieldAlert (@PeckShieldAlert) April 2, 2026
The exploiter has already bridged the stolen assets from #Solana to #Ethereum via the CCTP TokenMessengerMinterV2,… pic.twitter.com/EZE4tP0f6c
What Happened to Drift Protocol on April 1?
The attack did not come out of nowhere. According to the Drift Protocol team, it was the result of days of preparation that only became visible when the damage was already done.
Drift's total value locked (TVL) dropped from roughly $550 million to under $300 million in less than an hour. The DRIFT token fell more than 40% during the incident. Security firm PeckShield confirmed the loss exceeded $285 million, representing more than 50% of the protocol's TVL at the time.
The timing caused immediate confusion. Drift's team posted on X to clarify the situation was real, writing: "This is not an April Fools joke. Proceed with caution until further notice."
The protocol suspended all deposits and withdrawals as the investigation began.
How Did the Attacker Set Up the Exploit Days in Advance?
Per reports the attacker spent at least 9 days building the conditions for the theft before executing it.
The Fake Token and the Oracle Trap
The attacker created a token called CarbonVote Token (CVT), minting approximately 750 million units. They seeded a liquidity pool on Raydium with just $500 and used wash trading, buying and selling the token between their own wallets, to build a fake price history near $1. Over time, on-chain price oracles picked up this artificial price and treated CVT as a legitimate asset worth roughly $1 per token.
An oracle is a service that feeds external price data into a smart contract. When an oracle is fed manipulated data, the smart contract has no way to know the price is fake.
The Durable Nonce Attack
Separately, the attacker used a Solana feature called durable nonces to pre-sign transactions and delay their execution. A durable nonce replaces the normal transaction expiry mechanism, allowing a signed transaction to be held and submitted at any point in the future.
The timeline:
- March 23: Four durable nonce accounts were created. Two were linked to real Drift Security Council multisig members. Two were controlled by the attacker.
- March 27: Drift migrated its Security Council due to a planned member change. The attacker obtained access to two signers in the updated multisig as well.
- March 30: A new durable nonce account was created for a member of the updated multisig.
- April 1: The attacker executed two pre-signed durable nonce transactions, four slots apart, completing an admin transfer that handed them control of protocol-level permissions.
With admin access secured, the attacker listed CVT as a valid market on Drift, removed all withdrawal limits, deposited hundreds of millions of CVT tokens as collateral, and then executed 31 rapid withdrawals draining real assets, including USDC, JLP, SOL, wrapped BTC, Jito (JTO), and the Fartcoin (FRT) memecoin, in approximately 12 minutes.
Drift confirmed the attack did not result from a bug in its smart contracts or any compromised seed phrases. Instead, it involved "unauthorized or misrepresented transaction approvals obtained prior to execution."
Security audits by Trail of Bits in 2022 and ClawSecure in February 2026 had cleared Drift, but neither review caught the CVT market introduction or the governance changes that made the attack possible.
Where Did the Stolen Funds Go?
After the exploit, the attacker moved quickly to obscure the trail.
Stolen assets were converted to USDC and SOL, then bridged from Solana to Ethereum using Circle's Cross-Chain Transfer Protocol (CCTP). On Ethereum, the attacker converted the funds into ETH. According to on-chain tracking, the attacker ultimately accumulated 129,066 ETH, worth approximately $273 million at the time.
The attacker also deposited SOL into both HyperLiquid and Binance, complicating tracing efforts across multiple platforms and wallets.
Did Circle Do Enough to Stop the Theft?
On-chain investigator ZachXBT publicly criticized Circle after the exploit, pointing out that large amounts of stolen USDC were bridged from Solana to Ethereum during U.S. business hours without being frozen.
Circle was asleep while many millions of USDC was swapped via CCTP from Solana to Ethereum for hours from the 9 figure Drift hack during US hours.
— ZachXBT (@zachxbt) April 2, 2026
Value was moved and nothing was done yet again.
Comes days after you froze 16+ business hot wallets incompetently which is still… pic.twitter.com/T0Xwg1HIfO
ZachXBT contrasted this response with Circle's recent decision to freeze 16 unrelated corporate hot wallets in a sealed U.S. civil case, arguing that Circle had both the ability and the precedent to intervene but failed to act quickly enough to limit the damage.
Which Protocols Were Affected Beyond Drift?
The fallout extended across Solana's DeFi ecosystem. Several platforms connected to Drift liquidity paused operations or reported losses:
- PiggyBank_fi reported roughly $106,000 in exposure through delta-neutral strategies and covered users directly using team funds.
- Reflect Money paused minting and redemptions for USDC+ and USDT+.
- Ranger Finance halted RGUSD deposits and withdrawals, with estimated exposure above $900,000.
- Project0 stopped borrowing against Drift positions as a precaution.
- TradeNeutral, GetPyra, xPlace, Uselulo, and Elemental DeFi all paused key features or reported limited exposure.
- Jupiter Exchange confirmed its JLP pool remains fully backed.
What Happens Next for Drift?
Drift is coordinating with multiple security firms, exchanges, bridges, and law enforcement to trace and recover stolen assets. The multisig has been updated to remove the compromised wallet. All remaining protocol functions remain frozen.
According to Immunefi CEO Mitchell Amador, the token price impact often outlasts the exploit itself. Immunefi data shows 83% of native tokens from hacked protocols never recover to pre-hack prices.
A detailed postmortem from Drift is expected in the coming days.
Resources
PeckShield on X: Posts (April 1-2)
Lookonchain on X: Posts (April 1-2)
Drift Protocol on X: Posts (April 1-2)
Mitchell Amador on X: Post on March 25
Read Next...
Frequently Asked Questions
What caused the Drift Protocol hack?
The Drift Protocol hack was caused by a combination of pre-signed durable nonce transactions, social engineering that obtained multisig approvals from legitimate council members, and a manipulated oracle price from a fake token called CarbonVote Token (CVT). The attacker used these three elements together to take admin control of the protocol and drain $285 million in real user assets.
What is a durable nonce and why does it matter here?
A durable nonce is a Solana feature that allows a transaction to be signed in advance and submitted later, bypassing the normal short expiry window. In this attack, the exploiter used durable nonces to pre-stage admin transfer transactions weeks before execution, meaning the theft was effectively authorized long before it was visible on-chain.
Were all Drift user funds lost in the hack?
Not entirely. DSOL not deposited in Drift, including assets staked to the Drift Validator, were unaffected. Insurance Fund assets were also flagged for withdrawal and safeguarding. However, all funds held in borrow/lend positions, vaults, and active trading deposits were affected by the exploit.
Disclaimer
Disclaimer: The views expressed in this article do not necessarily represent the views of BSCN. The information provided in this article is for educational and entertainment purposes only and should not be construed as investment advice, or advice of any kind. BSCN assumes no responsibility for any investment decisions made based on the information provided in this article. If you believe that the article should be amended, please reach out to the BSCN team by emailing [email protected].
Author
Soumen DattaSoumen has been a crypto researcher since 2020 and holds a master’s in Physics. His writing and research has been published by publications such as CryptoSlate and DailyCoin, as well as BSCN. His areas of focus include Bitcoin, DeFi, and high-potential altcoins like Ethereum, Solana, XRP, and Chainlink. He combines analytical depth with journalistic clarity to deliver insights for both newcomers and seasoned crypto readers.
Crypto Project & Token Reviews
Project & Token Reviews
Comprehensive reviews of crypto's most interesting projects and assets
Learn about the hottest projects & tokens














