{"id":23763,"date":"2026-04-02T16:20:43","date_gmt":"2026-04-02T16:20:43","guid":{"rendered":"https:\/\/nft.runfyers.com\/index.php\/2026\/04\/02\/drift-protocol-hacked-over-270m-wiping-out-50-of-its-tvl\/"},"modified":"2026-04-02T16:20:43","modified_gmt":"2026-04-02T16:20:43","slug":"drift-protocol-hacked-over-270m-wiping-out-50-of-its-tvl","status":"publish","type":"post","link":"https:\/\/nft.runfyers.com\/index.php\/2026\/04\/02\/drift-protocol-hacked-over-270m-wiping-out-50-of-its-tvl\/","title":{"rendered":"Drift Protocol Hacked Over $270M, Wiping Out 50% of Its TVL"},"content":{"rendered":"<p><\/p>\n<div>\n<p><span style=\"font-weight: 400;\"><strong>Drift Protocol,<\/strong> one of the major perpetual decentralized exchanges (DEX) on Solana, was reportedly exploited on April 2, 2026, with total estimated damages exceeding <strong>$270 million<\/strong>. According to on-chain data, this amount is equivalent to more than <strong>50% of the protocol\u2019s total value locked (TVL),<\/strong> marking one of the largest exploits on the Solana.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_happened\"\/><b>What happened<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><span class=\"ez-toc-section-end\"\/><\/h2>\n<p><span style=\"font-weight: 400;\">The first signs emerged when on-chain data recorded unusual capital outflows from Drift Protocol\u2019s vaults within a very short timeframe. Multiple large transactions were executed consecutively, all directed to a single wallet address: HKgZ4K.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a post last night, Drift Protocol confirmed that the platform is facing an ongoing attack and has temporarily suspended critical operations to limit damage.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Drift Protocol is experiencing an active attack. Deposits and withdrawals have been suspended. We are coordinating with multiple security firms, bridges, and exchanges to contain the incident. This is not an April Fools joke. We\u2019ll provide additional updates from this account as\u2026 <a href=\"https:\/\/t.co\/03SRPq4fHj\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">https:\/\/t.co\/03SRPq4fHj<\/a><\/p>\n<p>\u2014 Drift (@DriftProtocol) <a href=\"https:\/\/twitter.com\/DriftProtocol\/status\/2039417136729227425?ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">April 1, 2026<\/a><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">Messages from the team indicate that the incident was detected almost in real-time, as deposit and withdrawal activities were immediately halted, and the project began coordinating with various stakeholders to control the situation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Initial reports did not clarify the specific cause of the incident. According to the latest update on X, Drift Protocol stated that the attack <strong>did not stem from a smart contract bug<\/strong>, but was related to the attacker gaining unauthorized access to the governance system through Solana\u2019s \u201cdurable nonce\u201d mechanism.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Earlier today, a malicious actor gained unauthorized access to Drift Protocol through a novel attack involving durable nonces, resulting in a rapid takeover of Drift\u2019s Security Council administrative powers.<\/p>\n<p>This was a highly sophisticated operation that appears to have involved\u2026<\/p>\n<p>\u2014 Drift (@DriftProtocol) <a href=\"https:\/\/twitter.com\/DriftProtocol\/status\/2039564437795836039?ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">April 2, 2026<\/a><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">According to the project, the attacker used pre-signed transactions combined with gathering sufficient signatures from the multisig to execute a malicious admin rights transfer, thereby gaining control over protocol-level permissions. This process is believed to have been prepared for weeks and executed in just minutes.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Fund_Flow_Stolen_Assets\"\/><b>Fund Flow &amp; Stolen Assets<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><span class=\"ez-toc-section-end\"\/><\/h2>\n<p><span style=\"font-weight: 400;\">Similar to previous large-scale DeFi exploits, the attacker executed continuously large transactions within minutes.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The Drift Protocol exploiter is swapping the $270M+ stolen assets into <a href=\"https:\/\/twitter.com\/search?q=%24USDC&amp;src=ctag&amp;ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">$USDC<\/a>, then bridging to <a href=\"https:\/\/twitter.com\/hashtag\/Ethereum?src=hash&amp;ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">#Ethereum<\/a> to buy <a href=\"https:\/\/twitter.com\/search?q=%24ETH&amp;src=ctag&amp;ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">$ETH<\/a>. \ud83d\udea8<\/p>\n<p>So far, they have bought 19,913 <a href=\"https:\/\/twitter.com\/search?q=%24ETH&amp;src=ctag&amp;ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">$ETH<\/a> ($42.6M).<a href=\"https:\/\/t.co\/I0kfOvxqRp\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">https:\/\/t.co\/I0kfOvxqRp<\/a><a href=\"https:\/\/t.co\/C5nLmNfYsM\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">https:\/\/t.co\/C5nLmNfYsM<\/a> <a href=\"https:\/\/t.co\/WesXqfQnsn\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">pic.twitter.com\/WesXqfQnsn<\/a><\/p>\n<p>\u2014 Lookonchain (@lookonchain) <a href=\"https:\/\/twitter.com\/lookonchain\/status\/2039399827809996904?ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">April 1, 2026<\/a><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">Specifically, after withdrawing assets from Drift Protocol, the majority of the funds were quickly converted into USDC before being bridged from <strong>Solana to Ethereum<\/strong> and subsequently used to purchase ETH. According to Lookonchain, the attacker bought approximately 19,913 ETH (equivalent to about $42.6 million) in the initial stage, then continued to accumulate. Currently, the exploiter\u2019s wallet has nearly completed the conversion of all stolen assets to Ethereum, holding approximately <strong>130,000 ETH<\/strong>, valued at over $270 million.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Drift Protocol appears to have been exploited, with over $270M in assets suspiciously transferred to wallet HkGz4K. \ud83d\udea8<\/p>\n<p>That&#8217;s crazy!<a href=\"https:\/\/t.co\/iWVPzvDDhx\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">https:\/\/t.co\/iWVPzvDDhx<\/a> <a href=\"https:\/\/t.co\/AQCa5q4b3M\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">pic.twitter.com\/AQCa5q4b3M<\/a><\/p>\n<p>\u2014 Lookonchain (@lookonchain) <a href=\"https:\/\/twitter.com\/lookonchain\/status\/2039396710016012327?ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\">April 1, 2026<\/a><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">Notably, about $155 million in JLP \u2014 the token representing the system\u2019s liquidity \u2014 was part of the total $270 million stolen, indicating that the exploit directly impacted Drift\u2019s core liquidity structure.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Impact_TVL_Price_Users\"\/><b>Impact: TVL, Price &amp; Users<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><span class=\"ez-toc-section-end\"\/><\/h2>\n<div id=\"attachment_161774\" style=\"width: 2570px\" class=\"wp-caption alignnone\"><noscript><\/noscript><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-161774\" class=\"lazyload size-full wp-image-161774\" src=\"https:\/\/nftevening.com\/wp-content\/uploads\/2026\/04\/drift-tvl.jpg\" alt=\"Drift Total Value Lock chart\" width=\"2560\" height=\"1440\"\/><\/p>\n<p id=\"caption-attachment-161774\" class=\"wp-caption-text\">Drift Total Value Lock chart. Source: DeFiLIama<\/p>\n<\/div>\n<p><span style=\"font-weight: 400;\">Before the incident, Drift Protocol\u2019s TVL fluctuated between $500M and $600M. After the exploit, this figure plummeted to approximately $252 million, representing a decline of over 50%. This trend not only reflects the assets directly withdrawn by the attacker but also shows that the remaining capital is leaving the protocol as cautious sentiment grows.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DRIFT price chart (4H). Source: TradingView\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Along with the drop in liquidity, the DRIFT token reacted negatively almost immediately, falling about 15%\u201320% shortly after news of the exploit spread, down to around the $0.45\u2013$0.50 range.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recently, the Drift Protocol stated that deposits related<\/span><\/p>\n<div id=\"attachment_161775\" style=\"width: 2058px\" class=\"wp-caption alignnone\"><noscript><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-161775\" class=\"size-full wp-image-161775\" src=\"https:\/\/nftevening.com\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-02-at-10.59.29.jpg\" alt=\"DRIFT price chart (4H)\" width=\"2048\" height=\"1333\"\/><\/noscript><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-161775\" class=\"lazyload size-full wp-image-161775\" src=\"https:\/\/nftevening.com\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-02-at-10.59.29.jpg\" alt=\"DRIFT price chart (4H)\" width=\"2048\" height=\"1333\"\/><\/p>\n<p id=\"caption-attachment-161775\" class=\"wp-caption-text\">DRIFT price chart (4H). Source: TradingView<\/p>\n<\/div>\n<p><span style=\"font-weight: 400;\">to borrowing, lending, vaults, and trading activities could all be affected. However, the specific scale of damage for each user group has not yet been announced in detail.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Whats_Next\"\/><b>What\u2019s Next<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><span class=\"ez-toc-section-end\"\/><\/h2>\n<p><span style=\"font-weight: 400;\">Currently, fund-tracking efforts are focused on the address HKgZ4K on Ethereum, where the bulk of the assets were moved following the exploit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the history of DeFi hacks suggests that the likelihood of asset recovery is often quite low, especially once the attacker has completed the conversion and dispersed the assets through multiple steps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Drift Protocol stated they are coordinating with security firms, bridges, exchanges, and authorities to track and attempt to freeze the stolen assets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This event once again shows that security risk remains one of the biggest issues for DeFi, especially as systems become increasingly complex and cross-chain connectivity expands.<\/span><\/p>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><a href=\"https:\/\/nftevening.com\/drift-protocol-hacked-270m-solana-exploit\/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=drift-protocol-hacked-270m-solana-exploit\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Drift Protocol, one of the major perpetual decentralized exchanges (DEX) on Solana, was reportedly exploited on April 2, 2026, with total estimated damages exceeding $270 million. According to on-chain data, this amount is equivalent to more than 50% of the protocol\u2019s total value locked (TVL), marking one of the largest exploits on the Solana. What [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23764,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[9],"tags":[21],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/nftevening.com\/wp-content\/uploads\/2026\/04\/0204.jpg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/23763"}],"collection":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=23763"}],"version-history":[{"count":0,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/23763\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/23764"}],"wp:attachment":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=23763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=23763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=23763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}