Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Drift Protocol hack: $280M drained via social engineering and nonce exploit
A sophisticated attack has shaken DeFi, with the drift protocol hack exposing critical weaknesses in operational security and transaction approvals.
How $280 million was drained from Drift Protocol
On Drift Protocol, attackers managed to drain about $280 million from an associated wallet, impacting nearly half of its funds. According to the team, this was a highly organized operation that unfolded over time rather than a simple, opportunistic theft.
Moreover, the exploit centered on pre-signed durable nonce transactions. These special transactions can be executed later, outside normal timing expectations. The attacker waited and then triggered them at a strategic moment, converting a routine operational mechanism into a powerful attack vector.
Social engineering and multisig manipulation
However, the core of the incident did not lie in code. Instead, the attacker reportedly used targeted social engineering to mislead several multisig signers. By building trust and crafting convincing messages, they persuaded signers to approve dangerous actions without recognizing the underlying risk.
This process allowed the attacker to secure an administrative privilege takeover on critical infrastructure linked to the protocol. With elevated permissions in hand, they could authorize movements of funds and execute those delayed transactions, resulting in the large-scale drain of assets.
Why this was not a smart contract failure
The team explicitly clarified that the breach was not due to a smart contract bug clarification or any flaw in the protocol’s code. Seed phrases and core wallet keys also remained uncompromised. That said, the combination of delayed transaction tools and human deception created an effective off-chain vulnerability.
In its internal drift protocol analysis, the project stressed that code audits alone cannot prevent this type of attack. Instead, stronger procedures around signer verification, out-of-band confirmations, and transaction limits are required when using powerful administrative wallets.
Lessons from the drift protocol hack for DeFi security
The drift protocol hack highlights how human factors can undermine even well-audited systems. Moreover, it shows that durable nonce mechanisms and multisig setups must be paired with strict policies, including multi-channel confirmations and contextual checks before approvals.
For the wider ecosystem, this incident will likely inform future drift protocol security update practices and broader DeFi standards. In particular, protocols may revisit their use of pre-signed transactions, rethink signer rotation policies, and insist on continuous education against multisig social engineering attack attempts.
Ultimately, the event stands as a detailed wallet funds drained exploit case study. It underlines the need to treat operational security, signer behavior, and off-chain communication with the same rigor as on-chain code, especially wherever large administrative wallets control user assets.