Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
I just finished analyzing the full chain of events surrounding the Drift Protocol incident, and I have to say, this might be the most shocking DeFi security case I've seen this year.
The incident occurred on April 1st. Solana's largest perpetual contract exchange, Drift, was drained of $285 million in just a few minutes. But this wasn't caused by a complex smart contract vulnerability; instead, it exposed a fatal weakness we've been neglecting: people.
What interests me most is the attacker’s method. They spent a full six months planning. First, they disguised themselves as a large quantitative trading firm, entering Drift’s ecosystem with real funds, attending various crypto conferences, and building relationships with the core team. This top-tier hacker wore a very professional mask—not just simple phishing, but gradually gaining access to internal communication groups by providing high-quality product testing suggestions and strategic advice.
The second step was even more cunning. They exploited Solana’s unique "Durable Nonces" mechanism—originally designed to facilitate offline transaction signing—but turned it into a ticking time bomb. Through some forged test requests, they induced Drift’s security committee members to perform "blind signing." What appeared to be ordinary transactions actually contained payloads that transferred the highest administrative rights of the protocol.
Then things took a sharp turn. On March 27th, Drift made a seemingly progressive governance update: changing the security committee to a 2/5 multisig structure. But the problem was—they removed the time lock. This meant that with just two signatures, any command to change the core logic of the protocol would be executed immediately, with no response time.
By April 1st, everything was in place. The attacker triggered the previously stolen multisig commands, instantly gaining admin rights. The subsequent operations were as simple as withdrawing from their own wallet—they added a fake token called CVT to the whitelist, set the borrowing limit to the maximum, manipulated prices via oracle, and used these worthless tokens as collateral to legally "borrow" $285 million in USDC, SOL, and ETH.
The most ironic part is: from a blockchain perspective, every step the attacker took was completely legitimate. They didn’t exploit integer overflows or reentrancy bugs; they simply obtained the real admin keys and used normal procedures to withdraw the funds.
This incident exposes a core issue in current DeFi governance: we’re managing billions of dollars with retail-level multisig tools. Most mainstream DeFi protocols still rely on traditional smart contract multisigs (like Safe), which have two fundamental flaws. First, they can’t prevent social engineering attacks—if an attacker compromises key individuals holding the private keys, the defenses collapse. Second, they lack intent verification—multisig can verify "Is this their signature?" but cannot verify "What does what they signed actually mean?"
I believe this event marks a turning point for DeFi security. From geek experiments to real financial infrastructure, security standards must upgrade. A consensus is forming that the next generation of DeFi protection should include several directions:
First, hardware-level upgrades. Replace software multisigs with HSMs (Hardware Security Modules)—private keys stored in military-grade encrypted chips that cannot be exported. This physical isolation and hardware-level control can eliminate risks from internal social engineering and device compromise.
Second, introduce intent-based policy engines. Future DeFi authorization shouldn’t stop at "verifying signatures." The system needs built-in risk management logic—for example, if a transaction attempts to set the borrowing limit of an unknown token to unlimited, the policy engine should automatically detect abnormal intent, trigger an interruption mechanism, and enforce higher-level verification (such as multi-layer manual review, video verification, or mandatory time lock).
Finally, incorporate independent third-party custody. As TVL continues to grow, protocol developers should focus on code logic and business innovation, entrusting the control and protection of billions of dollars to professional custodians with regulatory compliance. Just like traditional finance, exchanges don’t store user assets in the boss’s private safe. Introducing audited, robust, enterprise-grade risk control processes is an inevitable path for DeFi to achieve large-scale adoption.
Drift’s $285 million loss might be the most expensive security lesson yet. But from another perspective, this incident could be a critical turning point for DeFi security paradigms—shifting from loose governance to hardware architectures, intent verification, and professional custody. Only by strengthening these defenses can Web3 truly support future trillion-dollar values.