Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Drift Hacked: How an Operational Incident Reshapes DeFi Risk Pricing
The code was fine; the problem was people
Drift lost another $280 million this time, once again proving the old lesson: audited code can’t protect against compromised people. The official statement has confirmed that there are no vulnerabilities in the contract itself—the issue was that the multisig was compromised, most likely via social engineering. The attacker obtained the administrator permissions for a durable nonce.
On the price front, DRIFT fell from $0.07 to $0.041 within a few hours, with a maximum drawdown of around 40%. But what’s even more worth noting is Solana’s reaction: it only dipped by about 5%, then stabilized near $79. The market is clearly distinguishing between the two—“some protocol got hit” and “Solana has a systemic problem” are not the same thing.
The debate around this incident briefly went off track. Critics treated it as evidence that Solana’s architecture has flaws; supporters countered that multisig compromises are also common on Ethereum. Neither side got to the heart of the matter. SlowMist’s analysis found the root cause: Drift recently migrated to a 2/5 multisig, but did not enable a time lock—once the two keys fell into the attacker’s hands, the authorization could be executed immediately.
This attack itself was highly professional. Forging tokens, manipulating oracles, and draining the treasury in batches—clearly coordinated actions prepared for weeks, not a spur-of-the-moment move. Eleven protocols were forced to pause redemptions, and Ranger Finance reportedly lost about $900K. But the chain reaction everyone feared did not materialize. Solana’s TVL was impacted, but it did not collapse.
A few points that need to be made clear:
Public attention focused on the technical route debate for public chains; in reality, it overlooked the real issue: gaps in governance and operations. The lesson from this incident is that DeFi needs stronger administrator security measures—moving first to time-lock multisigs and protocols with hardware signatures will carry an advantage in risk premium.
Contagion concerns are mostly noise
The “Solana is finished” narrative is loud, but on-chain data doesn’t support that conclusion: there was no large-scale exodus, and SOL stabilized quickly. Social media discussions ultimately shifted by about two-thirds toward operations security and process problems, rather than chain-level panic.
The attack occurred during a period of lower liquidity, amplifying DRIFT’s price volatility. BTC and ETH performed steadily during the same time window, indicating this is not systemic risk across the whole market.
Looking ahead, Drift is cooperating with law enforcement, and some funds may be recoverable after a freezing stage—estimated as roughly a 50/50 chance of partial recovery. Protocols that treat this as a signal to upgrade security will benefit; projects that ignore the lesson will continue to expose themselves to the same type of attack surface.
Overall: this was a heavy blow to Drift and deeply integrated protocols, but not a denial of Solana or DeFi. It once again shows that the most fragile link in the system is often people. The market, compared with public opinion, saw that clearly faster this time.
Conclusion: The narrative of operational security being repriced is still in an early stage. The biggest winners are builders and security infrastructure service providers; next are short- to mid-term traders who can identify and bet on time-lock multisigs/hardware signatures being implemented first. Passive holders and foundations that don’t adjust their risk control frameworks are at a disadvantage.