Binance Square
#driftprotocol

driftprotocol

100,320 ogledov
143 razprav
Shahjeecryptooo
·
--
Medvedji
$DRIFT is again dumping non stop right now. After the hack news, the team shared a clear update yesterday. Following that, we saw a pump and a proper liquidation hunt. But now it has started dropping again and is already down almost 35% from yesterday’s price. There is still a chance of more downside, so for now I’m avoiding any long positions on this. The next possible zone to watch is around $0.27 below. $DRIFT {future}(DRIFTUSDT) #drift #DriftProtocol #BinanceWalletLaunchesPredictionMarkets
$DRIFT is again dumping non stop right now.

After the hack news, the team shared a clear update yesterday. Following that, we saw a pump and a proper liquidation hunt. But now it has started dropping again and is already down almost 35% from yesterday’s price.

There is still a chance of more downside, so for now I’m avoiding any long positions on this. The next possible zone to watch is around $0.27 below.

$DRIFT
#drift #DriftProtocol #BinanceWalletLaunchesPredictionMarkets
$DRIFT Major Hack Incident Drift Protocol was hacked on April 1, 2026 Around $270M–$285M worth of crypto stolen Considered one of the largest DeFi hacks of 2026 Platform temporarily suspended deposits and withdrawals 📉 Price Crash DRIFT token price dropped 40%+ after the hack Investors started panic selling Market confidence is currently very low #DRIFT #DriftProtocol {future}(DRIFTUSDT)
$DRIFT Major Hack Incident
Drift Protocol was hacked on April 1, 2026
Around $270M–$285M worth of crypto stolen
Considered one of the largest DeFi hacks of 2026
Platform temporarily suspended deposits and withdrawals

📉 Price Crash
DRIFT token price dropped 40%+ after the hack
Investors started panic selling
Market confidence is currently very low
#DRIFT #DriftProtocol
Solana Security 🔒 SOLANA NE $270M HACK KE BAAD SECURITY UPGRADE KIYA! Drift Protocol par $270 Million ka hack hua — investigators ne North Korean hackers ko link kiya! Is ke baad Solana Foundation ne emergency security overhaul announce kiya: (CoinDesk) 🛡️ Naye measures: 24/7 threat monitoring — $10M+ TVL protocols ke liye Dedicated incident response network launch Security firms ka dedicated team ⚡ Hack ke baad bhi SOL $79 par hold kar raha hai — strong demand! #solana #DriftProtocol #Hacked #CryptoSecurity #BinanceSquare $SOL {spot}(SOLUSDT)
Solana Security
🔒 SOLANA NE $270M HACK KE BAAD SECURITY UPGRADE KIYA!
Drift Protocol par $270 Million ka hack hua — investigators ne North Korean hackers ko link kiya! Is ke baad Solana Foundation ne emergency security overhaul announce kiya: (CoinDesk)
🛡️ Naye measures:
24/7 threat monitoring — $10M+ TVL protocols ke liye
Dedicated incident response network launch
Security firms ka dedicated team
⚡ Hack ke baad bhi SOL $79 par hold kar raha hai — strong demand!
#solana #DriftProtocol #Hacked #CryptoSecurity #BinanceSquare $SOL
·
--
Medvedji
#solana ($SOL {future}(SOLUSDT) A Fundação Solana (SOL) lançou duas novas iniciativas para fortalecer a segurança das finanças descentralizadas (#DeFi! ): #STRIDE e #sirn . - Stride*: um programa de segurança que avalia e monitoriza o nível de segurança dos projetos sediados em Solana, com capacidade de intervenção em caso de incidente. A avaliação é baseada em oito critérios, incluindo segurança do programa, governança e controle de acesso, risco de oráculo e dependência, entre outros. - *SIRN*: uma rede de empresas de segurança profissional criada para fornecer resposta imediata a incidentes de segurança. Essas iniciativas foram lançadas após um grande ataque cibernético ao #DriftProtocol , um protocolo de negociação de derivativos baseado em Solana, que sofreu perdas de aproximadamente US$ 280 milhões ¹.
#solana ($SOL
A Fundação Solana (SOL) lançou duas novas iniciativas para fortalecer a segurança das finanças descentralizadas (#DeFi! ): #STRIDE e #sirn .

- Stride*: um programa de segurança que avalia e monitoriza o nível de segurança dos projetos sediados em Solana, com capacidade de intervenção em caso de incidente. A avaliação é baseada em oito critérios, incluindo segurança do programa, governança e controle de acesso, risco de oráculo e dependência, entre outros.
- *SIRN*: uma rede de empresas de segurança profissional criada para fornecer resposta imediata a incidentes de segurança.

Essas iniciativas foram lançadas após um grande ataque cibernético ao #DriftProtocol , um protocolo de negociação de derivativos baseado em Solana, que sofreu perdas de aproximadamente US$ 280 milhões ¹.
·
--
Bikovski
🚨 JUST IN: SOLANA STEPS UP SECURITY GAME The Solana Foundation just rolled out STRIDE & SIRN — a major leap toward a safer ecosystem. 🔐 24/7 threat monitoring 🧠 Formal verification for top protocols ⚡ Real-time crisis response This isn’t just an upgrade — it’s a signal that Solana is getting serious about long-term security and institutional-grade reliability. Bullish on stronger infrastructure = bullish on the future of $SOL 👀🔥 $SOL {future}(SOLUSDT) #DriftProtocol #solana
🚨 JUST IN: SOLANA STEPS UP SECURITY GAME
The Solana Foundation just rolled out STRIDE & SIRN — a major leap toward a safer ecosystem.
🔐 24/7 threat monitoring
🧠 Formal verification for top protocols
⚡ Real-time crisis response
This isn’t just an upgrade — it’s a signal that Solana is getting serious about long-term security and institutional-grade reliability.
Bullish on stronger infrastructure = bullish on the future of $SOL 👀🔥
$SOL
#DriftProtocol #solana
Članek
They Shook Hands at Conferences, Deposited $1 Million, Then Stole $285 Million Inside the Drift HackThe story of how North Korean state hackers drained $285 million from Drift Protocol on April Fool's Day 2026 doesn't begin with a line of malicious code. It begins at a crypto conference sometime in the fall of 2025, with a handshake. That's the detail that makes this the most unsettling DeFi hack of the year and possibly the most sophisticated social engineering operation in crypto history. The attackers, attributed with medium-high confidence to a North Korean state group known as UNC4736 (also called AppleJeus or Citrine Sleet), didn't brute-force their way in. They spent six months building genuine human relationships inside Drift's team. The playbook was meticulous. Posing as a legitimate quantitative trading firm, they approached Drift contributors at multiple major industry conferences in different countries throughout late 2025 and early 2026. They were technically fluent. They asked smart questions about trading strategies and protocol architecture. They deposited over $1 million of their own money to establish credibility. A Telegram group was set up, meetings happened in person, and over months of substantive conversations, they became from Drift's perspective trusted working partners. Then came the quiet infection. Investigators identified two likely attack vectors: one contributor may have cloned a malicious code repository the group shared, disguised as a frontend tool for their vault. Another was reportedly tricked into downloading a wallet app through Apple's TestFlight a tool that, ironically, was also used to remove Bitchat from China this week. Simply opening a file in a VS Code folder was enough to silently execute code and give the attackers remote access. No warning. No prompt. Just a compromised device. On April 1, using pre-signed multisig transactions that had been sitting dormant for over a week, the attackers executed the drain in roughly 12 minutes. $285 million gone. Most of it was bridged to Ethereum within hours. The DRIFT token collapsed over 40%. The Telegram group and all associated malware were immediately scrubbed. The "trading firm" vanished. Security experts are blunt about what this means: DeFi's reliance on multisig governance, long considered a gold standard of security, may not be enough when the adversary is willing to spend six months and a million dollars becoming your colleague first. "Crypto teams are now facing adversaries that operate more like intelligence units than hackers," noted one blockchain security firm. It's an uncomfortable reality but one the industry needs to reckon with. #DriftProtocol #northkorea #DeFiHack #CryptoSecurity

They Shook Hands at Conferences, Deposited $1 Million, Then Stole $285 Million Inside the Drift Hack

The story of how North Korean state hackers drained $285 million from Drift Protocol on April Fool's Day 2026 doesn't begin with a line of malicious code. It begins at a crypto conference sometime in the fall of 2025, with a handshake.
That's the detail that makes this the most unsettling DeFi hack of the year and possibly the most sophisticated social engineering operation in crypto history. The attackers, attributed with medium-high confidence to a North Korean state group known as UNC4736 (also called AppleJeus or Citrine Sleet), didn't brute-force their way in. They spent six months building genuine human relationships inside Drift's team.
The playbook was meticulous. Posing as a legitimate quantitative trading firm, they approached Drift contributors at multiple major industry conferences in different countries throughout late 2025 and early 2026. They were technically fluent. They asked smart questions about trading strategies and protocol architecture. They deposited over $1 million of their own money to establish credibility. A Telegram group was set up, meetings happened in person, and over months of substantive conversations, they became from Drift's perspective trusted working partners.
Then came the quiet infection. Investigators identified two likely attack vectors: one contributor may have cloned a malicious code repository the group shared, disguised as a frontend tool for their vault. Another was reportedly tricked into downloading a wallet app through Apple's TestFlight a tool that, ironically, was also used to remove Bitchat from China this week. Simply opening a file in a VS Code folder was enough to silently execute code and give the attackers remote access. No warning. No prompt. Just a compromised device.
On April 1, using pre-signed multisig transactions that had been sitting dormant for over a week, the attackers executed the drain in roughly 12 minutes. $285 million gone. Most of it was bridged to Ethereum within hours. The DRIFT token collapsed over 40%. The Telegram group and all associated malware were immediately scrubbed. The "trading firm" vanished.
Security experts are blunt about what this means: DeFi's reliance on multisig governance, long considered a gold standard of security, may not be enough when the adversary is willing to spend six months and a million dollars becoming your colleague first. "Crypto teams are now facing adversaries that operate more like intelligence units than hackers," noted one blockchain security firm. It's an uncomfortable reality but one the industry needs to reckon with.
#DriftProtocol #northkorea #DeFiHack #CryptoSecurity
2026最嚴重的Defi被盜事件出現了‼️‼️ Drift Protocol在推特發文說平台被盜了2.8億美金,而這整個過程不是因為項目方的漏洞,也不是因為合約出錯,而是長達半年的預謀 代幣 $DRIFT 從高點2.4美元一路跌到最低0.03美元,投資人FTX/Alameda在被盜後通過 Wintermute 賣出 694 萬枚 DRIFT約 32 萬美元,直接連環效應了... 來復盤下發生了什麼: 1️⃣黑客2025年偽裝成量化交易公司在會議上接觸 Drift 團隊並於25年年底團隊存入100萬美元,多次與項目方開工作會議以及線下見面以建立信任,進行長期社會工程滲透。 2️⃣黑客對方開始分享代碼倉庫、TestFlight App,透過代碼倉庫惡意鏈接 + TestFlight 應用入侵設備獲取管理員私鑰,執行轉賬後清除痕跡 3️⃣3月11日黑客從 Tornado Cash 提取約 10 ETH 作為初始資金,署完全虛構的 CarbonVote Token 並鑄造約 7.5 億枚在 Raydium 只注入約 500 美元流動性,透過 wash trading製造假價格歷史,讓 Drift 的預言機誤認 CVT 為有效抵押品。 4️⃣3月23日創建多個 durable nonce 帳戶,其中 2 個與 Drift Security Council 多簽成員相關,這些預簽交易表面上看起來是例行操作,但隱藏了關鍵授權允許後續延遲執行。 5️⃣3月25日Drift 執行計劃中的 Security Council 多簽遷移,攻擊者迅速適應在新配置下再次取得足夠簽名且新多簽未設置時間鎖(timelock = 0成為最大破綻,攻擊者主錢包進行小額測試。 6️⃣4月1日在不到 12~20 分鐘內攻擊者使用 durable nonce 預簽交易觸發進行了31次的攻擊,瞬間取得 Security Council 管理員權限,變更 admin key將團隊鎖在門外,並將資金迅速透過 Jupiter 聚合器換成 USDC,再經 Wormhole / CCTP 等跨鏈轉移至以太坊買入大量 ETH ⭐️這次的攻擊不是 code bug,而是 human + governance 失敗,社會工程 + 誤導預簽 + 零延遲多簽,是這次攻擊的致命組合。 #DriftProtocol
2026最嚴重的Defi被盜事件出現了‼️‼️

Drift Protocol在推特發文說平台被盜了2.8億美金,而這整個過程不是因為項目方的漏洞,也不是因為合約出錯,而是長達半年的預謀

代幣 $DRIFT 從高點2.4美元一路跌到最低0.03美元,投資人FTX/Alameda在被盜後通過 Wintermute 賣出 694 萬枚 DRIFT約 32 萬美元,直接連環效應了...

來復盤下發生了什麼:

1️⃣黑客2025年偽裝成量化交易公司在會議上接觸 Drift 團隊並於25年年底團隊存入100萬美元,多次與項目方開工作會議以及線下見面以建立信任,進行長期社會工程滲透。

2️⃣黑客對方開始分享代碼倉庫、TestFlight App,透過代碼倉庫惡意鏈接 + TestFlight 應用入侵設備獲取管理員私鑰,執行轉賬後清除痕跡

3️⃣3月11日黑客從 Tornado Cash 提取約 10 ETH 作為初始資金,署完全虛構的 CarbonVote Token 並鑄造約 7.5 億枚在 Raydium 只注入約 500 美元流動性,透過 wash trading製造假價格歷史,讓 Drift 的預言機誤認 CVT 為有效抵押品。

4️⃣3月23日創建多個 durable nonce 帳戶,其中 2 個與 Drift Security Council 多簽成員相關,這些預簽交易表面上看起來是例行操作,但隱藏了關鍵授權允許後續延遲執行。

5️⃣3月25日Drift 執行計劃中的 Security Council 多簽遷移,攻擊者迅速適應在新配置下再次取得足夠簽名且新多簽未設置時間鎖(timelock = 0成為最大破綻,攻擊者主錢包進行小額測試。

6️⃣4月1日在不到 12~20 分鐘內攻擊者使用 durable nonce 預簽交易觸發進行了31次的攻擊,瞬間取得 Security Council 管理員權限,變更 admin key將團隊鎖在門外,並將資金迅速透過 Jupiter 聚合器換成 USDC,再經 Wormhole / CCTP 等跨鏈轉移至以太坊買入大量 ETH

⭐️這次的攻擊不是 code bug,而是 human + governance 失敗,社會工程 + 誤導預簽 + 零延遲多簽,是這次攻擊的致命組合。

#DriftProtocol
هل ما حدث مع Drift Protocol مجرد اختراق احترافي أم إهمال جسيم؟ 🤔 كشفت المحامية "أرييل جيفنر" عن زاوية صادمة؛ حيث وصفت خسارة الـ 280 مليون دولار بأنها قد تندرج تحت "الإهمال المدني". السبب؟ ثغرات أمنية بدائية، مثل عدم فصل مفاتيح التوقيع عن الإنترنت، والاعتماد على مطورين دون تدقيق كافٍ! 🛡️ المثير للقلق أن المهاجمين استغرقوا 6 أشهر لبناء الثقة قبل تنفيذ مخططهم. يبدو أن أمن العملات الرقمية يبدأ بالوعي البشري قبل الأكواد البرمجية. 🔒 ما رأيكم، هل تتحمل المشاريع المسؤولية القانونية عن ضعف إجراءاتها الأمنية؟ شاركونا تعليقاتكم! 👇 $DRIFT {future}(DRIFTUSDT) #DriftProtocol #CryptoSecurity #BinanceSquare #Blockchain #Hacks
هل ما حدث مع Drift Protocol مجرد اختراق
احترافي أم إهمال جسيم؟ 🤔

كشفت المحامية "أرييل جيفنر" عن زاوية صادمة؛ حيث وصفت خسارة الـ 280 مليون دولار بأنها قد تندرج تحت "الإهمال المدني". السبب؟ ثغرات أمنية بدائية، مثل عدم فصل مفاتيح التوقيع عن الإنترنت، والاعتماد على مطورين دون تدقيق كافٍ! 🛡️

المثير للقلق أن المهاجمين استغرقوا 6 أشهر لبناء الثقة قبل تنفيذ مخططهم. يبدو أن أمن العملات الرقمية يبدأ بالوعي البشري قبل الأكواد البرمجية. 🔒

ما رأيكم، هل تتحمل المشاريع المسؤولية القانونية عن ضعف إجراءاتها الأمنية؟ شاركونا تعليقاتكم! 👇
$DRIFT

#DriftProtocol #CryptoSecurity #BinanceSquare #Blockchain #Hacks
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers 🚨 Drift Investigation: North Korean Hackers Behind Recent Attack? Fresh findings from Drift’s internal investigation are raising serious concerns across the crypto space. 🔍 Early evidence suggests links between the recent exploit and sophisticated hacking groups believed to be tied to North Korea — the same actors often associated with high-profile DeFi breaches. • Advanced social engineering • Smart contract vulnerabilities exploitation • Laundering funds through complex on-chain routes ⚠️ This isn’t just another hack — it’s part of a larger, coordinated effort targeting crypto infrastructure globally. 📉 Security fears could shake short-term confidence, especially in DeFi platforms, while pushing projects to double down on audits and protection layers. 🧠 Security is no longer optional in crypto — it’s survival. Stay sharp. Stay secure. 🔐 #DriftProtocol #CryptoSecurity #LazarusGroup #BinanceSquare #cyberattacks
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers

🚨 Drift Investigation: North Korean Hackers Behind Recent Attack?

Fresh findings from Drift’s internal investigation are raising serious concerns across the crypto space.

🔍 Early evidence suggests links between the recent exploit and sophisticated hacking groups believed to be tied to North Korea — the same actors often associated with high-profile DeFi breaches.

• Advanced social engineering
• Smart contract vulnerabilities exploitation
• Laundering funds through complex on-chain routes

⚠️ This isn’t just another hack — it’s part of a larger, coordinated effort targeting crypto infrastructure globally.

📉 Security fears could shake short-term confidence, especially in DeFi platforms, while pushing projects to double down on audits and protection layers.

🧠 Security is no longer optional in crypto — it’s survival.

Stay sharp. Stay secure. 🔐

#DriftProtocol #CryptoSecurity #LazarusGroup #BinanceSquare #cyberattacks
Infiltración de Película Cómo hackers norcoreanos engañaron a #DRIFT durante meses para ejecutar el robo de $280 millones Ingeniería Social y el "Juego Largo" de la RPDC #DriftProtocol ha revelado los detalles de un ataque que redefine el concepto de "riesgo en DeFi". Lo que parecía un hackeo técnico resultó ser una operación de inteligencia estructurada de medio año de duración. El Engaño Cara a Cara: Los atacantes no operaron desde las sombras. Se hicieron pasar por una empresa de trading cuantitativo legítima, asistiendo a conferencias internacionales y reuniéndose en persona con el equipo de Drift durante meses. Crearon vínculos de confianza, grupos de Telegram y hasta depositaron $1 millón de su propio capital para parecer socios genuinos. Caballos de Troya Digitales: La intrusión se logró mediante dos vectores de ingeniería social Repositorios maliciosos: Aprovecharon una vulnerabilidad en editores como VS Code que ejecutaba código oculto al abrir archivos. Apps Beta: Indujeron a un colaborador a instalar una billetera falsa mediante TestFlight de Apple. La Conexión con Corea del Norte: Drift y el equipo de seguridad SEAL 911 vinculan el ataque con el grupo UNC4736 (AppleJeus), brazo cibernético de la inteligencia norcoreana. Los fondos utilizados para la preparación se rastrearon hasta el hackeo de Radiant Capital de 2024. Ataque de "Nonces Duraderos": El hackeo no fue un fallo en los contratos inteligentes. Los atacantes utilizaron una función legítima de #solana para pre-firmar transacciones y, tras obtener acceso administrativo mediante el malware instalado previamente, vaciaron el protocolo en minutos. Expertos de seguridad como tanuki42_ califican este ataque como el más elaborado en la historia de las criptomonedas. El hecho de que utilizaran "facilitadores" físicos (no coreanos) para superar la debida diligencia marca un peligroso precedente para cualquier equipo de desarrollo en el sector. #CryptoNews #HackerAlert $DRIFT {future}(DRIFTUSDT)
Infiltración de Película
Cómo hackers norcoreanos engañaron a #DRIFT durante meses para ejecutar el robo de $280 millones

Ingeniería Social y el "Juego Largo" de la RPDC

#DriftProtocol ha revelado los detalles de un ataque que redefine el concepto de "riesgo en DeFi". Lo que parecía un hackeo técnico resultó ser una operación de inteligencia estructurada de medio año de duración.

El Engaño Cara a Cara: Los atacantes no operaron desde las sombras. Se hicieron pasar por una empresa de trading cuantitativo legítima, asistiendo a conferencias internacionales y reuniéndose en persona con el equipo de Drift durante meses. Crearon vínculos de confianza, grupos de Telegram y hasta depositaron $1 millón de su propio capital para parecer socios genuinos.

Caballos de Troya Digitales: La intrusión se logró mediante dos vectores de ingeniería social
Repositorios maliciosos: Aprovecharon una vulnerabilidad en editores como VS Code que ejecutaba código oculto al abrir archivos.
Apps Beta: Indujeron a un colaborador a instalar una billetera falsa mediante TestFlight de Apple.

La Conexión con Corea del Norte: Drift y el equipo de seguridad SEAL 911 vinculan el ataque con el grupo UNC4736 (AppleJeus), brazo cibernético de la inteligencia norcoreana. Los fondos utilizados para la preparación se rastrearon hasta el hackeo de Radiant Capital de 2024.

Ataque de "Nonces Duraderos": El hackeo no fue un fallo en los contratos inteligentes. Los atacantes utilizaron una función legítima de #solana para pre-firmar transacciones y, tras obtener acceso administrativo mediante el malware instalado previamente, vaciaron el protocolo en minutos.

Expertos de seguridad como tanuki42_ califican este ataque como el más elaborado en la historia de las criptomonedas. El hecho de que utilizaran "facilitadores" físicos (no coreanos) para superar la debida diligencia marca un peligroso precedente para cualquier equipo de desarrollo en el sector.
#CryptoNews #HackerAlert
$DRIFT
Rita Lauren xNrM:
https://www.binance.com/referral/mystery-box/r1latammb/claim?ref=856122149
## 🚀 Breaking Down the $285M Drift Protocol Hack: The North Korean Connection 🇰🇵 The crypto world is buzzing with the latest investigation into the **$285 million Drift Protocol exploit**. Here’s what you need to know about the North Korean (DPRK) links and what it means for DeFi security. ### 🔍 The "Sleeper" Operation Security experts (including TRM Labs and Elliptic) have identified the fingerprints of state-sponsored hackers. This wasn't a quick smash-and-grab; it was a highly sophisticated **"sleeper" operation** that started months ago. * **Social Engineering:** Attackers reportedly posed as institutional traders for months to build trust with the core team. * **The "Durable Nonce" Exploit:** By tricking the Security Council into pre-signing transactions, they bypassed standard safeguards. * **Oracle Manipulation:** They used a fake asset (CVT) as collateral to drain **USDC** from the protocol. ### 💰 Where is the Money Now? Most of the stolen funds (~$232M) have already been bridged from **Solana to Ethereum**. We are now seeing the classic DPRK playbook: moving assets through privacy mixers to mask the trail. ### 💡 The Lesson for DeFi This attack proves that even "audited" protocols are vulnerable to long-term social engineering. As the **CLARITY Act** moves through the Senate, expect even tighter regulations on how DeFi protocols manage their "administrative keys." ### 📉 Market Reaction The market remains on edge, with $BTC hovering around **$68,974**. While recovery efforts are underway, the scale of this hack is a stark reminder to stay vigilant with your self-custody and protocol choices. **What do you think?** Should stablecoin issuers have the power to freeze funds faster, or does that go against the decentralization of crypto? Let’s discuss below! 👇 #BinanceSquare #DriftProtocol #CryptoSecurity #DeFi #Solana #BlockchainAnalysis
## 🚀 Breaking Down the $285M Drift Protocol Hack: The North Korean Connection 🇰🇵
The crypto world is buzzing with the latest investigation into the **$285 million Drift Protocol exploit**. Here’s what you need to know about the North Korean (DPRK) links and what it means for DeFi security.
### 🔍 The "Sleeper" Operation
Security experts (including TRM Labs and Elliptic) have identified the fingerprints of state-sponsored hackers. This wasn't a quick smash-and-grab; it was a highly sophisticated **"sleeper" operation** that started months ago.
* **Social Engineering:** Attackers reportedly posed as institutional traders for months to build trust with the core team.
* **The "Durable Nonce" Exploit:** By tricking the Security Council into pre-signing transactions, they bypassed standard safeguards.
* **Oracle Manipulation:** They used a fake asset (CVT) as collateral to drain **USDC** from the protocol.
### 💰 Where is the Money Now?
Most of the stolen funds (~$232M) have already been bridged from **Solana to Ethereum**. We are now seeing the classic DPRK playbook: moving assets through privacy mixers to mask the trail.
### 💡 The Lesson for DeFi
This attack proves that even "audited" protocols are vulnerable to long-term social engineering. As the **CLARITY Act** moves through the Senate, expect even tighter regulations on how DeFi protocols manage their "administrative keys."
### 📉 Market Reaction
The market remains on edge, with $BTC hovering around **$68,974**. While recovery efforts are underway, the scale of this hack is a stark reminder to stay vigilant with your self-custody and protocol choices.
**What do you think?** Should stablecoin issuers have the power to freeze funds faster, or does that go against the decentralization of crypto? Let’s discuss below! 👇
#BinanceSquare #DriftProtocol #CryptoSecurity #DeFi #Solana #BlockchainAnalysis
⚠️ Security Alert: Learning from the $285 Million Drift Exploit ⚠️ There is a lot of talk on Binance Square today about the recent $285 million exploit of the Drift Protocol. Staying safe is the #1 rule in crypto, so let’s look at what happened and how to protect yourself. What happened? It wasn't a mistake in the computer code. Instead, experts believe it was a "social engineering" attack. This means hackers tricked people into giving up access—possibly linked to organized professional hacking groups. Key Lessons for You: • "Negative Knowledge" is Power: Sometimes knowing what NOT to do is more important than knowing how to trade. Don't click unknown links or trust "official" messages without double-checking. • Hardware Security: If you hold high-value accounts, use hardware security keys (like YubiKeys) or cold storage. Standard passwords are often not enough anymore. • Stay Alert: Security is a 24/7 job. Always verify the source before moving funds or connecting your wallet. Let’s keep our community safe. Have you updated your security settings lately? 🛡️ #CryptoSecurity #StaySafe #DriftProtocol #BlockchainSecurity #TradingSafety
⚠️ Security Alert: Learning from the $285 Million Drift Exploit ⚠️

There is a lot of talk on Binance Square today about the recent $285 million exploit of the Drift Protocol. Staying safe is the #1 rule in crypto, so let’s look at what happened and how to protect yourself.

What happened?

It wasn't a mistake in the computer code. Instead, experts believe it was a "social engineering" attack. This means hackers tricked people into giving up access—possibly linked to organized professional hacking groups.
Key Lessons for You:

• "Negative Knowledge" is Power: Sometimes knowing what NOT to do is more important than knowing how to trade. Don't click unknown links or trust "official" messages without double-checking.

• Hardware Security: If you hold high-value accounts, use hardware security keys (like YubiKeys) or cold storage. Standard passwords are often not enough anymore.

• Stay Alert: Security is a 24/7 job. Always verify the source before moving funds or connecting your wallet.

Let’s keep our community safe. Have you updated your security settings lately? 🛡️

#CryptoSecurity #StaySafe #DriftProtocol #BlockchainSecurity #TradingSafety
DRIFT $DRIFT: TRUST WAS THE TARGET ⚠️ Attackers did not break the code; they broke the human layer, posing as a fund and earning trust for months before weaponizing a “harmless” signature to seize admin control and drain roughly $270M from the vault. Institutional desks should treat this as a liquidity shock and security reset for DeFi risk, with capital likely favoring venues and assets that carry stronger operational trust. Follow the money. Watch whale rotations out of vulnerable DeFi beta, defend liquidity on top-tier exchange majors, and wait for panic sells to exhaust before chasing any rebound. Not financial advice. Manage your risk. #DriftProtocol #CryptoHack #DeFiRisk #Solana #Crypto ⚡ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
DRIFT $DRIFT: TRUST WAS THE TARGET ⚠️

Attackers did not break the code; they broke the human layer, posing as a fund and earning trust for months before weaponizing a “harmless” signature to seize admin control and drain roughly $270M from the vault. Institutional desks should treat this as a liquidity shock and security reset for DeFi risk, with capital likely favoring venues and assets that carry stronger operational trust.

Follow the money. Watch whale rotations out of vulnerable DeFi beta, defend liquidity on top-tier exchange majors, and wait for panic sells to exhaust before chasing any rebound.

Not financial advice. Manage your risk.

#DriftProtocol #CryptoHack #DeFiRisk #Solana #Crypto

Drift không bị hack vì bug. Nó bị hack vì con người. --- Hacker không tấn công code. Họ tấn công niềm tin. Giả làm quỹ Tiếp cận team Build trust suốt nhiều tháng --- Sau đó? 👉 Lừa ký một giao dịch “vô hại” Nhưng thực tế: đó là chìa khóa admin. --- Khi chữ ký được đặt xuống… 👉 Game kết thúc. Quyền kiểm soát bị chiếm Vault bị rút sạch ~270M USD biến mất --- Không có bug. Không có lỗi contract. 👉 Chỉ có một chữ ký. --- 💣 Chốt: --> “Họ không hack hệ thống… họ khiến bạn tự mở cửa.” $DRIFT $SOL $USDC {future}(USDCUSDT) {future}(SOLUSDT) {future}(DRIFTUSDT) #DriftProtocol #CryptoHack #DeFiRisk
Drift không bị hack vì bug.
Nó bị hack vì con người.

---

Hacker không tấn công code.
Họ tấn công niềm tin.

Giả làm quỹ

Tiếp cận team

Build trust suốt nhiều tháng

---

Sau đó?

👉 Lừa ký một giao dịch “vô hại”

Nhưng thực tế:
đó là chìa khóa admin.

---

Khi chữ ký được đặt xuống…

👉 Game kết thúc.

Quyền kiểm soát bị chiếm

Vault bị rút sạch

~270M USD biến mất

---

Không có bug.
Không có lỗi contract.

👉 Chỉ có một chữ ký.

---

💣 Chốt:

--> “Họ không hack hệ thống…
họ khiến bạn tự mở cửa.”
$DRIFT $SOL $USDC


#DriftProtocol #CryptoHack #DeFiRisk
Golden_Man_News:
Trust is the real vulnerability. Code can be solid, but humans are the ultimate weak link.
DPRK TIE-IN EXPOSES $DRIFT WEAK LINK ⚡ Recent reporting links the Drift Protocol incident to North Korean hackers, underscoring how social engineering and human error can still breach even watched DeFi systems. Institutional desks should tighten access controls, raise counterparty scrutiny, and expect sharper demand for security due diligence across the sector. Not financial advice. Manage your risk. #DriftProtocol #CryptoNews #DeFi #CyberSecurity #Blockchain ✦ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
DPRK TIE-IN EXPOSES $DRIFT WEAK LINK ⚡

Recent reporting links the Drift Protocol incident to North Korean hackers, underscoring how social engineering and human error can still breach even watched DeFi systems. Institutional desks should tighten access controls, raise counterparty scrutiny, and expect sharper demand for security due diligence across the sector.

Not financial advice. Manage your risk.

#DriftProtocol #CryptoNews #DeFi #CyberSecurity #Blockchain

FXRonin - F0 SQUARE:
Great to find your profile. I just added you. I will be sure to interact with your future posts every day. Hope to grow together. Sorry for the bother.
·
--
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers Based on investigation results released around April 5, 2026, the Drift Protocol ($DRIFT) hack involved a $285 million theft linked to North Korean hackers. Key Details of the Investigation: Long-Term Infiltration: The attack was not a sudden exploit but a six-month, organized operation beginning in the fall of 2025. Social Engineering: Attackers posed as a quantitative trading firm and engaged with Drift team members at international conferences. Methodology: The hackers compromised devices via malicious code repository links and the TestFlight application. Final Attack: On April 1, 2026, the attackers utilized these compromises to drain vaults, resulting in $285 million stolen within 12 minutes. Attribution: The investigation indicates the attack was carried out by the same North Korean-related group responsible for the 2024 Radiant Capital theft. #DRIFT #DriftProtocol
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers

Based on investigation results released around April 5, 2026, the Drift Protocol ($DRIFT) hack involved a $285 million theft linked to North Korean hackers.

Key Details of the Investigation:
Long-Term Infiltration: The attack was not a sudden exploit but a six-month, organized operation beginning in the fall of 2025.
Social Engineering: Attackers posed as a quantitative trading firm and engaged with Drift team members at international conferences.
Methodology: The hackers compromised devices via malicious code repository links and the TestFlight application.
Final Attack: On April 1, 2026, the attackers utilized these compromises to drain vaults, resulting in $285 million stolen within 12 minutes.
Attribution: The investigation indicates the attack was carried out by the same North Korean-related group responsible for the 2024 Radiant Capital theft.
#DRIFT #DriftProtocol
·
--
Članek
⚠️ تطورات خطيرة: هل نحن أمام "راديانت" جديدة؟كشفت التحقيقات الأولية في هجوم منصة Drift (الذي وقع في 1 أبريل) عن مفاجأة صادمة: الفاعل هو نفسه المسؤول عن اختراق Radiant Capital في 2024! إليكم ما تحتاجون معرفته: * 🛡️ تخطيط مرعب: الهجوم لم يكن وليد اللحظة، بل استغرق 6 أشهر من التخطيط المسبق. * 🎭 تنكر احترافي: المهاجمون تواصلوا مع مطوري Drift في مؤتمرات عالمية بهويات مزيفة كـ "شركات تداول". * 🇰🇵 بصمات واضحة: تشير التقارير إلى تورط مجموعة UNC4736 المرتبطة بكوريا الشمالية. هذا التنبيه يذكرنا بأن أمن أموالنا يبدأ من الحذر في التعاملات الرقمية والاجتماعية. 🔐 ما رأيكم في تزايد هذه الهجمات "الذكية"؟ شاركونا تعليقاتكم! 👇 $DRIFT DRIFTUSDT دائم 0.04434 +5.19% #Binance ce #CryptoSecurity curity #DriftProtocol tProtocol #Hack ing #blockchain إعجاب | مشاركة | متابعة

⚠️ تطورات خطيرة: هل نحن أمام "راديانت" جديدة؟

كشفت التحقيقات الأولية في هجوم منصة Drift (الذي وقع في 1 أبريل) عن مفاجأة صادمة: الفاعل هو نفسه المسؤول عن اختراق Radiant Capital في 2024!
إليكم ما تحتاجون معرفته:
* 🛡️ تخطيط مرعب: الهجوم لم يكن وليد اللحظة، بل استغرق 6 أشهر من التخطيط المسبق.
* 🎭 تنكر احترافي: المهاجمون تواصلوا مع مطوري Drift في مؤتمرات عالمية بهويات مزيفة كـ "شركات تداول".
* 🇰🇵 بصمات واضحة: تشير التقارير إلى تورط مجموعة UNC4736 المرتبطة بكوريا الشمالية.
هذا التنبيه يذكرنا بأن أمن أموالنا يبدأ من الحذر في التعاملات الرقمية والاجتماعية. 🔐
ما رأيكم في تزايد هذه الهجمات "الذكية"؟ شاركونا تعليقاتكم! 👇
$DRIFT
DRIFTUSDT
دائم
0.04434
+5.19%
#Binance ce #CryptoSecurity curity #DriftProtocol tProtocol #Hack ing #blockchain
إعجاب | مشاركة | متابعة
Prijavite se, če želite raziskati več vsebin
Pridružite se globalnim kriptouporabnikom na trgu Binance Square
⚡️ Pridobite najnovejše in koristne informacije o kriptovalutah.
💬 Zaupanje največje borze kriptovalut na svetu.
👍 Odkrijte prave vpoglede potrjenih ustvarjalcev.
E-naslov/telefonska številka