Some checks are pending
Mirror PR to Forgejo / mirror (pull_request) Waiting to run
Pentagon-Agent: Rio <HEADLESS>
55 lines
5.2 KiB
Markdown
55 lines
5.2 KiB
Markdown
---
|
|
type: source
|
|
title: "Drift Protocol $285M DPRK Hack — Social Engineering + Durable Nonces + Fake Oracle (April 1, 2026)"
|
|
author: "Chainalysis"
|
|
url: https://www.chainalysis.com/blog/lessons-from-the-drift-hack/
|
|
date: 2026-04-01
|
|
domain: internet-finance
|
|
secondary_domains: []
|
|
format: article
|
|
status: unprocessed
|
|
priority: medium
|
|
tags: [defi-security, exploit, solana, governance, north-korea, dprk, oracle-manipulation]
|
|
---
|
|
|
|
## Content
|
|
|
|
Drift Protocol on Solana was drained of $285 million on April 1, 2026 — the largest DeFi hack of 2026 and the second-largest in Solana history (behind the $326M Wormhole bridge hack, 2022).
|
|
|
|
**Attack mechanism (three stages):**
|
|
1. **Social engineering (months-long):** Attackers posed as a quantitative trading firm, building trust with Drift contributors. Exploited Solana's "durable nonces" feature — allowing transactions to be signed for later execution — to trick Security Council members into pre-signing dormant transactions that would transfer admin control.
|
|
2. **Fake token oracle:** CVT (CarbonVote Token) — a fake asset created March 12, 2026 by attackers. Total supply: 750M tokens. Seeded a small Raydium liquidity pool, wash-traded to anchor price at ~$1. Deployed a price oracle they controlled to feed that artificial price to Drift.
|
|
3. **Admin control → asset drainage:** After gaining admin control, changed protocol parameters to accept CVT as collateral with infinite borrowing limits. Deposited 500M CVT, withdrew $285M in real assets (USDC, SOL, ETH).
|
|
|
|
**Attribution:** DPRK-linked (UNC4736/Citrine Sleet/AppleJeus), same group as October 2024 Radiant Capital hack ($50M). Medium-high confidence per SEAL 911 investigation.
|
|
|
|
**Impact:** TVL fell from ~$550M to <$300M in under an hour. DRIFT token dropped 40%+.
|
|
|
|
**2026 context:** Year-to-date (4.5 months): $771.8M stolen across 47 incidents. April alone: $606M — worst month since Feb 2025. 2025 total: $3.4B. Bridge exploits: $2.8B+ since 2022 (40% of all Web3 value hacked).
|
|
|
|
## Agent Notes
|
|
|
|
**Why this matters:** Tests Belief #1 (capital allocation as civilizational infrastructure). If DeFi mechanisms are losing $285M to a single state-sponsored hack, does that undermine the claim that programmable coordination is superior infrastructure?
|
|
|
|
**What surprised me:** The attack vector is NOT the governance mechanism — it's centralized admin control in a supposedly decentralized protocol. The Security Council had unilateral signing authority that could be socially engineered. This is an argument FOR futarchy-style distributed governance (no single admin control), not against DeFi as a category.
|
|
|
|
**What I expected but didn't find:** Evidence that the GOVERNANCE mechanism (not custody/admin) was the failure point. The Drift hack is an operational security failure at the admin layer — essentially, Drift had a de facto centralized controller despite claiming decentralization.
|
|
|
|
**KB connections:**
|
|
- [[Community ownership accelerates growth through aligned evangelism not passive holding]] — $285M hack harms community ownership thesis via wealth destruction. But the hack is an admin centralization failure, not an ownership alignment failure.
|
|
- [[Proxy inertia is the most reliable predictor of incumbent failure because current profitability rationally discourages pursuit of viable futures]] — TradFi incumbents would use this hack as evidence against DeFi. But TradFi hacks (JPMorgan 2014: 76M accounts; Equifax 2017: $700M) are comparable in scale and occurred despite massive compliance overhead. The comparison does not favor TradFi.
|
|
|
|
**Extraction hints:**
|
|
- Claim: "DeFi protocols with nominally decentralized governance but centralized admin keys face state-sponsored social engineering attacks that exploit the gap between formal and effective decentralization"
|
|
- Note for extractor: This source is primarily for security/failure mode cataloguing, not futarchy mechanism analysis. The governance dimension is that Drift's Security Council represented centralized control that futarchy-style conditional markets would not — a mechanism design lesson, not a critique.
|
|
- Cross-domain flag: Theseus might want this for AI+security at DeFi intersection; the social engineering (months-long fake quant firm persona) is a sophisticated AI-enabled attack pattern.
|
|
|
|
**Context:** Largest DeFi hack of 2026. North Korean state-sponsored hacking of crypto has been a persistent vector since 2022 (Axie Infinity $625M, Harmony $100M, Wormhole $326M). The Drift hack follows their pattern of months-long infiltration before execution.
|
|
|
|
## Curator Notes
|
|
|
|
PRIMARY CONNECTION: [[Community ownership accelerates growth through aligned evangelism not passive holding]] — community wealth is destroyed in large hacks; tests the resilience of community-owned protocols
|
|
|
|
WHY ARCHIVED: Largest DeFi hack of 2026; relevant to Belief #1 disconfirmation search (does DeFi infrastructure create more risk than it eliminates?); important mechanism design lesson about gap between formal and effective decentralization
|
|
|
|
EXTRACTION HINT: Focus on the governance angle: centralized admin key = single point of failure that futarchy's distributed mechanism is designed to avoid; this hack is evidence for stronger mechanism design, not evidence against DeFi as a category
|