Get the latest crypto news, updates, and reports by subscribing to our free newsletter.
Giấy phép số 4978/GP-TTĐT do Sở Thông tin và Truyền thông Hà Nội cấp ngày 14 tháng 10 năm 2019 / Giấy phép SĐ, BS GP ICP số 2107/GP-TTĐT do Sở TTTT Hà Nội cấp ngày 13/7/2022.
© 2026 Index.vn
Drift's public update frames the exploit as a six-month, coordinated campaign that required funding, planning, and patience. That matters because it shifts the discussion away from the usual DeFi script, where a protocol bug gets exploited within hours of discovery, and toward a more uncomfortable possibility: the weak point may have been people, operations, or infrastructure around the protocol rather than code alone. The platform has not, at least in the information currently public, published a full technical post-mortem with transaction-by-transaction mechanics. External estimates cited losses at around $280 million, putting the incident among the larger DeFi hits on Solana and a fresh reminder that "decentralized" does not mean immune to targeted intrusion. [2] Drift also said it is working with investigators and that its confidence level around attribution is preliminary rather than absolute. That caveat is important. Attributing crypto hacks is messy work, and onchain fund flows alone rarely close the case. Still, the comparison to the Radiant exploit is not random. The implication is that investigators saw overlapping tactics, infrastructure, or operational fingerprints. Why the Radiant link matters Radiant Capital's October 2024 hack, which drained about $58 million, was widely discussed as a sophisticated compromise rather than a simple contract bug. If Drift's suspected attacker really is the same group, then the pattern looks familiar: long lead time, careful preparation, and a payoff large enough to justify the effort. That style of operation is often associated with state-backed or state-tolerated threat actors, especially those willing to invest months in reconnaissance and social engineering. Drift did not publicly spell out every indicator behind its assessment, but its language about "organizational backing" and "significant resources" points in that direction. Sure, ordinary criminals can be organized too, but not many hobbyists run half-year intrusion campaigns for DeFi targets. [3] Additional reporting and industry chatter around the incident have also pointed toward a North Korean nexus, though Drift's own statement appears more measured than some of the faster headlines. That distinction matters. Suspecting a profile is not the same as proving one. [4] The likely lesson: the attack surface was bigger than the contract A months-long setup usually suggests one thing: the exploitable moment was only the final act. The real compromise likely happened earlier, through access, trust, or process. That could mean compromised devices, stolen credentials, poisoned communications, manipulated approvals, or social engineering against team members and service providers. Those methods are less glamorous than finding an elegant bug in a perpetuals engine, but they are often more effective. Crypto still has a habit of defending the vault while leaving the office door ajar. Without a full forensic report, it would be premature to declare the exact entry point. But Drift's own wording strongly suggests the exploit chain involved more than a code-level flaw. "Structured intelligence operation" is not how teams usually describe a math bug. [SEC, CFTC Clarify Crypto and DeFi Rules] Scale of the damage At roughly $280 million, the exploit was large enough to hit far beyond Drift's direct user base. Losses of that size ripple through market makers, liquidity conditions, counterparties, and user confidence across Solana DeFi. Even protocols that were not technically exposed end up paying the reputational tax. [5] That is especially relevant for derivatives venues like Drift, where trust depends on more than TVL and trading volume. Users need confidence that collateral systems, withdrawals, backstops, and emergency controls will work under stress. A major breach tests all of that at once. The incident also lands in a market that has spent the past year trying to convince institutions that onchain trading infrastructure is becoming mature. Then a quarter-billion-dollar exploit arrives with the words "months of deliberate preparation" attached. Not ideal marketing copy. What the investigation tells the industry Drift's statement is a useful reminder that crypto security failures are no longer just about auditing smart contracts and calling it a day. Mature attackers study organizations, not just codebases. They map employees, vendors, workflows, signing practices, update procedures, and communication habits. The protocol is the target, but the route in may look more like corporate espionage than DeFi tinkering. That has implications for every serious onchain venue. Security budgets need to cover endpoint hardening, staff training, access controls, transaction verification procedures, and incident response drills, not just formal verification and bug bounties. The attacker only needs one weak link. The protocol team has to secure all of them, because of course it does. It also sharpens the case for better disclosure standards after major hacks. Users and counterparties need more than a headline loss figure and a promise that investigators are involved. They need a clear timeline, the suspected intrusion path, the affected systems, and concrete remediation steps. Otherwise the market is left guessing whether the problem was exceptional or repeatable. Looking ahead The next meaningful milestone is Drift's full post-mortem. That report should answer the questions that actually matter: whether the exploit stemmed from contract logic, operational compromise, signer security, third-party tooling, or some combination of the above. It should also show what controls failed, what has already been changed, and what risks remain open. Just as important will be fund tracing and any recovery effort. If investigators can tie wallet activity, laundering patterns, or infrastructure overlaps to prior incidents such as Radiant, the attribution case gets stronger. If not, the "medium-high confidence" label may stay exactly that, suggestive but incomplete. For the broader market, the story is not simply that Drift lost a lot of money. DeFi has seen that movie before. The sharper takeaway is that a major protocol believes it was studied for months before being hit. That should worry every team still treating security as a code review problem with a Discord announcement attached.
In brief\n\nBitcoin dropped to about $93,000, falling back below the EMA50 and putting its recent golden cross at risk of invalidation. The global crypto market cap stands at $3.15 trillion, down 2.38% in 24 hours. On Myriad Markets, 82% of the money is betting on Bitcoin pumping to $100K before…