Cryptic Daily logo

Cryptic Daily

News for markets, builders, and policy

NewsCrypto NewswireWeb3 BuilderWeb3 Fraud FilesAbout

Independent Crypto Journal

Cryptic
Daily

Daily reporting on crypto markets, builders, policy, and fraud without the noise floor most sites mistake for momentum.

XTelegramRSS

Explore

  • Home
  • News
  • Crypto Newswire
  • Web3 Builder

Categories

  • Crypto Newswire
  • Web3 Builder
  • Web3 Fraud Files

Company

  • About
  • Contact
  • Editorial Policy
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Advertise

© 2026 Cryptic Daily. All rights reserved.

Cryptocurrency prices are for informational purposes only. Not financial advice.

Home›Web3 Fraud Files›Drift Protocol Hack Exposes Governance R…
Web3 Fraud Files

Drift Protocol Hack Exposes Governance Risk in Solana Durable Nonce Workflows

Berat Oshily

Berat Oshily

Editorial desk

YesterdayUpdated April 9, 20267 min read
Share••LinkedIn•
A glowing blockchain control system shows one compromised pathway disrupting an entire crypto network. The image represents governance and transaction workflow risks behind a major protocol exploit.

The Drift Protocol exploit on April 1 did not begin with a matching-engine bug or a liquidation flaw. It began when pre-signed governance approvals stayed live long enough for an attacker to turn signer manipulation into admin control and an estimated $285.3 million drain of user assets, according to BlockSec’s incident analysis. The case matters now because the same transaction assumptions still sit under a large share of Solana treasury, upgrade, and admin workflows.

The Drift exploit began as a signer workflow failure

What makes the Drift incident stand out is the order of operations. The attacker did not first break protocol logic and then hunt for funds. They first shaped the approval path, then used those approvals to move the protocol into a state where valid-looking operations could move real assets out. In BlockSec’s reconstruction, the attack starts weeks before execution, when malicious transactions were prepared and at least two signers were induced to approve them through misleading or phishing-style signing requests. That timeline matters because it places the core failure outside the contracts most traders think about. The theft that users saw onchain was the monetization stage of a governance compromise that had already matured. For builders, that is the uncomfortable point. The same protocol can have audited contracts and still lose control if signer review, transaction display, and execution policy are treated as operational details rather than as part of the security model. That wider class of failure is exactly why governance incidents keep spilling into market structure, treasury design, and user trust, a pattern that sits squarely inside Web3 Fraud Files coverage when a protocol’s own control layer becomes the route to loss rather than the line of defense.

Durable nonces removed the safety of transaction expiry

The technical hinge of the attack was Solana’s durable nonce feature. In Solana’s documentation, durable nonce transactions replace the recent blockhash with a stored nonce value, removing the normal 150-slot expiry window and allowing delayed submission after signing. That feature exists for legitimate reasons, including offline signing and workflows that need more time between authorization and broadcast. But it also strips away a safety property many signers rely on without naming it. Under normal blockhash rules, a bad approval often dies quickly if nobody submits it. Under durable nonce rules, a bad approval can sit in reserve until an attacker decides the timing is right. In Drift, that meant social engineering no longer had to win a race. It only had to succeed once. After that, execution timing belonged to the attacker, not the signer. This is why the story goes beyond one protocol and into infrastructure design. Any mechanism that separates signing from execution changes the threat model for councils, treasuries, and admin control. The teams treating that issue seriously will likely be the same ones that drive the next wave of safer multisig tooling across Web3 Builder, where user-facing interfaces now need to explain not just what a transaction does but how long that approval can remain dangerous.

A 2-of-5 council with zero timelock left no room to respond

Drift’s Security Council reportedly operated with a 2-of-5 threshold and no timelock, a configuration that compressed the response window to almost nothing once the malicious approvals were triggered. Threshold numbers often dominate governance discussions, but threshold alone does not define safety. It tells you how many people must agree. It does not tell you whether a bad decision can be slowed, scoped, or reversed before funds move. In the Drift case, according to BlockSec, two approvals were enough to authorize administrative actions with immediate effect. That meant the protocol had no built-in pause between permission and consequence. The contrast with the current Squads time-lock documentation and the Squads Protocol v4 repository is hard to ignore. Squads v4 expands beyond simple threshold signing with time locks, spending limits, roles, and other controls that acknowledge multisig security is about policy, not just key count. Drift’s architecture looked adequate until signer assumptions failed. Once that happened, the absence of delay became its own vulnerability. The broader market will read this as another reason to stop treating privileged governance actions like ordinary wallet approvals, especially in the same week that risk-sensitive flows and protocol trust keep dominating Crypto Newswire coverage across the sector.

Fake collateral and oracle control turned governance access into a balance-sheet drain

Admin control alone did not generate the profit. It created the conditions for accounting manipulation inside the protocol. BlockSec says the attacker added a malicious collateral asset called CVT, shifted pricing to an attacker-controlled oracle, relaxed withdrawal protections, and then withdrew high-value assets against fabricated collateral value. That sequence explains why this incident should not be filed as a generic multisig compromise and forgotten. Governance access was the door. The asset-valuation stack was the vault interior. Once the system accepted an illiquid token as valuable collateral, the attacker did not need to break borrowing logic. They only needed to feed that logic false inputs. The classification on DeFiLlama’s Drift page captures the combination in plain terms: compromised admin plus fake token price manipulation. That pairing matters because it shows how governance and market structure now sit on top of each other in large DeFi venues. A protocol can secure matching, liquidation, and settlement logic and still fail if governance can redefine what counts as collateral or which oracle the system trusts. That is the deeper balance-sheet lesson of Drift. When admin rights can rewrite valuation, governance risk becomes solvency risk in a matter of blocks.

The next Solana response will focus on scoped permissions and expiring intent

The most serious answer to Drift is not simply raising signer count or banning a feature that has valid uses. The real shift will be toward narrower permissions, shorter approval lifetimes, and mandatory delay around the small set of actions that can alter collateral policy, oracle authority, admin ownership, or withdrawal controls. Solana’s own durable nonce docs make the central point clear: delayed submission is a feature, not a side effect. That means protocols must supply the missing risk controls themselves. Time-bound approvals, nonce-rotation policies, separate councils for different risk domains, and visible timelocks for high-privilege actions all become more attractive after an exploit like this. The same goes for better signer tooling. A signer should not just see an instruction hash or a transaction payload. They should see the blast radius, the lifetime of the approval, and whether the transaction grants rights that can later reshape collateral or price sources. Squads already offers a path toward some of those controls in its v4 feature set. The open question is how quickly major Solana protocols adopt them before the next attacker tests the same assumptions from a different angle.

Drift’s loss will push builders to redesign the boundary between human approval and onchain execution, because that is where this exploit actually lived. The next serious governance stack on Solana will be judged less by how many signers it has and more by how tightly it scopes authority, how fast stale intent expires, and how much time exists to stop a catastrophic action before value leaves the system.

This article is for informational purposes only and does not constitute financial or investment advice.

Reference Desk

Sources & References

5 Linked
  • 01BlockSec - Drift Protocol Incident Analysisblocksec.com↗
  • 02Solana Docs - Durable Noncessolana.com↗
  • 03Squads Docs - Time-locksdocs.squads.so↗
  • 04Squads Protocol v4 - GitHubgithub.com↗
  • 05DeFiLlama - Driftdefillama.com↗
Berat Oshily
SocialFollow on X
Berat Oshily
Web3 & NFT Correspondent

Berat Oshily has spent the last ten years deep in the weeds of crypto security not from the sidelines, but hands-on, working contracts, breaking systems, and figuring out exactly where things go wrong. Based in Birmingham, he focuses on Web3 fraud: the scams, the exploits, the rug pulls, and the smart contract vulnerabilities that cost real people real money. He knows how attackers think because he has spent years testing the same systems they target. Beyond the technical work, Berat has a knack for making complicated on-chain fraud understandable whether he's talking to security professionals or someone who just lost funds to a phishing link. You'll often find him at blockchain conferences across the UK and Europe, sharing what he knows.

Continue Reading

Related Articles

Additional reporting and adjacent stories connected to this topic.

3 Picks
A futuristic digital vault appears to break open as glowing crypto coins pour uncontrollably into a damaged blockchain network. The image suggests a stablecoin system failure caused by compromised minting infrastructure.
Web3 Fraud Files
7 min read

Yesterday

Resolv Infinite Mint Exposed the Soft Underbelly of Stablecoin Issuance

Resolv’s infinite mint exploit exposed how a compromised service role and weak issuance controls can turn a stablecoin backend into a balance-sheet failure.

Berat Oshily
Berat Oshily
Yesterday
A shadowy figure stands amid glowing blockchain trails and digital assets in a dark forensic setting. The scene conveys a major crypto hack investigation focused on theft and money laundering.
Web3 Fraud Files
8 min read

Yesterday

Maryland Man Charged Over $50M Uranium Finance Hacks

Federal prosecutors have charged a Maryland man over the 2021 Uranium Finance exploits, turning a long-running DeFi hack into a named criminal case built on fraud, laundering, and post-hack spending.

Berat Oshily
Berat Oshily
Yesterday
Investigators examine glowing blockchain trails while shadowy hackers appear in the distance across a dark digital network. The image suggests a major crypto exploit with suspected nation-linked actors.
Web3 Fraud Files
7 min read

Yesterday

Drift Beckons North Korea-Linked Hackers After $285M Exploit

Drift Protocol’s response to its $285 million exploit has shifted on-chain as the project publicly beckons wallets tied to the attack while forensic scrutiny intensifies.

Berat Oshily
Berat Oshily
Yesterday
Trending Desk
Live
01

Cipher Digital Stock Jumps as Miner-to-Data-Center Pivot Comes Into Focus

02

Where Bitcoin Goes Next After Its Worst Quarter Since 2018

03

Resolv Infinite Mint Exposed the Soft Underbelly of Stablecoin Issuance

04

Nakamoto Shares Hit New Low as Bitcoin Treasury Firm Sells BTC

05

Solana Foundation Backs STRIDE Security Push After $285M Drift Hack

Browse latest coverage