Pipeline Active
Last: 12:00 UTC|Next: 18:00 UTC
← Back to Insights

North Korean Hackers Exploited Solana's Own Feature to Drain Drift $285M

Drift Protocol lost $285M on April 1—largest crypto hack of 2026. DPRK attackers weaponized Solana's durable nonce feature to bypass multisig. 20 DeFi protocols now face contagion.

Drift ProtocolDPRKSolanahackdurable nonces2 min readApr 3, 2026
High ImpactMedium-termSolana -5-10% medium-term, Ethereum +5-10% on bifurcation narrative

Cross-Domain Connections

Drift protocol-layer vulnerabilityEthereum institutional consolidation narrative

Protocol design flaws drive institutional preference toward Ethereum's consolidated, audited infrastructure model

What Happened

Drift Protocol, a Solana-based perpetuals exchange, suffered a $285M exploit on April 1, 2026—the largest crypto hack of the year. Elliptic and TRM Labs identified DPRK (Lazarus Group) indicators in the attack.

The attackers did not exploit code bugs in Drift. Instead, they weaponized Solana's "durable nonce" feature—a transaction type designed for hardware wallet convenience. Durable nonces remain valid indefinitely until explicitly used, unlike normal Solana transactions which expire in ~60 seconds.

How the Attack Worked

The attack unfolded across 5 stages:

Stage 1 (March 11): Attackers compromised Drift's five-member Security Council multisig via supply chain attack or social engineering.

Stage 2 (March 11-31): Using the compromised signer, attackers pre-signed malicious transactions with durable nonces. These transactions would remain valid for weeks.

Stage 3 (March 31): Attackers created a fake token ("CarbonVote Token") and used wash trading to establish false price history.

Stage 4 (April 1): Attackers executed the pre-signed durable nonce transaction, gaining control of Drift's oracles. They then marked the fake token as worth hundreds of millions in collateral, borrowed $285M from Drift's vaults.

Stage 5 (April 1-2): Stolen assets were consolidated into USDC and SOL, then bridged to Ethereum via Circle's Cross-Chain Transfer Protocol (CCTP) for institutional cash-out.

Why This Is Critical

The durable nonce vulnerability cannot be patched via code audit or smart contract update. It's embedded in Solana's core transaction design. Fixing it requires a protocol-level hard fork affecting all 400K validators on the network.

This creates two structural risks:

1. Contagion: Any Solana protocol using multisig governance faces identical risk. Elliptic confirmed 11-20 DeFi projects already hit by cascading liquidations (Ranger Finance, Reflect Money, Marinade, Jupiter).

2. Protocol design vulnerability: DPRK targeted a feature that was deliberately designed—not a bug. This signals threat actors can weaponize any protocol design choice, not just exploit code flaws.

What This Means for Institutional Crypto

The Drift exploit reinforces a bifurcation in institutional risk tolerance: Ethereum's consolidation model (intentional validator concentration + regulatory clarity) becomes attractive relative to Solana's high-throughput model (protocol design complexity + contagion risk).

Expect institutional capital to rotate toward Ethereum and away from Solana ecosystem protocols over the next 3-6 months.

Share