Disclaimer: SpendNode is for informational purposes only and is not a financial advisor. Some links on this site are affiliate links - we may earn a commission at no extra cost to you. This does not affect our data or rankings. Affiliate DisclosureView Policy
Crypto News

Drift Protocol Confirms Its $280M Exploit Used Pre-Signed Nonce Transactions and Social Engineering

Published: Apr 2, 2026By SpendNode Editorial

Key Analysis

Drift Protocol reveals the $280M Solana exploit relied on durable nonce pre-signed transactions and targeted social engineering, not a smart contract bug.

Drift Protocol Confirms Its $280M Exploit Used Pre-Signed Nonce Transactions and Social Engineering

Drift Protocol has confirmed the attack vector behind its $280 million exploit: pre-signed durable nonce transactions combined with targeted social engineering. The Solana-based perpetuals exchange, which held $550 million in total value locked before the breach, disclosed the finding on April 2, 2026, roughly 18 hours after the initial drain began.

The confirmation shifts the narrative. Early speculation centered on smart contract vulnerabilities, oracle manipulation, or a brute-force private key compromise. Instead, the attacker convinced a privileged team member to sign transactions that did not execute immediately, then submitted them at a time of their choosing.

How Durable Nonce Transactions Became a Weapon

On Solana, standard transactions expire after roughly 60 to 90 seconds if they reference a recent blockhash that ages out. Durable nonce transactions bypass that window entirely. They replace the blockhash with a stored nonce value, which means a signed transaction can sit dormant for days, weeks, or longer and still execute when submitted.

The feature exists for legitimate reasons: multisig wallets where signers operate across time zones, cold storage operations that need offline signing, and custodial workflows that batch transactions. But in Drift's case, the attacker weaponized that persistence. By socially engineering a team member into signing admin-level transactions referencing durable nonces, the attacker obtained signed payloads that did not need to be submitted immediately. The transactions stayed valid until the attacker chose to execute them.

PeckShield founder Jiang Xuxian noted early on that "the admin keys behind Drift were definitely leaked or compromised." The durable nonce detail explains how: the keys were not leaked in the traditional sense. The holder was tricked into signing specific transactions, and the signatures alone were enough to move $280 million.

What Was Taken

The drain unfolded in roughly 11 transactions starting around 11:06 a.m. ET on April 1. The attacker's wallet, beginning with HkGz4K, had received 1 SOL the prior week and made a $2.52 test transfer from the Drift Vault before the main extraction.

The breakdown, according to PeckShield and Arkham Intelligence:

  • 41.72 million JLP tokens worth $159.3 million
  • $71.4 million in USDC
  • 125,000 WSOL ($10.45 million)
  • 164,349 cbBTC ($11.29 million)
  • Smaller amounts in USDT, WETH, and assorted Solana tokens including memecoins

Total estimates range from $270 million (The Defiant) to $285 million (PeckShield), with the figure settling around $280 million as cross-chain bridging and swaps make precise accounting difficult. The attacker bridged a portion of the funds to Ethereum and purchased 19,913 ETH worth approximately $42.6 million.

The DRIFT Token Fallout

DRIFT dropped 28% on the day of the exploit, trading at roughly $0.049, a 98% decline from its November 2024 all-time high of $2.60. As of April 2, 2026, the token has not meaningfully recovered.

The broader Solana DeFi ecosystem also took a hit. SOL is trading at $79.07, down 5.8% over seven days as of this writing. The Fear and Greed Index reads 27, squarely in "Fear" territory. Whether the Drift exploit is a primary driver or just one factor in a risk-off week is hard to isolate, but the timing compounds the pressure.

Why Social Engineering Keeps Working

This is not the first time social engineering has delivered a nine-figure crypto loss. The Ronin Bridge ($625 million, 2022) involved compromised validator keys obtained through a fake job interview. The Bybit exploit earlier in 2025 used a similar playbook: trick a signer, obtain a valid signature, execute later.

Durable nonces add a twist. In most social engineering attacks against crypto protocols, the attacker needs the victim to sign and submit in the same session, or the attacker needs the raw private key. With durable nonces, the attacker only needs one valid signature on a carefully constructed transaction. The victim might not even realize what they signed, because the transaction does not execute at the time of signing. There is no immediate on-chain footprint to trigger an alert.

For self-custody card users and DeFi participants, the lesson is uncomfortable: protocol-level security is only as strong as the operational security of the people who hold admin keys. Smart contract audits cannot catch a team member being tricked into signing a malicious transaction.

What Happens Next

Drift has paused deposits and withdrawals and says it is coordinating with security firms, bridges, and exchanges to trace and potentially freeze the stolen funds. The attacker's rapid bridging to Ethereum suggests they are aware of Solana's more centralized validator set, which could theoretically facilitate coordinated freezing.

No timeline has been given for resuming operations. Drift has not announced a recovery fund or user reimbursement plan. The protocol held over 50% of its TVL in the compromised vaults, so any restart will likely require both a full post-mortem and new key management procedures.

DeFi Development Corp., a publicly traded company previously linked to the Solana DeFi ecosystem, issued a statement confirming zero exposure to Drift Protocol.

Overview

Drift Protocol confirmed on April 2, 2026, that its $280 million exploit was carried out via pre-signed durable nonce transactions and targeted social engineering, not a smart contract vulnerability. The attacker drained over 50% of the protocol's $550 million TVL in roughly 11 transactions, converting stolen assets across Solana and Ethereum. DRIFT token fell 28%. The incident is now the largest DeFi exploit of 2026 and a case study in why operational security failures remain more dangerous than code bugs.

Recommended Reading

DisclaimerThis article is provided for informational purposes only and does not constitute financial advice. All fee, limit, and reward data is based on issuer-published documentation as of the date of verification.

Have a question or update?

Discuss this analysis with the community on X.

Discuss on X

Comments

Comments are moderated and may take a moment to appear.