Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
#DriftProtocolHacked
2026’s Largest DeFi Attack
On the first day of April 2026, Drift Protocol, a popular decentralized finance (DeFi) protocol operating on the Solana blockchain, was hit by a massive attack in which approximately $285 million worth of crypto assets were stolen. This incident is recorded as the largest DeFi security breach and financial loss of 2026.
The attack began on April 1, 2026, and unfolded within just a few minutes. The attackers gained control of the protocol’s governance keys, drained liquidity pools, and bridged the assets to the Ethereum network, where they were converted into ETH.
How Did the Attack Happen?
This attack was not caused by a simple code vulnerability, but rather by the compromise of governance controls:
1) Abuse of Administrative Permissions
The attackers gained access to Drift’s multisig (multi-signature) governance system. This system requires a certain number of signatures for critical operations, but the attackers managed to obtain enough signatures to take control of the protocol.
2) Oracle Manipulation and Fake Token Creation
According to some reports, the attackers created a fake token and manipulated oracle systems to make it appear highly valuable. This allowed the protocol to accept the fake asset as legitimate collateral and exchange real assets against it.
3) Cross-Chain Transfers
The stolen assets were rapidly moved from Solana to Ethereum and converted into approximately 129,000 ETH. This cross-chain movement made it significantly harder to trace and recover the funds.
Who Is Responsible?
Multiple blockchain security research firms suggest that the attack may be linked to North Korean hacker groups. Patterns observed in the attack show similarities with previously known DPRK-associated operations.
Additionally, technical analyses within the crypto community suggest that this was a long-term, well-planned operation involving social engineering tactics. According to these interpretations, the attackers may have built trust over several months before gaining access to critical keys.
Market and Ecosystem Impact
The DRIFT token experienced a significant price drop, and confidence in the Solana ecosystem was shaken.
Total Value Locked (TVL) in Drift Protocol decreased by approximately 50%.
Deposits and withdrawals for users were temporarily suspended.
Protocol Response and Security Measures
Following the attack, the Drift team took several actions:
Reconfigured multisig permissions and revoked compromised keys
Began working with security firms to track funds on-chain
Planned independent audits to improve security and prevent similar incidents in the future
DeFi Security Lessons — Why This Matters
This incident demonstrated that risks in DeFi protocols are not limited to software vulnerabilities alone, but also include governance processes and the human factor. Components such as multisig structures, oracle data feeds, and cross-chain bridges are all critical points that require strong security considerations.
Conclusion
#DriftProtocolHacked stands as the largest DeFi attack of 2026. The incident represents not only a major financial loss but also highlights serious vulnerabilities in decentralized finance architecture and the growing risks of human-targeted and governance-based exploits. This hack once again emphasizes the need for DeFi projects to reassess both their technical and operational security strategies.
#GateSquareAprilPostingChallenge
#CreatorLeaderboard