Drift exploit prompts on-chain outreach to $280M stolen ETH after Solana–Ethereum attack

In the wake of a major DeFi attack, Drift Protocol has begun direct outreach over the drift exploit as investigators trace funds across multiple blockchains.

Drift targets hacker wallets with on-chain messages

On April 3, Drift Protocol escalated its response to the recent hack by sending on-chain messages to four Ethereum wallets holding the bulk of the stolen assets. According to blockchain data, these addresses together control roughly 129,000 ETH, tied to what has become one of the largest DeFi exploits of 2026.

The exploit drained an estimated $270 million to $285 million from the protocol, severely disrupting trading and liquidity conditions. However, the team now claims to have identified key parties linked to the incident and is publicly urging them to open a dialogue rather than remain silent.

The outreach was made from a known Drift-controlled address, which transmitted a standardized message to each of the four target wallets. Moreover, the move signals that the protocol is willing to explore negotiated resolutions, a path other crypto projects have taken in previous large-scale thefts.

Message calls for communication via Blockscan chat

The content of the message was concise. Drift told the wallet owners it is “ready to speak” and requested that they respond using Blockscan chat, an off-chain communication tool linked to Ethereum addresses. This mirrors prior cases where attacked projects sought to open a communication channel with hackers.

Historically, such efforts have produced mixed outcomes. In some high-profile hacks, dialogue led to partial or even full recovery of assets, sometimes under the label of a “white-hat” arrangement. That said, in other situations, attackers ignored messages and continued moving funds, leaving victims with little hope of restitution.

In this case, security teams and on-chain analytics providers are also examining whether the theft and subsequent transfers show patterns associated with organized cybercrime. However, any potential attribution remains unconfirmed, and the focus for now is on tracking flows and preserving evidence.

How the attack bypassed smart contracts

The drift exploit stands out because it did not rely on a traditional smart contract bug. Instead, it exploited a system-level weakness around Solana durable nonces, a legitimate feature that lets developers prepare and sign transactions in advance for later submission.

The attacker used pre-signed transactions that had been created weeks earlier, then managed to obtain partial control over the protocol’s multisig governance setup. With that influence, they disabled or bypassed several risk controls designed to protect user funds. Consequently, once safeguards were weakened, the hacker could drain capital from multiple vaults in rapid succession.

The entire operation unfolded quickly, resulting in the loss of more than half of Drift Protocol’s total value locked. Moreover, the event underscores how governance design and key management can be as critical as contract code in safeguarding DeFi platforms.

Cross-chain transfers and stolen ETH concentration

After emptying the vaults, the attacker did not leave the assets on Solana. Instead, they used cross-chain infrastructure to move the funds to Ethereum, converting a large share into ETH. On-chain data, highlighted by analytics firms like Arkham, shows approximately 129,000 ETH now distributed across four key wallets.

This pattern fits a broader trend where attackers use cross chain bridged funds to complicate tracking and recovery. However, such moves also create highly visible concentrations of value that can be watched in real time by exchanges, law enforcement, and independent researchers.

Despite active monitoring, there has been criticism from some community members over what they view as a slow operational response. Specifically, users have questioned why certain tokens or positions were not frozen sooner or hedged more aggressively once anomalous governance activity was detected.

Organized crime suspicions and ongoing investigation

Several industry observers have speculated about possible links between the attacker and known cybercrime organizations, especially given the sophistication of the governance take-over and transaction planning. That said, public statements from Drift and external security teams emphasize that there is no definitive attribution yet.

Law enforcement and private incident response groups are reportedly coordinating to follow the blockchain on chain message trail and the flows of the stolen ETH. Moreover, investigators are examining historical activity on the impacted wallets to see whether older transactions connect to previously flagged entities.

For now, Drift has committed to releasing more information once third-party audits and forensic reviews are complete. The protocol’s social channels, including its official X account, have been used to aggregate updates and reference key on-chain transactions for the community.

Impact on Drift, DRIFT token, and DeFi liquidity

The fallout extends beyond the protocol’s immediate losses. Recent data indicates that nearly 20 interconnected DeFi projects suffered knock-on effects from the incident. Some protocols temporarily paused services or restricted certain operations to prevent potential contagion and manage defi liquidity impact.

The native DRIFT token reacted sharply, posting a steep decline as news of the exploit and governance compromise spread. Market confidence in leverage and derivatives products on Solana also took a hit, reflecting broader risk reassessments by professional and retail traders alike.

However, it is important to note that Solana’s base layer continues to function normally. The breach occurred at the application and governance level, not due to a consensus or protocol failure. This distinction matters for long-term ecosystem perception and for investors evaluating smart contract risk.

Lessons for governance and security design

The attack highlights how even well-reviewed code can be undermined by weaknesses in governance structures, key sharing, and operational processes. In this case, the partial multisig governance compromise enabled the attacker to weaponize previously signed transactions and legitimate protocol features.

Security experts argue that more robust key rotation policies, tighter access controls, and real-time monitoring of governance actions could have limited the damage. Moreover, clearer incident playbooks and automated circuit breakers might help protocols react faster when abnormal changes in permissions or vault behavior occur.

As the investigation into the Drift Protocol exploit continues, the case is likely to become a reference point for risk frameworks and security reviews across DeFi. In summary, the incident underlines that code audits alone are not enough; resilient governance, key management, and cross-chain monitoring are essential to prevent similar large-scale losses.

DRIFT-7,72%
ETH-0,43%
SOL1,32%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin