April 02, 2026 ChainGPT

Not a hack - Solana durable nonces and social engineering let attacker siphon $270M from Drift

Not a hack - Solana durable nonces and social engineering let attacker siphon $270M from Drift
Summary: A non-bug exploit on Solana let attackers drain at least $270 million from Drift Protocol by abusing a legitimate convenience feature — durable nonces — and social-engineering multisig signers into pre-approving transactions that were executed later under a different context. What happened, in short - This was not a traditional hack: no smart-contract vulnerability, private-key compromise, flash loan, or oracle manipulation was required. - Instead the attacker exploited Solana’s durable nonce feature to create transactions that remain valid indefinitely, obtained two multisig approvals by tricking signers, then executed those pre-signed transactions weeks later to seize protocol-level control and drain funds in under a minute. Why durable nonces matter - Normally Solana transactions include a recent blockhash that expires in ~60–90 seconds, preventing replay of stale approvals. - Durable nonces replace that expiring blockhash with a fixed on-chain nonce so signed transactions can remain valid until submitted — a useful feature for hardware wallets, offline signing, and institutional workflows. - The downside: once a signer approves a durable-nonce transaction it can be executed at any future time unless the nonce account is advanced — something many users don’t monitor. That separation of approval and execution opened the door for abuse. How the attacker used it - Drift’s admin permissions were governed by a five-member Security Council multisig requiring two signatures. - Drift says confirmations were obtained through “unauthorized or misrepresented transaction approvals,” meaning the two signers likely thought they were signing innocuous actions. - Timeline published by Drift: - March 23: Four durable nonce accounts created — two tied to legitimate council members, two controlled by the attacker. That locked in two valid signatures. - March 27: Drift performed a planned Security Council migration (swapping a council member). - March 30: A new durable nonce appeared tied to a member of the updated multisig; the attacker re-established the two-of-five approval threshold under the new setup. - April 1: After Drift executed a legitimate insurance-fund test withdrawal, the attacker submitted the pre-signed durable-nonce transactions. Two transactions, four slots apart, created and approved a malicious admin transfer, then executed it, giving the attacker protocol-level control. Within minutes they deployed a fraudulent withdrawal mechanism and emptied vaults. Funds stolen and movement - On-chain researchers traced roughly $270 million stolen across dozens of tokens. Major portions included: - ~$155.6M in JPL tokens - ~$60.4M in USDC - ~$11.3M in CBBTC - ~$5.65M USDT, ~$4.7M wETH, ~$4.4M WBTC, plus DSOL, JUP, JITOSOL, MSOL, BSOL, EURC and others - The primary drainer wallet was funded eight days before the attack (via NEAR intents) but remained idle until execution. - Stolen funds were routed through intermediary wallets that had been funded the day before using Backpack (which requires identity verification) — a possible investigative lead. - From Solana assets were bridged to Ethereum via Wormhole; several Ethereum addresses were pre-funded through Tornado Cash. - Notably, investigators observed over $230M in USDC bridged from Solana to Ethereum through Circle’s CCTP in 100+ transactions. Circle was criticized for not freezing those USDC during a roughly six-hour window after the attack began. Broader context and implications - On-chain investigators and social-media sleuths likened this to other large incidents where operational or social-engineering failures — not code bugs — led to massive losses (examples called out by the community include Bybit, Ronin, and Cetus). - The core failure was the human/operational layer around the multisig: durable nonces let signing and execution be separated by weeks, letting signers approve actions that no longer matched the later context. - Drift has frozen the protocol, removed the compromised wallet from the multisig, and is withdrawing and safeguarding insurance-fund assets. Deposits into borrow-and-lend products, vault deposits, and trading funds are affected; DSOL tokens not deposited in Drift remain unaffected. Open questions - How exactly were two multisig members induced to approve transactions they didn’t understand? - Could wallets, multisig tools, or UI/UX be improved to flag durable-nonce transactions, require re-confirmation at execution, or otherwise mitigate this vector without breaking legitimate workflows? - Will centralized onramps and issuers like Circle change incident-response practices after criticism that freezing didn’t occur during the critical window? Why this matters - The durable-nonce vector exploits a feature built for legitimate custody needs and is therefore hard to eliminate without changing multisig approval models on Solana. - This incident underscores a larger trend: major DeFi losses increasingly stem from social engineering and operational security lapses rather than smart contract bugs, shifting where projects must focus their defenses — on governance, signing practices, and UX that prevents misrepresentation. Drift says it will publish a more detailed postmortem. Investigators are following on-chain traces and the identity-linked leads through Backpack and NEAR funding activity. Read more AI-generated news on: undefined/news