
The Drift Protocol exploit on April 1 did not begin with a matching-engine bug or a liquidation flaw. It began when pre-signed governance approvals stayed live long enough for an attacker to turn signer manipulation into admin control and an estimated $285.3 million drain of user assets, according to BlockSec’s incident analysis. The case matters now because the same transaction assumptions still sit under a large share of Solana treasury, upgrade, and admin workflows.
The Drift exploit began as a signer workflow failure
What makes the Drift incident stand out is the order of operations. The attacker did not first break protocol logic and then hunt for funds. They first shaped the approval path, then used those approvals to move the protocol into a state where valid-looking operations could move real assets out. In BlockSec’s reconstruction, the attack starts weeks before execution, when malicious transactions were prepared and at least two signers were induced to approve them through misleading or phishing-style signing requests. That timeline matters because it places the core failure outside the contracts most traders think about. The theft that users saw onchain was the monetization stage of a governance compromise that had already matured. For builders, that is the uncomfortable point. The same protocol can have audited contracts and still lose control if signer review, transaction display, and execution policy are treated as operational details rather than as part of the security model. That wider class of failure is exactly why governance incidents keep spilling into market structure, treasury design, and user trust, a pattern that sits squarely inside Web3 Fraud Files coverage when a protocol’s own control layer becomes the route to loss rather than the line of defense.
Durable nonces removed the safety of transaction expiry
The technical hinge of the attack was Solana’s durable nonce feature. In Solana’s documentation, durable nonce transactions replace the recent blockhash with a stored nonce value, removing the normal 150-slot expiry window and allowing delayed submission after signing. That feature exists for legitimate reasons, including offline signing and workflows that need more time between authorization and broadcast. But it also strips away a safety property many signers rely on without naming it. Under normal blockhash rules, a bad approval often dies quickly if nobody submits it. Under durable nonce rules, a bad approval can sit in reserve until an attacker decides the timing is right. In Drift, that meant social engineering no longer had to win a race. It only had to succeed once. After that, execution timing belonged to the attacker, not the signer. This is why the story goes beyond one protocol and into infrastructure design. Any mechanism that separates signing from execution changes the threat model for councils, treasuries, and admin control. The teams treating that issue seriously will likely be the same ones that drive the next wave of safer multisig tooling across Web3 Builder, where user-facing interfaces now need to explain not just what a transaction does but how long that approval can remain dangerous.
A 2-of-5 council with zero timelock left no room to respond
Drift’s Security Council reportedly operated with a 2-of-5 threshold and no timelock, a configuration that compressed the response window to almost nothing once the malicious approvals were triggered. Threshold numbers often dominate governance discussions, but threshold alone does not define safety. It tells you how many people must agree. It does not tell you whether a bad decision can be slowed, scoped, or reversed before funds move. In the Drift case, according to BlockSec, two approvals were enough to authorize administrative actions with immediate effect. That meant the protocol had no built-in pause between permission and consequence. The contrast with the current Squads time-lock documentation and the Squads Protocol v4 repository is hard to ignore. Squads v4 expands beyond simple threshold signing with time locks, spending limits, roles, and other controls that acknowledge multisig security is about policy, not just key count. Drift’s architecture looked adequate until signer assumptions failed. Once that happened, the absence of delay became its own vulnerability. The broader market will read this as another reason to stop treating privileged governance actions like ordinary wallet approvals, especially in the same week that risk-sensitive flows and protocol trust keep dominating Crypto Newswire coverage across the sector.
Fake collateral and oracle control turned governance access into a balance-sheet drain
Admin control alone did not generate the profit. It created the conditions for accounting manipulation inside the protocol. BlockSec says the attacker added a malicious collateral asset called CVT, shifted pricing to an attacker-controlled oracle, relaxed withdrawal protections, and then withdrew high-value assets against fabricated collateral value. That sequence explains why this incident should not be filed as a generic multisig compromise and forgotten. Governance access was the door. The asset-valuation stack was the vault interior. Once the system accepted an illiquid token as valuable collateral, the attacker did not need to break borrowing logic. They only needed to feed that logic false inputs. The classification on DeFiLlama’s Drift page captures the combination in plain terms: compromised admin plus fake token price manipulation. That pairing matters because it shows how governance and market structure now sit on top of each other in large DeFi venues. A protocol can secure matching, liquidation, and settlement logic and still fail if governance can redefine what counts as collateral or which oracle the system trusts. That is the deeper balance-sheet lesson of Drift. When admin rights can rewrite valuation, governance risk becomes solvency risk in a matter of blocks.
The next Solana response will focus on scoped permissions and expiring intent
The most serious answer to Drift is not simply raising signer count or banning a feature that has valid uses. The real shift will be toward narrower permissions, shorter approval lifetimes, and mandatory delay around the small set of actions that can alter collateral policy, oracle authority, admin ownership, or withdrawal controls. Solana’s own durable nonce docs make the central point clear: delayed submission is a feature, not a side effect. That means protocols must supply the missing risk controls themselves. Time-bound approvals, nonce-rotation policies, separate councils for different risk domains, and visible timelocks for high-privilege actions all become more attractive after an exploit like this. The same goes for better signer tooling. A signer should not just see an instruction hash or a transaction payload. They should see the blast radius, the lifetime of the approval, and whether the transaction grants rights that can later reshape collateral or price sources. Squads already offers a path toward some of those controls in its v4 feature set. The open question is how quickly major Solana protocols adopt them before the next attacker tests the same assumptions from a different angle.
Drift’s loss will push builders to redesign the boundary between human approval and onchain execution, because that is where this exploit actually lived. The next serious governance stack on Solana will be judged less by how many signers it has and more by how tightly it scopes authority, how fast stale intent expires, and how much time exists to stop a catastrophic action before value leaves the system.
This article is for informational purposes only and does not constitute financial or investment advice.
Berat Oshily has spent the last ten years deep in the weeds of crypto security not from the sidelines, but hands-on, working contracts, breaking systems, and figuring out exactly where things go wrong. Based in Birmingham, he focuses on Web3 fraud: the scams, the exploits, the rug pulls, and the smart contract vulnerabilities that cost real people real money. He knows how attackers think because he has spent years testing the same systems they target. Beyond the technical work, Berat has a knack for making complicated on-chain fraud understandable whether he's talking to security professionals or someone who just lost funds to a phishing link. You'll often find him at blockchain conferences across the UK and Europe, sharing what he knows.
Continue Reading
Related Articles
Additional reporting and adjacent stories connected to this topic.
Yesterday
Resolv Infinite Mint Exposed the Soft Underbelly of Stablecoin Issuance
Resolv’s infinite mint exploit exposed how a compromised service role and weak issuance controls can turn a stablecoin backend into a balance-sheet failure.

Yesterday
Maryland Man Charged Over $50M Uranium Finance Hacks
Federal prosecutors have charged a Maryland man over the 2021 Uranium Finance exploits, turning a long-running DeFi hack into a named criminal case built on fraud, laundering, and post-hack spending.

Yesterday
Drift Beckons North Korea-Linked Hackers After $285M Exploit
Drift Protocol’s response to its $285 million exploit has shifted on-chain as the project publicly beckons wallets tied to the attack while forensic scrutiny intensifies.



