Share on XShare on LinkedInShare on Telegram
Hack Analysis

Drift Protocol $285M Multisig Exploit (Explained)

Breaking down Drift Protocol’s $285M hack, multisig risks, exploit mechanics and actionable DeFi security lessons.

Author
QuillAudits Team
April 3, 2026
Drift Protocol $285M Multisig Exploit (Explained)
Share on XShare on LinkedInShare on Telegram

On April 1, 2026, Drift Protocol, one of Solana's largest perpetual DEXs with over $550M in TVL, was hit by a $285M exploit. This wasn't a smart contract vulnerability. The attacker social-engineered two out of five multisig signers into pre-signing malicious transactions using Solana's durable nonce feature, then used those signatures to hijack admin control and drain the vaults in under 12 minutes. It stands as the largest DeFi hack of 2026 and the second-largest in Solana's history behind the Wormhole bridge exploit.
 

Hack Analysis

This wasn’t a smart contract bug, it was a social engineering attack. Between March 23 - 30, multiple durable nonce accounts were created across both multisig members and attacker-controlled wallets, suggesting that at least 2/5 signers had been compromised, even after the planned Security Council migration on March 27.

Despite the migration, the attacker maintained access within the updated multisig and continued preparing nonce-based transactions for delayed execution.

Shortly after, they used these pre-signed transactions to take over admin control and execute the exploit within minutes.

Screenshot 2026-04-03 at 1.40.08 PM.png

With admin access, the attacker created multiple spot markets using a fake token (CVT), set up manipulated oracles under their control, and modified withdrawal limits.

Screenshot 2026-04-03 at 1.48.58 PM.pngScreenshot 2026-04-03 at 1.43.55 PM.pngScreenshot 2026-04-03 at 1.45.04 PM.pngScreenshot 2026-04-03 at 1.45.33 PM.png

Using a second account (HkGz4KmoZ7Zmk7HN6ndJ31UJ1qZ2qgwQxgVqQwovpZES), the attacker began draining the vault by posting the fake CVT token as collateral and borrowing real assets against it. Since both the oracle and the CVT supply were under their control, the borrow appeared legitimate within the system.

Screenshot 2026-04-03 at 1.51.26 PM.pngScreenshot 2026-04-03 at 1.52.14 PM.pngScreenshot 2026-04-03 at 1.53.31 PM.png

By repeatedly executing this borrow loop through 33 transactions, the attacker drained the vault, extracting over $285M across multiple tokens. Below is the complete breakdown of token amounts and their corresponding dollar value.

Screenshot 2026-04-03 at 1.56.57 PM.png

TokenAmountUSD Value
JLP42.72M$159.35M
USDC71.42M$71.42M
cbBTC164.35$11.29M
USDT5.65M$5.65M
USDS5.25M$5.25M
WETH2,200.59$4.69M
dSOL45,292.21$4.47M
WBTC63.47$4.36M
Fartcoin23.37M$4.11M
JitoSOL33,976.51$3.60M
syrupUSDC2.87M$3.32M
INF21,241.62$2.50M
mSOL17,418.92$1.99M
bsol9,474.33$1.02M
EURC583,980.69$677.42K
zBTC8.61$586.79K
USDY477,375.42$539.43K
JUP2.62M$431.44K
WSOL0.03$2.74
Total $285.26M

Root Cause

The Drift exploit was not caused by a bug in the protocol's smart contracts. It was an operational security failure rooted in a poorly configured multisig and social engineering.

Drift's Security Council ran on a Squads V4 multisig with a 2/5 signing threshold. On-chain records show exactly how this played out, at block 410344005 (16:05:18 UTC), the first transaction created the malicious proposal and recorded the first approval. Just one second later at block 410344009 (16:05:19 UTC), the second transaction carried the approval and immediately executed the admin transfer in the same atomic transaction, with no timelock to delay execution after the threshold was met.

The attacker exploited Solana's durable nonce feature to collect these signatures days before the actual attack. Durable nonces bypass the standard ~60 second blockhash expiry on Solana, allowing signed transactions to remain valid indefinitely. Between March 23 and March 30, the attacker created nonce accounts tied to at least two multisig members and likely tricked them into signing what appeared to be routine transactions. These were actually payloads for an admin transfer.

On March 27, Drift migrated its Security Council multisig, swapping most signers and keeping only one from the old set. Instead of closing the attack window, this created a second one. Within three days, the attacker had re-established nonce based access to two signers on the new multisig.

When the attack triggered on April 1, everything was already in place. Two pre-signed transactions, submitted one second apart, transferred full admin control to the attacker. From there, they created fake spot markets using a worthless token (CVT), disabled circuit breakers, removed withdrawal limits, and drained over $285M through 33 borrow-loop transactions, all within minutes.

Screenshot 2026-04-03 at 2.19.56 PM.pngScreenshot 2026-04-03 at 2.23.33 PM.pngScreenshot 2026-04-03 at 2.20.16 PM.png

How QuillAudits On-Chain Monitoring Could Have Prevented This

QuillAudits' on-chain monitoring system tracks real-time administrative changes, multisig activity, and abnormal fund movements, exactly the kind of signals this attack produced.

Durable nonce account creation detection. The attacker created multiple durable nonce accounts between March 23 - 30 linked to multisig signers. On-chain monitoring would have flagged unusual nonce account activity tied to privileged addresses, raising an alert days before the exploit.

Multisig configuration change alerts. When Drift migrated its Security Council on March 27 with a 2/5 threshold and zero timelock, monitoring would have flagged this as a high-risk governance change for a protocol holding $550M+ in TVL.

Admin transfer detection. The moment the admin authority was transferred to an unknown address, at 16:05 UTC, real-time alerts would have triggered immediate incident response, potentially before the attacker could disable circuit breakers and begin draining.

Abnormal withdrawal pattern detection. The attacker executed 33 rapid borrow-loop transactions to drain the vault. Monitoring systems tracking withdrawal velocity and volume against historical baselines would have flagged this within the first few transactions, enabling faster intervention by bridge operators and stablecoin issuers like Circle to freeze assets in transit.

Fake market and oracle manipulation alerts. The creation of new spot markets (CVT) with an unrecognized token and an attacker-controlled oracle would have been detected as anomalous, especially when collateral weights were immediately set to maximum values in the same transaction.

With QuillAudits monitoring in place, the attack window between admin takeover and fund drainage, roughly 10 minutes, could have been significantly compressed, and downstream laundering through Jupiter, CCTP, and Wormhole could have been disrupted much earlier.
 

Funds Flow After Attack

The attacker drained over $285M across multiple tokens, then swapped most of it into USDC, WSOL, WBTC, and WETH using Jupiter Protocol.

Screenshot 2026-04-03 at 1.09.09 PM.pngScreenshot 2026-04-03 at 1.10.16 PM.png

The attacker followed a classic playbook—splitting funds across multiple wallets and then moving them further to create a complex web of transactions.

Screenshot 2026-04-03 at 1.15.10 PM.png

After all the swaps and layered transfers, the attacker bridged the funds to Ethereum, consolidating everything into ETH. The assets are now sitting across four attacker-controlled EOAs.

Screenshot 2026-04-03 at 1.16.50 PM.pngScreenshot 2026-04-03 at 1.17.03 PM.pngScreenshot 2026-04-03 at 1.17.15 PM.pngScreenshot 2026-04-03 at 1.17.25 PM.png

Post Attack Mitigation

The team had confirmed an active attack, paused deposits and withdrawals, and is working closely with security partners to contain the incident as quickly as possible.

After the pause, the team shared the root cause along with a Twitter-based postmortem.

The team is also reaching out to the attacker via blockscan chat in an attempt to negotiate.

Relevant Address and Transactions

Attacker EOAs Ethereum

Attacker Account Solana

Drift Vault

JCNCMFXo5M5qwUPg2Utu1u6YWp3MbygxqBsBeXXJfrw
 

Drift Vault State

5zpq7DvB6UdFFvpmBPspGPNfUGoBRRCE2HHg5u3gxcsN
 

Drift V2 Program

dRiftyHA39MWEi3m9aunc5MzRF1JYuBsbn6VPcn33UH
 

Admin Update Transactions

Drift Vault Arkham Profile

JCNCMFXo5M5qwUPg2Utu1u6YWp3MbygxqBsBeXXJfrw
 

Conclusion

The Drift exploit is a clear example of how operational security failures can bypass even audited smart contracts. A weak 2/5 multisig threshold, zero timelock, and the abuse of durable nonces gave the attacker everything they needed. No code was broken, governance was. For protocols managing hundreds of millions, real-time on-chain monitoring, stricter multisig configurations, and signer verification processes are no longer optional, they are the last line of defense.

Contents

Tell Us About Your Project
Subscribe to Newsletter
hashing bits image
Loading...
cta-bg

WE SECURE EVERYTHING YOU BUILD.

From day-zero risk mapping to exchange-ready audits — QuillAudits helps projects grow with confidence. Smart contracts, dApps, infrastructure, compliance — secured end-to-end.

QuillAudits Logo


DeFi SecurityplumeUniswap FoundationAethiropt-collectivePolygon SPNBNB Chain Kickstart

All Rights Reserved. © 2026. QuillAudits - LLC