Drift protocol (DRIFT)

$0.04380  +10.61%  24H

社交熱度指數(SSI)

市場預警排名(MPR)

相關推文

  • toly 🇺🇸 Founder Dev D
     779.39K  @toly
    Tay 💖 atory ndabat B
     88.36K  @tayvano_

    And as you well know the legal bar involves industry standards and unfortunately for everyone in this goddamn ecosystem, Drift was operating more securely that the majority of this industry. They actually used hardware wallets and multisigs. Unlike. The. Majority. Of. This. Industry. That’s why it took 6 months instead of LITERALLY 2 FUCKING DAYS like the last fucking 28 hacks I’ve fucking cleaned up. This industry needs to get serious but giving people unreasonable direction and threatening liability where none exists (BECAUSE THATS HOW DEFI LAWYERS DESIGN IT TO FUCKING BE BTW) is not gunna fly.

     75  7  7.05K
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    DeFi overall security is poor, Drift is relatively safe but the industry still needs reform
  • 𝙶𝙶 TA_Analyst Influencer B
     12.42K  @ggcripto
    Criptovaluta.it D
     30.40K  @CriptovalutaI

    After the "hack" on @DriftProtocol, many are stepping up. And they tell us that many times those who pose as "DeFi" are hardly "De" https://t.co/qX9Mdjecun

     4  1  461
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    DriftProtocol suffered a $285 million attack, raising questions about DeFi decentralization, and Uniswap also voiced criticism.
  • FIREANT Theo acc Trader Community_Lead B
     15.87K  @fireant_korea

    How Project Founders Can Identify the North Korean Lazarus Hacker Group The Lazarus Group is currently being pointed to as the culprit behind the recent @DriftProtocol hack. What makes this incident so terrifying is that it wasn't a technical exploit of system vulnerabilities—it was a thoroughly designed and meticulously planned social engineering attack. However, there is one fascinating fact: South Korean projects have almost never fallen victim to social engineering attacks by Lazarus. While a small sample size might be part of it, I believe the real reason is simple: South Koreans can spot North Koreans. For foreigners, distinguishing between a South Korean and a North Korean can be nearly impossible. But for us? We can instantly catch the subtle differences in their tone, appearance, behavior, and how they respond to questions. This is not something AI can detect. "What if they completely fake it, pretending to be foreigners who don't speak a word of Korean?" Even then, we can filter them out with one simple request. Just ask them to say: "Kim Jung-un is a son of a xxxxx" (김정은 개새끼). Since I am not a North Korean Lazarus hacker, I can say it loud and clear: Kim Jung-un is a son of a xxxxx. To all global blockchain projects out there: Hire a South Korean security officer immediately. *Note: Only native South Koreans who actually grew up in South Korea can catch these subtle nuances. This is not a joke. I am attaching an actual documentary broadcasted by South Korean TV network Channel A, demonstrating exactly how to identify a North Korean hacker. https://t.co/Yz762Gbfou

     3  0  152
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    The tweet warns that the Lazarus hacker group attacked Drift Protocol and recommends hiring a South Korean security expert.
  • Crypto Patel TA_Analyst OnChain_Analyst B
     57.37K  @CryptoPatel

    Drift Protocol Hack: What Really Happened On April 1, 2026, Solana's Largest Perps DEX @DriftProtocol was exploited for $285M, the biggest DeFi hack of 2026. This wasn't a smart contract bug. It was a 6-month social engineering operation linked to North Korean state hackers. How It Happened: → Attackers posed as a quant trading firm since Fall 2025 → Met Drift team face-to-face at multiple conferences → Deposited $1M+ of their own capital to build trust → Compromised contributor devices through malicious code repos and a fake wallet app → Used Solana's "durable nonces" to pre-sign admin transfers weeks in advance → Drained $285M in just 12 minutes → Scrubed all evidence instantly after the attack Key Impact: → $DRIFT token dropped 47%+ → TVL collapsed from $550M to under $250M → 12+ Solana protocols affected → Circle facing backlash for not freezing $232M $USDC fast enough → Mandiant engaged for investigation Biggest Lesson: Audits alone are NOT enough. DeFi's weakest link is now the human layer. Every team must enforce timelocks, audit access controls and treat every multisig device as a potential target. Stay cautious. Stay informed.

    Crypto Patel TA_Analyst OnChain_Analyst B
     57.37K  @CryptoPatel

    BREAKING: Drift Protocol Hacked: ~$270M+ Stolen In Biggest Solana Exploit Since Wormhole One of the largest DeFi hacks in crypto history just happened. Here is everything you need to know: What Happened? On April 1, 2026, attackers drained ~$270M to $285M from Drift Protocol, a major Solana-based decentralized exchange, in under 1 hour. Drift's TVL collapsed from ~$311M to just ~$23M. Deposits and withdrawals are suspended. How Did It Happen?* This was NOT a smart contract bug. PeckShield confirmed the root cause was an admin private key compromise. The attacker gained full admin access, changed the keys to lock out the Drift team, and systematically drained multiple vaults. Onchain data shows the drainer wallet was funded 8 days before the attack via NEAR Intents and sat dormant until execution. A test transaction was even done last week. This was fully premeditated. Stolen Assets: → 41.72M JLP Tokens (~$155.6M) → 51.6M USDC (~$51.6M) → 125K WSOL (~$10.45M) → 282+ BTC → FARTCOIN, WETH, mSOL and more

     180  18  8.33K
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    Drift Protocol suffered a $285 million attack, DRIFT plummeted, DeFi community raises security concerns.
  • Laura Shin Media Influencer C
     282.92K  @laurashin
    Omer Goldberg D
     9.75K  @omeragoldberg

    Diving deep on Drift's exploit w/ @laurashin on @Unchained_pod. This exploit was methodical and calculated. The exploiters spent time studying Drift deeply. The game of security/risk is asymmetric: You only need to be wrong once for it to be over. https://t.co/v12QEEX0Cz

     23  3  6.13K
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    Drift has been carefully exploited, risk is rising, recommendation to stay on the sidelines or be bearish.
  • Beanie Trader Influencer C
     227.93K  @beaniemaxi

    Drift hack explained in full. https://t.co/SbzH2sk8xk

     74  7  11.79K
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    Drift protocol encountered a security incident, contributors were improperly approached leading to fund loss.
  • Lawson Bae VC Tokenomics_Expert B
     6.12K  @lwsnbaker

    This is absolutely wild. $270m hack came down to fake app developers playing the long game and phishing multi-sig holders with a TestFlight app. Almost a decade ago, I watched my team at Tokensoft setup clients with air gapped machines and multi-sigs while preaching security to a growing class of finance clients developing protocols about what attack vectors could be thrown at them. Hearing the levels the Drift hackers went to social engineer the multi-sig holders into installing their fake TestFlight apps is next level. But, it is clear the Drift team and multi-sig holders never battle tested their security setup or used known security protocols now over a decade old.

     24  3  3.52K
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    Drift hackers disguised a TestFlight app to phish multi-sig holders, exposing security vulnerabilities
  • Sjuul | AltCryptoGems TA_Analyst Influencer C
     479.55K  @AltCryptoGems

    $287,000,000 Drift protocol hack didn’t happen overnight; it was planned for 6 months. It started in late 2025. A group approached Drift at conferences, posing as a legit trading firm. They knew the product, asked the right questions, and slowly built trust. They didn’t rush anything. They joined calls, asked smart questions, and even deposited $1M+ into Drift. Everything looked normal. Then they went deeper. More meetings. More conversations. By early 2026, they were no longer outsiders; they were trusted. Then came the setup. They shared links, code repositories, and even a TestFlight app. All of it looked standard for crypto collaboration. But this is where things changed. One wrong click. One cloned repo. One installed app. That’s all it took. On April 1st, the attack was executed. $287M drained. And right after it happened… they disappeared. Chats wiped. Tools deleted. No trace left behind. Now investigators believe this wasn’t random. This was a coordinated operation, planned for months, possibly linked to state‑backed actors.

     336  7  22.69K
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    Drift protocol suffered a $287M hack, suspected to be a long‑term, state‑backed operation.
  • Cointelegraph Media Influencer C
     2.92M  @Cointelegraph

    🚨 EXPLOIT: Drift Protocol hit with ~$280M hack after months-long infiltration. https://t.co/Jj0NZ97yYh

     129  31  19.38K
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    Drift Protocol suffered an approximate $280M hack, is under investigation and cooperating with law enforcement.
  • InfoSpace OG DeFi_Expert FA_Analyst C
     92.09K  @InfoSpace_OG
    2rhyme D
     2.04K  @emex2rhyme

    to summarize drift Protocol suffered one of the most sophisticated hacks ever no code exploit, just pure social engineering. for 6 months, attackers posed as legit traders, met the team, gained trust, then used malicious links ,$280M gone. lesson? doxxing isn’t trust, keep devices separate, and don’t open random apps. stay safe out there

     9  5  348
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    Drift was hacked, losing $280M, reminding you not to click links arbitrarily.