Drift Protocol Hack: $270M Drained via Solana's Durable Nonces
The Drift Protocol on the Solana blockchain suffered a significant security breach, resulting in the loss of at least $270 million in user funds. Unlike many DeFi exploits, this incident did not stem from a bug in Drift’s code or compromised private keys. Instead, attackers exploited a legitimate Solana feature known as 'durable nonces'.
Understanding Durable Nonces
How the Feature Works
Solana transactions typically include a 'recent blockhash,' a timestamp ensuring the transaction is recent and valid. This blockhash expires quickly, usually within 60-90 seconds. Durable nonces offer an alternative, replacing the expiring blockhash with a fixed 'nonce' stored on the blockchain. This allows transactions to remain valid indefinitely until explicitly submitted.
This feature is designed to support hardware wallets, offline signing, and institutional custody solutions. However, it introduces a risk: once a transaction is pre-approved with a durable nonce, it can be executed at any time, even weeks or months later, without the signer’s immediate control or ability to revoke approval.
The Drift Protocol Exploit
Pre-Signing Transactions
The attacker leveraged durable nonces to pre-sign administrative transfers weeks before executing them. By securing approvals from two members of Drift’s five-member Security Council multisig, they created transactions that remained valid for an extended period. This bypassed the protocol’s standard multisig security measures.
On March 23rd, four durable nonce accounts were created, two linked to legitimate Drift Security Council members and two controlled by the attacker. This indicated the attacker had already secured the necessary signatures. By March 30th, the attacker had re-obtained the required two-of-five approval threshold following a Security Council migration.
Execution and Fund Drain
The attack unfolded rapidly on March 30th. After a legitimate test withdrawal, the attacker submitted the pre-signed transactions. Within minutes, they gained control of Drift’s protocol-level permissions and initiated a fraudulent withdrawal mechanism, draining the protocol’s vaults.
Onchain researchers tracked the stolen funds, totaling approximately $270 million across various tokens. The largest amounts included $155.6 million in JPL tokens, $60.4 million in USDC, and significant holdings in CBBTC, USDT, and other cryptocurrencies.
Fund Flows and Investigation
The initial drainer wallet was funded via NEAR Protocol intents eight days prior to the attack. Stolen funds were routed through intermediary wallets funded via Backpack, a decentralized exchange requiring identity verification. From there, funds were transferred to Ethereum addresses via Wormhole, and subsequently obscured using Tornado Cash, a sanctioned privacy mixer.
Over $230 million in USDC was bridged from Solana to Ethereum via Circle's CCTP. Critics have questioned why Circle did not freeze the stolen funds during the initial six-hour period following the attack.
The Human Factor and Protocol Response
The core failure was identified as a vulnerability in the human layer surrounding the multisig. Durable nonces allowed the attacker to separate the approval and execution phases of the transaction, creating a disconnect between the signer’s initial understanding and the eventual outcome.
All deposits into Drift’s products, including borrow-and-lend, vault deposits, and trading funds, were affected. The protocol has been frozen, and the compromised wallet has been removed from the multisig. This marks the third major DeFi exploit in recent months not caused by code vulnerabilities, highlighting the growing threat of social engineering and operational failures.
Comments 0