BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up
HomeNewsAttorney calls Drift Protocol's $280M hack preventable negligence

Attorney calls Drift Protocol’s $280M hack preventable negligence

-

A legal expert alleges that the $280 million exploit of the Solana-based Drift Protocol resulted from a failure to follow basic security procedures, which may constitute civil negligence. Attorney Ariel Givner stated the team did not properly secure signing keys and conducted insufficient due diligence on developers. The Drift team’s investigation indicates the sophisticated attack involved months of social engineering by actors linked to previous major hacks.


Attorney Ariel Givner contends the massive exploit of the Drift Protocol could have been prevented with standard security practices. “In plain terms, civil negligence means they failed their basic duty to protect the money they were managing,” she stated in response to the team’s post-mortem report.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

Givner asserted the Drift team neglected fundamental measures like keeping signing keys on air-gapped systems. She also criticized their due diligence on developers met at industry conferences, a failure she said every serious project understands.

“They knew crypto is full of hackers, especially North Korean state teams,” Givner said. She claimed the team spent months chatting on Telegram and meeting strangers, which led to compromised devices containing multisignature controls.

Advertisements for class action lawsuits against the platform are already circulating, Givner mentioned. The incident highlights social engineering and project infiltration as critical threats to cryptocurrency platforms.

The Drift Protocol team’s update outlined a meticulously planned six-month attack. Threat actors initially approached developers at a major conference in October 2025 under the guise of seeking collaboration.

After building rapport, the actors sent malicious links and embedded malware on developer machines. The team stated with “medium-high confidence” that the same actors behind the October 2024 Radiant Capital hack executed this exploit.

Radiant Capital previously stated its hack involved malware sent via Telegram from a North Korea-aligned hacker. The Drift team noted the individuals who physically approached them were not North Korean nationals.

Most Popular

Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount