DeFi's "God Key": From Drift's $285 million theft, the biggest vulnerability in decentralized finance

Drift dealt this blow directly to one of the industry’s most painful wounds—the one it least wants to face.

Author: Deep Tide TechFlow

April 1st, April Fools’ Day.

Solana’s largest perpetual contract exchange, Drift Protocol, is being drained, and the community’s first reaction is, “Nice April Fools’ prank.”

This isn’t a prank. Around 1:30 p.m., the on-chain monitoring accounts Lookonchain and PeckShield nearly simultaneously sounded the alarm: a strange wallet beginning with “HkGz4K” is extracting assets from Drift’s treasury at astonishing speed. The first batch—41 million JLP tokens, worth $155 million. Next came 51.6 million USDC, 125,000 WSOL, 164,000 cbBTC…… A dozen-plus assets streamed out like water from a bathtub with the plugs pulled.

One hour. Drift’s treasury assets fell from $309 million to $41 million. More than half of its TVL evaporated.

On X, the Drift team posted a tweet—rarely, with unusual urgency: “Drift Protocol is under an active attack. Deposits and withdrawals have been paused. We are coordinating with multiple security firms, cross-chain bridges, and exchanges to contain the situation.”

Then came the line destined to be written into the history of crypto: “This is not an April Fools joke.”

A single key, opening every door

The stolen amount from Drift differs across sources. PeckShield estimates about $285 million; Arkham puts it at over $250 million; CertiK’s preliminary assessment is around $136 million. But regardless of which figure holds, this is the largest DeFi security incident to date in 2026.

More than the numbers, what matters is the attack method.

Jiang Xuxian, founder of PeckShield, told Decrypt very plainly that the administrator key behind Drift was “clearly leaked or compromised.” The attack scenario pieced together by on-chain researchers shows that the hackers gained privileged access to the Drift protocol, thereby controlling the flow of funds from the treasury.

In other words: no clever smart-contract exploit, no flash-loan attack, no oracle manipulation. It’s the most primitive, most cliché kind of security failure—someone lost their private key.

Even more unsettling is that the attacker wasn’t acting on a whim. On-chain data shows that this wallet obtained its initial funding via Near Intents eight days before the attack, then remained dormant. A week before the attack, it even received a tiny transfer worth $2.52 from the Drift treasury. A test. A knock on the door.

A week later, the door was kicked in.

The fall of a crypto Robinhood

For Cindy Leow, Drift’s co-founder, the nightmare of April 1st had an especially cruel backdrop.

This Malaysia-based Chinese entrepreneur’s story used to be one of the most inspiring narratives in Solana DeFi. Starting in 2016 with arbitrage in Bitcoin between China and South Korea, she ran a proprietary fund, contributed derivatives projects on Ethereum, and in 2021 co-founded Drift with David Lu—betting on Solana’s on-chain speed advantage for perpetual contracts.

From the timeline alone, Drift seemed to have hit every wave. In 2024, it secured two rounds of funding led by Polychain and Multicoin, totaling $52.5 million. It launched a prediction market to take on Polymarket, rolled out 50x leverage, pushed TVL past $550 million, and accumulated over $50 billion in trading volume. In an interview with Fortune, Leow used a bold positioning: to become a “crypto version of Robinhood.”

That metaphor now reads with mixed, sour notes. Robinhood’s core promise is to give ordinary people access to Wall Street’s financial tools. Drift’s core promise is to give users a “non-custodial” trading experience on-chain—your money doesn’t pass through anyone’s hands; it only interacts with code.

But behind the code is an administrator key. And the security of that key ultimately depends on people, not cryptography.

There’s also a painful historical coincidence. In 2022, in the Drift v1 era, there was already an incident where the treasury was drained. Afterward, the team wrote an extremely detailed technical report and even published a piece of proof-of-concept code showing how attackers could empty the entire treasury in a single transaction. The loss from that incident was $14.5 million, and the team paid users back in full out of its own pocket.

Four years later, the same nightmare returned—scaled up by 20x.

Decentralized faith, centralized Achilles’ heel

If you zoom out from Drift, you’ll find an uncomfortable pattern taking shape.

At the beginning of 2025, Resolv Labs’s AWS key management service was compromised. Attackers used privileged keys to approve large-scale USR stablecoin minting operations, triggering a chain of losses across platforms. In the same year, 2025’s total crypto theft hit a new all-time high of $3.4 billion. Chainalysis’s report specifically pointed to a trend shift: the most destructive events happen at the infrastructure layer. Compromised developer machines, a single minting key stored in the cloud, signature processes phished via social engineering—these are the real black holes that swallow funds.

Now add Drift.

If you line up these cases and look at them together, one conclusion becomes nearly impossible to avoid: private key security has replaced smart-contract bugs as DeFi’s biggest systemic risk.

There’s a cognitive gap here—so large it can swallow tens of billions of dollars.

The story DeFi protocols tell the outside world is “decentralization,” “non-custody,” and “no need to trust.” Your assets are kept by code, with no intermediaries able to touch your money. Users believe that story. They put their money into these protocols, thinking, “I’m dealing with math.”

But the reality is that nearly every live DeFi protocol has one—or several—“keys of god”: admin keys, upgrade permissions, treasury control, and emergency pause switches. The existence of these keys is sometimes for security (so you can hit an emergency brake when things go wrong) and sometimes for flexibility (so you can upgrade contract logic). But their essence is the same: a centralized point of trust wrapped inside decentralized narratives.

Users think they’re interacting with code. In fact, they’re trusting a person—or a small group of people—to not make mistakes, not fall for phishing, not be coerced, not leave their laptop at a café in the middle of the night.

This isn’t unique to Drift; it’s a structural contradiction across the entire DeFi industry.

Where did the $285 million go?

The attacker’s on-chain actions were clean and efficient, with the calmness of a professional.

After draining assets from the Drift treasury, they quickly swapped most of the tokens into stablecoins, then transferred the funds to the Ethereum network via the Wormhole cross-chain bridge. On Ethereum, they used part of the stablecoins to buy about 19,913 ETH (worth roughly $42.6 million); the remaining funds were distributed across multiple wallet addresses.

There’s an absurd detail: the attacker’s wallet also held a large amount of Fartcoin, about 2.5% of that token’s total supply. A hacker who had just carried out the biggest DeFi theft of the year is holding a bunch of meme coins named after farting.

As of the time of this writing, Drift deposits and withdrawals are still paused. The DRIFT token has fallen from around $0.072 before the attack to near $0.05, a drop of more than 28%. From its historical high of $2.60, the cumulative decline is over 98%. Phantom wallet has already popped up warnings to users attempting to access Drift.

The Drift team says it is coordinating with security firms, cross-chain bridge operators, and centralized exchanges to try to freeze and track the stolen funds. But if history can offer any reference, the odds of recovering funds—moved via cross-chain bridges and distributed across multiple wallets—are not optimistic.

An industry-wide issue it must face honestly

Drift dealt this blow directly to one of the industry’s most painful wounds—the one it least wants to face.

In a report at the end of 2025, Chainalysis previously expressed optimism that DeFi security had achieved “substantial progress.” Even if TVL doubled back to $119 billion, DeFi hacker losses were declining. The case of Venus Protocol was presented as a positive example: a security monitoring system detected anomalies 18 hours before the attack, the protocol quickly paused operations, governance mechanisms froze the attackers’ funds, and the attackers even lost money.

Drift puts a dent in this “progress narrative.” You can push smart-contract audits to the limit, deploy the most advanced on-chain monitoring—but as long as a single admin key is compromised by social engineering, phished, or brute-forced, all those security infrastructures become like fortresses built on sand.

The DeFi industry needs to stop and answer one question honestly: when you tell users “non-custodial,” what do you really mean?

If the protocol’s admin key can transfer all assets in the treasury at any time, what’s the actual difference from storing money in a bank account belonging to someone you don’t know? At least banks have insurance, regulation, and legal avenues for recourse.

Maybe the answer isn’t to eliminate these admin permissions—under many circumstances, they’re necessary. But at the very least, the industry should stop pretending they don’t exist. Multi-signature governance, time locks, hardware security modules, key rotation—these technical solutions have existed for years. Yet too many protocols still tie security worth hundreds of millions of dollars to the vigilance of one or two human operators.

The dream of a “crypto Robinhood” is beautiful. But before making it real, maybe the more basic question should come first: who is keeping that key?

DRIFT-40.31%
SOL-4.99%
USDC-0.01%
ETH-3.93%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments