Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
DeFi's "God Key": From Drift's $285 million theft, the biggest vulnerability in decentralized finance
Drift dealt this blow directly to one of the industry’s most painful wounds—the one it least wants to face.
Author: Deep Tide TechFlow
April 1st, April Fools’ Day.
Solana’s largest perpetual contract exchange, Drift Protocol, is being drained, and the community’s first reaction is, “Nice April Fools’ prank.”
This isn’t a prank. Around 1:30 p.m., the on-chain monitoring accounts Lookonchain and PeckShield nearly simultaneously sounded the alarm: a strange wallet beginning with “HkGz4K” is extracting assets from Drift’s treasury at astonishing speed. The first batch—41 million JLP tokens, worth $155 million. Next came 51.6 million USDC, 125,000 WSOL, 164,000 cbBTC…… A dozen-plus assets streamed out like water from a bathtub with the plugs pulled.
One hour. Drift’s treasury assets fell from $309 million to $41 million. More than half of its TVL evaporated.
On X, the Drift team posted a tweet—rarely, with unusual urgency: “Drift Protocol is under an active attack. Deposits and withdrawals have been paused. We are coordinating with multiple security firms, cross-chain bridges, and exchanges to contain the situation.”
Then came the line destined to be written into the history of crypto: “This is not an April Fools joke.”
A single key, opening every door
The stolen amount from Drift differs across sources. PeckShield estimates about $285 million; Arkham puts it at over $250 million; CertiK’s preliminary assessment is around $136 million. But regardless of which figure holds, this is the largest DeFi security incident to date in 2026.
More than the numbers, what matters is the attack method.
Jiang Xuxian, founder of PeckShield, told Decrypt very plainly that the administrator key behind Drift was “clearly leaked or compromised.” The attack scenario pieced together by on-chain researchers shows that the hackers gained privileged access to the Drift protocol, thereby controlling the flow of funds from the treasury.
In other words: no clever smart-contract exploit, no flash-loan attack, no oracle manipulation. It’s the most primitive, most cliché kind of security failure—someone lost their private key.
Even more unsettling is that the attacker wasn’t acting on a whim. On-chain data shows that this wallet obtained its initial funding via Near Intents eight days before the attack, then remained dormant. A week before the attack, it even received a tiny transfer worth $2.52 from the Drift treasury. A test. A knock on the door.
A week later, the door was kicked in.
The fall of a crypto Robinhood
For Cindy Leow, Drift’s co-founder, the nightmare of April 1st had an especially cruel backdrop.
This Malaysia-based Chinese entrepreneur’s story used to be one of the most inspiring narratives in Solana DeFi. Starting in 2016 with arbitrage in Bitcoin between China and South Korea, she ran a proprietary fund, contributed derivatives projects on Ethereum, and in 2021 co-founded Drift with David Lu—betting on Solana’s on-chain speed advantage for perpetual contracts.
From the timeline alone, Drift seemed to have hit every wave. In 2024, it secured two rounds of funding led by Polychain and Multicoin, totaling $52.5 million. It launched a prediction market to take on Polymarket, rolled out 50x leverage, pushed TVL past $550 million, and accumulated over $50 billion in trading volume. In an interview with Fortune, Leow used a bold positioning: to become a “crypto version of Robinhood.”
That metaphor now reads with mixed, sour notes. Robinhood’s core promise is to give ordinary people access to Wall Street’s financial tools. Drift’s core promise is to give users a “non-custodial” trading experience on-chain—your money doesn’t pass through anyone’s hands; it only interacts with code.
But behind the code is an administrator key. And the security of that key ultimately depends on people, not cryptography.
There’s also a painful historical coincidence. In 2022, in the Drift v1 era, there was already an incident where the treasury was drained. Afterward, the team wrote an extremely detailed technical report and even published a piece of proof-of-concept code showing how attackers could empty the entire treasury in a single transaction. The loss from that incident was $14.5 million, and the team paid users back in full out of its own pocket.
Four years later, the same nightmare returned—scaled up by 20x.
Decentralized faith, centralized Achilles’ heel
If you zoom out from Drift, you’ll find an uncomfortable pattern taking shape.
At the beginning of 2025, Resolv Labs’s AWS key management service was compromised. Attackers used privileged keys to approve large-scale USR stablecoin minting operations, triggering a chain of losses across platforms. In the same year, 2025’s total crypto theft hit a new all-time high of $3.4 billion. Chainalysis’s report specifically pointed to a trend shift: the most destructive events happen at the infrastructure layer. Compromised developer machines, a single minting key stored in the cloud, signature processes phished via social engineering—these are the real black holes that swallow funds.
Now add Drift.
If you line up these cases and look at them together, one conclusion becomes nearly impossible to avoid: private key security has replaced smart-contract bugs as DeFi’s biggest systemic risk.
There’s a cognitive gap here—so large it can swallow tens of billions of dollars.
The story DeFi protocols tell the outside world is “decentralization,” “non-custody,” and “no need to trust.” Your assets are kept by code, with no intermediaries able to touch your money. Users believe that story. They put their money into these protocols, thinking, “I’m dealing with math.”
But the reality is that nearly every live DeFi protocol has one—or several—“keys of god”: admin keys, upgrade permissions, treasury control, and emergency pause switches. The existence of these keys is sometimes for security (so you can hit an emergency brake when things go wrong) and sometimes for flexibility (so you can upgrade contract logic). But their essence is the same: a centralized point of trust wrapped inside decentralized narratives.
Users think they’re interacting with code. In fact, they’re trusting a person—or a small group of people—to not make mistakes, not fall for phishing, not be coerced, not leave their laptop at a café in the middle of the night.
This isn’t unique to Drift; it’s a structural contradiction across the entire DeFi industry.
Where did the $285 million go?
The attacker’s on-chain actions were clean and efficient, with the calmness of a professional.
After draining assets from the Drift treasury, they quickly swapped most of the tokens into stablecoins, then transferred the funds to the Ethereum network via the Wormhole cross-chain bridge. On Ethereum, they used part of the stablecoins to buy about 19,913 ETH (worth roughly $42.6 million); the remaining funds were distributed across multiple wallet addresses.
There’s an absurd detail: the attacker’s wallet also held a large amount of Fartcoin, about 2.5% of that token’s total supply. A hacker who had just carried out the biggest DeFi theft of the year is holding a bunch of meme coins named after farting.
As of the time of this writing, Drift deposits and withdrawals are still paused. The DRIFT token has fallen from around $0.072 before the attack to near $0.05, a drop of more than 28%. From its historical high of $2.60, the cumulative decline is over 98%. Phantom wallet has already popped up warnings to users attempting to access Drift.
The Drift team says it is coordinating with security firms, cross-chain bridge operators, and centralized exchanges to try to freeze and track the stolen funds. But if history can offer any reference, the odds of recovering funds—moved via cross-chain bridges and distributed across multiple wallets—are not optimistic.
An industry-wide issue it must face honestly
Drift dealt this blow directly to one of the industry’s most painful wounds—the one it least wants to face.
In a report at the end of 2025, Chainalysis previously expressed optimism that DeFi security had achieved “substantial progress.” Even if TVL doubled back to $119 billion, DeFi hacker losses were declining. The case of Venus Protocol was presented as a positive example: a security monitoring system detected anomalies 18 hours before the attack, the protocol quickly paused operations, governance mechanisms froze the attackers’ funds, and the attackers even lost money.
Drift puts a dent in this “progress narrative.” You can push smart-contract audits to the limit, deploy the most advanced on-chain monitoring—but as long as a single admin key is compromised by social engineering, phished, or brute-forced, all those security infrastructures become like fortresses built on sand.
The DeFi industry needs to stop and answer one question honestly: when you tell users “non-custodial,” what do you really mean?
If the protocol’s admin key can transfer all assets in the treasury at any time, what’s the actual difference from storing money in a bank account belonging to someone you don’t know? At least banks have insurance, regulation, and legal avenues for recourse.
Maybe the answer isn’t to eliminate these admin permissions—under many circumstances, they’re necessary. But at the very least, the industry should stop pretending they don’t exist. Multi-signature governance, time locks, hardware security modules, key rotation—these technical solutions have existed for years. Yet too many protocols still tie security worth hundreds of millions of dollars to the vigilance of one or two human operators.
The dream of a “crypto Robinhood” is beautiful. But before making it real, maybe the more basic question should come first: who is keeping that key?