Bitcoin Forum
April 15, 2026, 08:57:26 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Drift Data Breach 2026  (Read 43 times)
WillyAp (OP)
Member
**
Offline Offline

Activity: 1386
Merit: 81

Looking for guilt best look first into a mirror


View Profile WWW
April 14, 2026, 07:54:10 PM
Merited by NeuroticFish (2)
 #1

Is everyone that immersed into the strait of Hormuz, Ukraine wars?

Quote
On April 1, 2026, Drift Protocol suffered a $285 million security breach after attackers exploited a 2/5 multisig configuration and used social engineering to gain control. The theft occurred in under 15 minutes, with funds drained through a fraudulent token. The incident revealed critical flaws in governance and key management. Experts are now urging a protocol update to incorporate hardware security modules and professional custody solutions.

https://www.kucoin.com/news/flash/drift-protocol-loses-285m-in-security-breach-exposing-defi-governance-weaknesses?lang=en_US&

A hack subtracting around 285 m Dollar and bitcointalk did not notice? 

Marketing in EN und DEES
NeuroticFish
Legendary
*
Offline Offline

Activity: 4368
Merit: 7140


Looking for campaign manager? Contact icopress!


View Profile
April 14, 2026, 08:02:29 PM
 #2

A hack subtracting around 285 m Dollar and bitcointalk did not notice?  

I've noticed that people have been writing about it a little, here and there, but indeed, it doesn't seem to have gotten the full attention (or maybe I've missed it).

On the other hand, imho it's "just another altcoin hack" (although probably I should not think so lightly about it, since it's a shitload of money we're talking about).

 
 b1exch.to 
  ETH      DAI   
  BTC      LTC   
  USDT     XMR    
.███████████▄▀▄▀
█████████▄█▄▀
███████████
███████▄█▀
█▀█
▄▄▀░░██▄▄
▄▀██▄▀█████▄
██▄▀░▄██████
███████░█████
█░████░█████████
█░█░█░████░█████
█░█░█░██░█████
▀▀▀▄█▄████▀▀▀
OgNasty
Donator
Legendary
*
Offline Offline

Activity: 5446
Merit: 6175


Leading Crypto Sports Betting & Casino Platform


View Profile WWW
April 14, 2026, 08:05:42 PM
 #3

Is everyone that immersed into the strait of Hormuz, Ukraine wars?

Quote
On April 1, 2026, Drift Protocol suffered a $285 million security breach after attackers exploited a 2/5 multisig configuration and used social engineering to gain control. The theft occurred in under 15 minutes, with funds drained through a fraudulent token. The incident revealed critical flaws in governance and key management. Experts are now urging a protocol update to incorporate hardware security modules and professional custody solutions.

https://www.kucoin.com/news/flash/drift-protocol-loses-285m-in-security-breach-exposing-defi-governance-weaknesses?lang=en_US&

A hack subtracting around 285 m Dollar and bitcointalk did not notice? 

Social engineering hacks aren't really Bitcoin hacks in my opinion.  That is probably why the community doesn't seem to care.  You do make a good point that the government employees put in charge of things like this don't have real experience and are prone to making stupid decisions they aren't aware of the consequences.  God forbid anyone in any industry or government actually hire a consultant with experience to keep them from losing hundreds of millions of dollars by being stupid...

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
WillyAp (OP)
Member
**
Offline Offline

Activity: 1386
Merit: 81

Looking for guilt best look first into a mirror


View Profile WWW
April 14, 2026, 08:07:41 PM
Last edit: April 14, 2026, 08:59:07 PM by WillyAp
 #4

Quote from: OgNasty  link=topic=5580284.msg66617512#msg66617512 date=1776196949

Social engineering hacks aren't really Bitcoin hacks in my opinion.  That is probably why the community doesn't seem to care.  You do make a good point that the government employees put in charge of things like this don't have real experience and are prone to making stupid decisions they aren't aware of the consequences.  God forbid anyone in any industry or government actually hire a consultant with experience to keep them from losing hundreds of millions of dollars by being stupid...

An Api call, a cloaked one too.
Although social engineering was here to blame to get the 3 signatures.

Marketing in EN und DEES
Davidvictorson
Hero Member
*****
Offline Offline

Activity: 1680
Merit: 970



View Profile
April 14, 2026, 08:23:43 PM
 #5

A hack subtracting around 285 m Dollar and bitcointalk did not notice? 
These things don't take time. I am surprised that it happened all under 15 minutes. In reality the systems that are going to always be vulnerable are those whose administrators sacrifice advanced security protocols to so as to save money for the organization. I am speaking generally as I do not know if that was the situation in this instance.
Companies as well as individuals should pay more attention to their security online and offline.

I sure know that the hackers will be caught but now they'll spend more money on getting them caught which is what they should have done to secure their systems.

██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██



██
██
██
██
██
██
██



██
██
██
██
██



██
██

██
██
██
██
██
██
██
██
██
██
███████▄▄███████▄▄
████▄███████████████▄█████▄▄▄
██▄███████████████████▄▄██▀████▄▄▄▄▄▄▄▄███▄██████
▄███████████████████▀▄█████▄▄███████████▄▀▀▀██▄██
▄███▐███████████████▄▄▀███▀███▄█████████████▄███████
████▐██████████████████▀██▄▀██▐██▄▄▄▄██▀███▀▀███▀▀▀
█████████████████████▌▄▄▄██▐██▐██▀▀▀▀███████████
███████▌█████████▐██████▄▀██▄▀█████████████████████▄
▀██▐███▌█████████▐███▀████████▄██████████▀███████████
▀█▐█████████████████▀▀▀███▀██▀▀▀▀▀▀▀▀▀██▀▀▀███▀▀▀▀▀
██▀███████████████████▀▄██▀
████▀███████████████▀
███████▀▀███████▀▀
██
██


██
██
██
██
██
██
██
██
██

██
██
██


██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
 
    FAST    🔒 SECURE    🛡️ NO KYC        EXCHANGE NOW      
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██

██
██
██
██
██
██


██
██
██
██
██
██
██
██
██
██

██
██
██
██
██
██
██
██
██
██
██
joniboini
Legendary
*
Offline Offline

Activity: 2884
Merit: 1893


🧙‍♂️ #kycfree


View Profile WWW
Today at 05:44:27 AM
 #6

These things don't take time. I am surprised that it happened all under 15 minutes.
I mean, I don't think it will take that long to process queries to begin with, or do you think the 15 minutes refers to their social engineering efforts and whatnot? I don't get that impression from reading the article. How would they even track that if that's what they're referring to? I always assume this timing is taken from the first time the attacker gains access to the system, not prior to that.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!