Legal experts suggest that the $280 million exploit of the Solana-based Drift Protocol resulted from civil negligence after the team failed to follow basic operational security procedures.
Key Points
- The Drift Protocol team reportedly failed to use air-gapped systems for signing keys and neglected due diligence on developers met at industry conferences.
- Attackers spent six months building rapport with the team after initial contact at a crypto conference in October 2025.
- Malicious actors compromised developer machines by sending malware through Telegram and embedding links in code repositories.
- Drift identified the attackers with medium-high confidence as the same group responsible for the October 2024 Radiant Capital hack.
- Attorney Ariel Givner stated that class action lawsuits against the platform are already being advertised following the security breach.