SlowMist Reveals the Drift Attack Chain: Multi-Signature Mechanism Change, Administrator Privileges Leaked

ETH1,67%
USDC0,02%
SOL2,41%

Drift攻擊鏈

SlowMist, an on-chain security firm (SlowMist), released a technical analysis on April 2, revealing the key prerequisites for the Drift Protocol hack incident: about a week before the attack, Drift made adjustments to the multi-signature mechanism, and it did not synchronously set up a time-lock protection mechanism. The attacker then obtained administrator privileges, forged CVT tokens, manipulated the oracle, and shut down the security module, systematically extracting high-value assets from the fund pool.

SlowMist reconstructs the attack’s warning signs: changing multisig without a time lock is the core vulnerability

Drift攻擊鏈 (Source: SlowMist)

SlowMist’s analysis reveals the most alarming pre-attack trigger in this incident: about a week before the tokens were stolen, Drift changed the multisig mechanism to a “2/5” mode without setting any time lock, while also introducing four new signers.

A time lock is a necessary security complement for multisig mechanisms in protocol security design. It establishes a mandatory waiting period (typically 24–48 hours or longer) before executing high-risk configuration changes, giving the community and security organizations enough time to detect anomalies and intervene. Without a time lock, once a new signer’s private key is stolen or maliciously controlled, the attacker can immediately carry out administrator-level operations with no waiting buffer.

The multisig architecture change that occurred one week before the tokens were stolen (introducing four new signers) is highly suspicious in terms of timing, and is the warning point receiving the most attention in this security analysis.

Reconstructing the attack steps: from administrator leak to 105,969 ETH stolen

According to SlowMist’s technical analysis, after obtaining administrator control, the attacker systematically emptied assets by executing the following steps:

Forging CVT tokens: forging fake tokens within the protocol, bypassing the normal asset validation logic

Manipulating the Oracle: changing the protocol’s external price source so that on-chain pricing is distorted, creating favorable conditions for subsequent extraction

Shutting down security mechanisms: disabling the protocol’s built-in risk control and security constraint modules, removing obstacles to asset extraction

Transferring high-value assets: systematically extracting highly liquid assets from the fund pool to complete the final asset emptying

At present, the stolen funds have mainly been consolidated to Ethereum addresses, totaling about 105,969 ETH (about $226 million). SlowMist states that the related fund flows are still being tracked.

ZachXBT calls out Circle: industry strongly criticizes USDC that wasn’t frozen for hours

On the same day, on-chain sleuth ZachXBT issued strong criticism of Circle. He pointed out that during the U.S. trading hours while Drift was being hacked, USDC in the tens of millions of dollars was bridged from Solana to Ethereum via a cross-chain protocol. The entire process was “ongoing for several hours with no intervention,” and after the related funds had completed the full transfer, Circle “again took no action.”

ZachXBT also revealed another issue Circle had previously faced: Circle mistakenly froze more than 16 business hot wallets, and the related unfreezing process is still ongoing to this day. He specifically named Circle CEO Jeremy Allaire, saying that Circle’s performance has had a negative impact on the entire crypto industry.

These allegations have sparked widespread discussion in the industry about what proactive intervention responsibilities stablecoin issuers should bear in security incidents.

Frequently Asked Questions

Why is not setting a time lock when modifying the multisig the core issue in this attack?

A time lock is a key security safeguard for multisig mechanisms. It sets a mandatory waiting period before executing high-privilege operations, giving the community and security organizations time to detect anomalies and take action. When Drift adjusted the multisig architecture, it did not set a time lock, meaning that once the credentials of the newly added signer were leaked, the attacker could immediately execute administrator actions, bypassing the community’s final line of oversight. The timing of the change introducing four new signers one week before the theft is the most closely scrutinized point in the current investigation.

What responsibility should Circle bear in this incident?

ZachXBT’s criticism points to Circle’s lack of real-time monitoring and intervention during the large-scale cross-chain USDC transfers. As the issuer of USDC, Circle has the technical ability to freeze involved addresses, but it did not take action during the hours-long transfer process. This controversy touches on the boundary of proactive intervention responsibilities of stablecoin issuers in DeFi security incidents, and is a core topic hotly discussed in the industry right now.

What is the technical significance of the combination of forging CVT tokens and manipulating the oracle?

Forging CVT tokens allows an attacker to manufacture fake liquidity or collateral within a protocol. Manipulating the oracle causes the protocol to use distorted market data when pricing. Combined, this makes the protocol “believe” it has sufficient collateral support, thereby allowing the attacker to extract assets far exceeding what they are actually entitled to—an established classic tactic in smart contract attacks, and one that has appeared in multiple DeFi hack cases.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Florida and Massachusetts jointly recover $5.4 million in cryptocurrency scam assets

The Florida State Attorney’s Office and the Marion County Sheriff’s Office jointly recovered $5.4 million in cryptocurrency scam funds, involving an investment fraud scheme that used romance as a cover. Some of the funds have been returned to victims in Florida and Massachusetts. Since its inception, CFEU has recovered $7.2 million, and another $12.6 million in assets remains frozen. Massachusetts has also carried out multiple law-enforcement actions, shutting down scam websites and recovering funds.

MarketWhisper1h ago

Florida and Massachusetts Recover $5.4M in Crypto Fraud Assets from Romance Scam Scheme

Authorities in Florida and Massachusetts recovered $5.4 million in cryptocurrency from romance scam-related investment fraud, with victims receiving partial refunds. Ongoing efforts continue against crypto fraud, with additional assets under litigation.

GateNews2h ago

Crypto’s most ridiculous robbery? A hacker minted $1 billion in DOT tokens, but only stole $230k

Hackers exploited the Hyperbridge cross-chain bridge vulnerability to mint 1 billion Polkadot (DOT) tokens. The nominal value was over $1.19 billion, but due to insufficient liquidity, they ultimately cashed out only about $237k. The attack was successful because the smart contract did not properly verify messages, allowing the hackers to steal administrative control and mint coins. The incident highlights the key role of market liquidity in the success of arbitrage.

CryptoCity15h ago

Fake Ledger Live App Steals $9.5M From 50+ Users Across Multiple Blockchains

A fraudulent Ledger Live app on Apple's App Store stole $9.5 million from over 50 users by compromising wallet information. The incident, involving significant losses for major investors, raises concerns about App Store security, prompting discussions of a possible lawsuit against Apple.

GateNews16h ago

Criticized for freezing USDC too slowly! Circle CEO: We will definitely wait for the court’s order before freezing—refusing to freeze privately/by ourselves without authorization

Circle CEO Jeremy Allaire said the company will not proactively freeze wallet addresses unless it receives a court order or a request from law enforcement. Even amid hacker money-laundering disputes and community backlash, Circle still insists on operating in accordance with the rule of law. Jeremy Allaire sets Circle’s law-enforcement bottom line ----------------------------- As the global cryptocurrency market roils, Circle’s CEO Jeremy Allaire, the stablecoin issuer, delivered a clear stance on the most sensitive issue in the market at a press conference in Seoul, South Korea. He pointed out that although Circle has the technical means to freeze specific wallet addresses, unless it receives a court order or a formal instruction from law-enforcement authorities, the company will not take such action on its own.

CryptoCity18h ago

Attacker Exploiting Bridged Polkadot Vulnerability Transfers $269K to Tornado Cash

On April 15, Arkham reported that the attacker who exploited a Bridged Polkadot vulnerability transferred around $269,000 in stolen funds to Tornado Cash, complicating asset tracking.

GateNews19h ago
Comment
0/400
No comments