Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
How North Korea hackers made 284X profit from DRIFT.
With $1 million, a group of hackers in North Korea made $284 million in 12 hours.
I'm reporting on one of the biggest crypto hacks of 2026.
DRIFT sharp dump: What you need to know
Drift protocol was hacked and the token dumped by -47%
Drift Protocol Hack- What Really Happened
On April 1, 2026, Solana's Largest Perps DEX Drift Protocol was exploited for $285M, the biggest DeFi hack of 2026.
This wasn't a smart contract bug. It was a 6-month social engineering operation linked to North Korean state hackers.
How It Happened:
→ Attackers posed as a quant trading firm since Fall 2025
→ Met Drift team face-to-face at multiple conferences
→ Deposited $1M+ of their own capital to build trust
→ Compromised contributor devices through malicious code repos and a fake wallet app
→ Used Solana's "durable nonces" to pre-sign admin transfers weeks in advance
→ Drained $285M in just 12 minutes
→ Scrubbed all evidence instantly after the attack
Key Impact:
→ 📷$DRIFT token dropped 47%+
→ TVL collapsed from $550M to under $250M
→ 12+ Solana protocols affected
→ Circle facing backlash for not freezing $232M USDC fast enough
→ Mandiant engaged for investigation
Biggest Lesson:
Audits alone are NOT enough. DeFi's weakest link is now the human layer. Every team must enforce timelocks, audit access controls, and treat every multisig device as a potential target.
Your security is your responsibility.
I'm report posting the incident; I'm not the writer.