The Exploit That Wasn’t a Bug
On April 1, 2026, an attacker drained approximately $285 million from Drift Protocol—one of Solana’s largest perpetuals DEXes—without exploiting a single line of buggy code. No reentrancy. No overflow. No access control flaw. Instead, the attacker weaponized a legitimate Solana feature called “durable nonces” to execute pre-signed transactions weeks after they were approved by Drift’s security council.
This is the largest DeFi hack of 2026 and the second-largest in Solana’s history behind the $326M Wormhole bridge exploit. TRM Labs has attributed the attack to North Korean state-sponsored hackers (Lazarus Group).
As a security researcher, this is the kind of exploit that keeps me up at night—because the vulnerability is the feature.
How Durable Nonces Work (and Why They’re Dangerous)
Every Solana transaction normally includes a “recent blockhash”—a timestamp that expires after ~60-90 seconds. If the transaction isn’t submitted within that window, it becomes invalid. This is a critical safety feature that prevents replay attacks and stale transaction execution.
Durable nonces override this safety mechanism entirely. They replace the expiring blockhash with a fixed nonce stored in a special on-chain account, keeping the transaction valid indefinitely until someone chooses to submit it.
The legitimate use case: offline signing workflows, hardware wallet integrations, and scheduled transactions. The attack surface: pre-signed multisig approvals that remain live forever, decoupling the moment of signing from the moment of execution.
The Attack Timeline
The sophistication here is chilling:
- March 11: Attacker withdrew 10 ETH from Tornado Cash to fund operations
- March 11-23: Deployed CarbonVote (CVT) token—the governance manipulation tool
- March 23: Created four durable nonce accounts—two associated with legitimate Drift Security Council members, two controlled by the attacker
- Weeks of staging: Social engineering of multisig signers to pre-approve transactions using durable nonces
- April 1, execution: Two transactions, four slots apart on Solana, were enough to create a malicious admin transfer, approve it, and execute it—all in under 60 seconds
The critical failure: Drift’s Security Council used a 2-of-5 multisig with zero timelock. The attacker needed only two signatures, obtained through social engineering, and the durable nonce mechanism meant those signatures never expired.
The Blast Radius: 20+ Protocols Affected
This wasn’t contained to Drift. Due to the highly composable and interconnected nature of Solana DeFi—shared liquidity pools, vault strategies, and protocol dependencies—at least 20 protocols have been impacted. Drift’s TVL collapsed from $550M to $252M, and the stolen funds were rapidly bridged from Solana to Ethereum via CCTP, converted to 129,000 ETH, and split across multiple wallets.
The Systemic Question
Here’s what concerns me most: durable nonces are a core Solana feature used by many protocols. This isn’t a Drift-specific vulnerability—it’s an architectural pattern risk. Every Solana protocol using multisig governance with durable nonce support faces the same attack vector.
Specific questions for this community:
-
Should Solana implement optional TTL (time-to-live) for durable nonces? A configurable expiration would preserve the offline signing use case while limiting the pre-signing attack window.
-
Should multisig implementations enforce execution-context verification? When a signer approves a transaction, the execution context (protocol state, TVL, admin roster) should match what existed at signing time—not weeks later.
-
Is the 2-of-5 multisig standard fundamentally broken for high-value DeFi protocols? Should we be advocating for 4-of-7 or higher thresholds with mandatory timelocks?
-
How many other Solana DeFi protocols are sitting on the same vulnerability right now? Has anyone audited durable nonce usage across the ecosystem?
The Drift exploit proves that security audits focused on smart contract code are necessary but insufficient. Operational security—how multisigs are configured, how signing ceremonies work, how governance transitions happen—is now the primary attack surface.
Every line of code is a potential vulnerability. But sometimes, the vulnerability isn’t in the code at all.
Sources: CoinDesk technical analysis, TRM Labs attribution report, Bloomberg coverage