Back to Blog

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

Code Auditing
April 3, 2026
9 min read
Key Insights

On April 1, 2026 (UTC), Drift Protocol on Solana was compromised through a coordinated attack combining multisig approval manipulation and durable nonce exploitation, a Solana transaction mechanism that allowed pre-signed approvals to remain valid indefinitely, resulting in an estimated loss of approximately $285.3M [1, 2]. After weeks of on-chain staging, the attacker induced two of five Security Council multisig signers to pre-sign malicious governance transactions through phishing or misleading signing requests. The signed instructions were held until the attacker's chosen moment, then executed in two rapid transactions to complete the admin takeover and transfer administrative control. With full admin privileges, the attacker introduced a malicious collateral asset (CVT), inflated its oracle price, relaxed withdrawal protections, and drained high-value assets through the protocol's lending pathways.

As of the time of writing, Drift has released an initial statement [1] but has not yet published a full post-mortem. The analysis below is based on publicly available on-chain data, Drift's official timeline, and independent research [2]. We first examine how durable nonces fundamentally alter the security assumptions of multisig governance, then reconstruct the multi-week attack staging, the governance takeover execution, and the fund extraction process, and conclude with lessons learned for mitigating this class of risk.

Best Security Auditor for Web3

Validate design, code, and business logic before launch

Background

Drift Protocol and Squads Multisig

Drift Protocol is a DeFi protocol on Solana supporting margin trading, lending, spot markets, and derivatives. Its high-privilege operations, including admin changes, market creation, oracle configuration, risk parameter updates, and withdrawal limit adjustments, are governed by a multisig rather than a single private key.

Drift uses the Squads multisig framework, a common on-chain governance system on Solana. In Squads, privileged actions are packaged as transactions under a proposal. Once enough members approve the proposal, the stored instructions can be executed atomically through vaultTransactionExecute. At the time of the attack, Drift's Security Council operated under a 2-of-5 threshold configuration with zero timelock, meaning any two of five signers could authorize administrative actions with immediate effect. The security of this system depends not only on signer key custody, but also on the integrity of the full approval pipeline: what transaction was created, what signers believed they were approving, and whether the final executed instructions matched that review context.

Durable Nonce Accounts

Durable nonce accounts introduce a critical temporal dimension to transaction execution [3]. Under normal conditions, Solana transactions rely on a recent blockhash and expire quickly after signing if they are not broadcast in time. Durable nonces replace that short-lived blockhash with a nonce stored in a dedicated account, allowing a signed transaction to remain valid indefinitely until the nonce is advanced. This feature is useful for legitimate cases such as offline signing or delayed submission, but it also creates an important attack primitive: it separates when a transaction is signed from when it is executed on-chain. Critically, once a signer approves a durable nonce transaction, they cannot revoke their signature unless the nonce authority manually advances the nonce account.

This separation has a subtle but fundamental impact on multisig security. Under normal blockhash-based transactions, the short expiration window acts as an implicit safety layer: a signer's authorization either gets executed promptly or expires harmlessly. This temporal constraint means that even if a signer is tricked into approving a malicious transaction, the attacker must broadcast it within a narrow window, limiting the scope for coordinated, multi-step exploitation. Durable nonces remove this constraint entirely. With indefinitely valid signatures, the cost of a single signing mistake changes fundamentally: a tricked approval no longer expires within minutes but remains exploitable with no automatic time limit, giving the attacker full control over execution timing and the ability to coordinate follow-up steps at will.

Attack Analysis

The attack unfolded in three distinct phases. In the Pre-Attack Staging phase, the attacker conducted a multi-week operation to manufacture a fake collateral asset and obtain governance access through misleading signing requests. In the Governance Takeover phase, two pre-signed durable nonce transactions were submitted in rapid succession to seize administrative control. In the Fund Extraction phase, the attacker manipulated protocol parameters and drained real assets through the protocol's lending pathways. The diagram below illustrates the attack execution flow across three phases, corresponding to the subsections that follow. The parallel CVT manufacturing track, detailed in Pre-Attack Staging, is not shown in the diagram.

Pre-Attack Staging

The attack was not a single opportunistic strike but a multi-week operation running two parallel preparation tracks. The first track focused on manufacturing a plausible collateral asset. On March 11, the attacker withdrew 10 ETH from Tornado Cash and used the funds to deploy CarbonVote Token (CVT), minting 750 million units. Over the following weeks, the attacker seeded a small amount of liquidity on Raydium and used wash trading to build an artificial price history near $1, giving CVT a surface-level appearance of market legitimacy [4].

The second track targeted governance access. According to Drift's official timeline [1], on March 23, four durable nonce accounts were created: two linked to Drift Security Council multisig members, and two controlled by the attacker. This indicated that at least two of five signers had already signed transactions tied to durable nonce accounts, giving the attacker the required 2-of-5 approval threshold.

On March 27, Drift executed a planned Security Council migration due to a council member change. This migration invalidated the previously collected signatures under the old configuration. However, by March 30, a new durable nonce account appeared tied to a member of the updated multisig, indicating that the attacker had re-obtained the required two-of-five approval threshold under the new configuration.

This sequence reveals that the attacker was actively monitoring on-chain governance changes and adapting in real time. Rather than a single phishing campaign, the signature collection was an ongoing operation that survived a mid-preparation multisig reconfiguration. The migration itself may have inadvertently aided the attacker: during governance transitions, signers are more likely to encounter and approve administrative signing requests, creating a natural social engineering window.

On April 1, the attacker chose a precise execution window. Drift first performed a legitimate test withdrawal from the insurance fund. Approximately one minute later, the attacker submitted the pre-signed attack transactions. This timing suggests the attacker was monitoring on-chain activity in real time and waited for a successful legitimate operation to confirm the system was in a normal operational state before striking.

Governance Takeover

At approximately 16:05 UTC on April 1, the attacker submitted the two pre-signed durable nonce transactions four slots apart. The first transaction (2HvMSg...2C4H) created and approved the malicious admin transfer proposal. The second transaction (4BKBmA...RsN1) approved and executed it, beginning with AdvanceNonceAccount to activate the stored nonce, then proceeding through proposalApprove and vaultTransactionExecute, ultimately invoking UpdateAdmin to transfer administrative control to an attacker-controlled address.

This execution flow highlights a key property of the attack: the decisive authorization did not occur at execution time, but at the earlier signing stage. The on-chain transactions merely materialized permissions that had already been granted.

Fund Extraction

After gaining administrative control, the attacker took three preparatory steps before extracting funds: creating a malicious collateral market for CVT, switching to an attacker-controlled oracle to inflate its price, and relaxing withdrawal protections to enable large-scale extraction.

The first step was to create a malicious collateral market for CVT. The issue with this market was not just that it was new, but that it lacked real liquidity while being assigned overly lenient risk parameters. An asset with no redeemable value, once accepted as high-weight collateral within the protocol, can be used to create non-existent borrowing power.

The second step was to switch to an attacker-controlled oracle and inflate the price. With admin permissions, this step required no further restrictions to bypass. Once the oracle was under the attacker's control, the book price of CVT could be arbitrarily inflated, making an asset with almost no real market value appear as high-value collateral within the protocol.

The third step was to relax withdrawal protections and circuit breakers. Even with inflated collateral pricing, withdrawal limits on major asset markets would have constrained large-scale extraction. These guardrails had to be raised or removed before the fabricated collateral value could be converted into extractable real assets.

Once these steps were completed, the attacker deposited a large amount of overvalued CVT into the protocol, then executed 31 rapid withdrawals over approximately 12 minutes, draining real assets including USDC, JLP, SOL, cbBTC, USDT, wETH, dSOL, WBTC, JTO, and FARTCOIN. This closed the profit-extraction loop: gain governance control, alter parameters, package a worthless asset as high-value collateral, and move funds out along the protocol's pre-existing lending and withdrawal pathways.

As of the time of writing, the total loss is $285,279,417.69, calculated based on the attacker's withdrawal account (HkGz4K...pZES).

Lessons Learned

  • Multisig security extends beyond key custody. Protecting private keys and enforcing signature thresholds is insufficient. The entire authorization pipeline, including transaction construction, display, and signer interpretation, must be trusted. In this incident, the signers' keys were not compromised, but the approval process was manipulated to authorize unintended actions.

  • Timelocks are critical for high-privilege operations. Administrative actions such as ownership transfers should not be immediately executable. Drift's zero timelock configuration meant that once the pre-signed transactions were triggered, administrative control was transferred and exploited within minutes, leaving no opportunity for detection or intervention. A timelock would have created a response window to identify and block the malicious transfer.

  • Delayed execution mechanisms require additional safeguards in governance contexts. Durable nonces decouple signing from execution, removing the implicit temporal guarantees that signers rely on. In governance systems, this class of mechanism should be paired with higher signature thresholds, time-bound or revocable approvals, and restrictions that prevent signed transactions from remaining valid indefinitely.

Conclusion

This incident was not caused by a smart contract vulnerability or key compromise, but by a breakdown in the multisig authorization process combined with durable nonce-based delayed execution. The attacker pre-collected valid multisig approvals from two of five Security Council signers through misleading signing, preserved them using durable nonce transactions, and later executed them to gain administrative control. The subsequent fund extraction was a direct consequence of compromised governance, carried out through otherwise valid protocol operations. Mitigating this class of risk requires securing the full authorization pipeline, enforcing timelocks on high-privilege operations, and implementing additional safeguards for delayed execution mechanisms. Combined with on-chain monitoring systems capable of detecting anomalous governance activity in real time, these measures form a comprehensive security system against this class of governance-layer attacks.

References

[1] DriftProtocol, "Official statement": https://x.com/DriftProtocol/status/2039564437795836039

[2] Phalcon (BlockSec), "Drift Protocol Exploit Analysis": https://x.com/Phalcon_xyz/status/2039602380074016909

[3] Solana, "Introduction to Durable Nonces": https://solana.com/developers/guides/advanced/introduction-to-durable-nonces

[4] CoinDesk, "How Drift attackers drained more than $270 million using a Solana feature designed for convenience": https://www.coindesk.com/tech/2026/04/02/how-a-solana-feature-designed-for-convenience-let-an-attacker-drain-usd270-million-from-drift


Get Started with Phalcon Security

Detect every threat, alert what matters, and block attacks.

Try now for free

About BlockSec

BlockSec is a full-stack blockchain security and crypto compliance provider. We build products and services that help customers to perform code audit (including smart contracts, blockchain and wallets), intercept attacks in real time, analyze incidents, trace illicit funds, and meet AML/CFT obligations, across the full lifecycle of protocols and platforms.

BlockSec has published multiple blockchain security papers in prestigious conferences, reported several zero-day attacks of DeFi applications, blocked multiple hacks to rescue more than 20 million dollars, and secured billions of cryptocurrencies.

Sign up for the latest updates
Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 23 and March 29, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.53M. Incidents include a $679K flawed burn mechanism exploit on the BCE token, a $512K spot-price manipulation attack on Cyrus Finance's PancakeSwap V3 liquidity withdrawal, a $133.5K flash-loan-driven referral reward manipulation on a TUR staking contract, and multiple integer overflow, reentrancy, and accounting error vulnerabilities in DeFi protocols. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Newsletter -  March 2026
Security Insights

Newsletter - March 2026

In March 2026, the DeFi ecosystem experienced three major security incidents. Resolv Protocol lost ~$80M due to compromised privileged infrastructure keys, BitcoinReserveOffering suffered ~$2.7M from a double-minting logic flaw, and Venus Protocol incurred ~$2.15M following a donation attack combined with market manipulation.

FATF’s New Stablecoin Report Signals a Shift to Secondary-Market Compliance
Knowledge

FATF’s New Stablecoin Report Signals a Shift to Secondary-Market Compliance

BlockSec interprets FATF’s March 2026 report on stablecoins and unhosted wallets, explains why supervision is shifting toward secondary-market P2P activity, breaks down the report’s main recommendations and red flags, and shows how on-chain monitoring, screening, and cross-chain tracing can help issuers and VASPs respond with stronger, more effective compliance controls.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit