Drift protocol (DRIFT)

$0.04236  +2.22%  24H

社交熱度指數(SSI)

市場預警排名(MPR)

相關推文

  • LunarCrush Media Researcher D
     304.53K  @LunarCrush

    $DRIFT mentions are up 2,387% this week. Creators posting on social hit an all-time high. Price is down 49% in seven days. A six-month social engineering campaign ended in a $285M exploit. https://t.co/L5Yq66IUvm

     5  1  767
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    DRIFT token fell 49% in price within a week after a $285M exploit.
  • Sherry 🇻🇳 Community_Lead DeFi_Expert B
     4.61K  @sherryonchain
    LE HOANG TRONG 🟦 D
     10.03K  @Trong0322

    Overview of the biggest hack of 2026. @DriftProtocol, the largest perp DEX on Solana, was drained of over $270M in just 12 minutes. However, the smart contract was not exploited. The two major audit firms Trail of Bits and ClawSecure both gave a "pass" before this incident. The issue lies in how the hacker spent six months "posing" as a venture fund, meeting directly at events, depositing $1M of real money into the protocol, and then acting. 👇 1. Code is no longer the weakest link. Chainalysis just announced: $17B in crypto was lost in 2025. The majority was not due to smart contract bugs but due to human factors. Bybit $1.4B (02/2025). Radiant Capital $50M (10/2024). Coinbase $400M (05/2025). Now it’s Drift $270M+. All are social engineering. No one broke the code. They broke trust. This is a major trend you need to understand: code is becoming increasingly hard to exploit. Security firm Immunefi says 2026 will be the best year for on-chain security. But hackers don’t need to break code if they can convince the key holder to open the door for them. 2. Six months of role‑playing was just to build trust. The group behind the Dr…

     35  7  3.64K
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    DriftProtocol suffered a $270M theft, DRIFT plummeted, warning of social engineering risks.
  • The Crypto Times Media OnChain_Analyst B
     8.74K  @CryptoTimes_io

    🚨ICYMI: DRIFT EXPLOIT UPDATE: • @DriftProtocol says the April 1 hack was planned over 6 months • Attackers posed as a legit quant trading firm and met the team at conferences • They built trust, held meetings, and even deposited $1M+ on the platform • Gained access by tricking members into opening a malicious code repo + downloading a fake TestFlight app • Likely used known dev tool vulnerabilities to silently execute code • Probe with Mandiant suggests possible links to North Korea-linked hackers • Protocol is now frozen and attacker wallets have been flagged Lesson: Trust slowly. Verify everything.

     6  1  171
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    Drift Protocol遭精心策划的漏洞攻击,协议已冻结,攻击者钱包被标记。
  • NoFuture Trader Influencer C
     12.67K  @nofuture

    Gn fam! I'll be back tomorrow morning to kick off another week of The Hangout! We'll be discussing the Drift Protocol exploit and other relevant news of the day. Set those reminders (links to all the spaces are in the comments)

    NoFuture Trader Influencer C
     12.67K  @nofuture

    https://t.co/Yz5IZWCovY

    NoFuture Trader Influencer C
     12.67K  @nofuture

    https://t.co/ZIfyjIfBns

    NoFuture Trader Influencer C
     12.67K  @nofuture

    https://t.co/lwcCpXj25k

    NoFuture Trader Influencer C
     12.67K  @nofuture

    https://t.co/ZIZ6FmU0cc

    NoFuture Trader Influencer C
     12.67K  @nofuture

    https://t.co/CRoO07senF

     10  7  98
    閱讀原文 >
    釋出後DRIFT走勢
     中性
    The tweet announces that it will discuss the Drift Protocol exploit incident and other news.
  • Crypto Tax Made Easy Educator OnChain_Analyst C
     18.32K  @CryptoTaxSucks

    The DRIFT hack has less silver lining for Australian users. In the US, they can potentially write it off against their income taxes. Here in Aus, it's only a capital loss. So if you already lost money in FY26? No immediate tax benefit. The losses carry forward so that if you do eventually have capital gains, you can use the losses to offset them. But it's still worth documenting everything about your loss: - acquisition date of stolen funds - cost basis - value at loss - proof it's unrecoverable (hard until recovery plan announced) That way if you have a win later on, you keep more of your gains "tax free".

     16  4  2.29K
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    DRIFT被黑导致资本损失,澳洲暂无税收抵扣
  • Crynet Media Regulatory_Expert D
     4.16K  @crynetio

    🚨 Legal Analysis Emerges on $280M Drift Protocol Attack A crypto attorney suggests the $280 million exploit on Drift Protocol could potentially constitute civil negligence, according to Cointelegraph. The attack is attributed to threat actors linked to North Korean state-affiliated hackers.

     1  0  36
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    DRIFT hit by $280M attack, possibly civil negligence, bleak outlook
  • toly 🇺🇸 Founder Dev D
     779.39K  @toly
    Tay 💖 atory ndabat B
     88.37K  @tayvano_

    And as you well know the legal bar involves industry standards and unfortunately for everyone in this goddamn ecosystem, Drift was operating more securely that the majority of this industry. They actually used hardware wallets and multisigs. Unlike. The. Majority. Of. This. Industry. That’s why it took 6 months instead of LITERALLY 2 FUCKING DAYS like the last fucking 28 hacks I’ve fucking cleaned up. This industry needs to get serious but giving people unreasonable direction and threatening liability where none exists (BECAUSE THATS HOW DEFI LAWYERS DESIGN IT TO FUCKING BE BTW) is not gunna fly.

     94  9  11.69K
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    DeFi overall security is poor, Drift is relatively safe but the industry still needs reform
  • 𝙶𝙶 TA_Analyst Influencer B
     12.42K  @ggcripto
    Criptovaluta.it D
     30.40K  @CriptovalutaI

    After the "hack" on @DriftProtocol, many are stepping up. And they tell us that many times those who pose as "DeFi" are hardly "De" https://t.co/qX9Mdjecun

     10  1  1.01K
    閱讀原文 >
    釋出後DRIFT走勢
     極度看跌
    DriftProtocol suffered a $285 million attack, raising questions about DeFi decentralization, and Uniswap also voiced criticism.
  • FIREANT Theo acc Trader Community_Lead B
     15.87K  @fireant_korea

    How Project Founders Can Identify the North Korean Lazarus Hacker Group The Lazarus Group is currently being pointed to as the culprit behind the recent @DriftProtocol hack. What makes this incident so terrifying is that it wasn't a technical exploit of system vulnerabilities—it was a thoroughly designed and meticulously planned social engineering attack. However, there is one fascinating fact: South Korean projects have almost never fallen victim to social engineering attacks by Lazarus. While a small sample size might be part of it, I believe the real reason is simple: South Koreans can spot North Koreans. For foreigners, distinguishing between a South Korean and a North Korean can be nearly impossible. But for us? We can instantly catch the subtle differences in their tone, appearance, behavior, and how they respond to questions. This is not something AI can detect. "What if they completely fake it, pretending to be foreigners who don't speak a word of Korean?" Even then, we can filter them out with one simple request. Just ask them to say: "Kim Jung-un is a son of a xxxxx" (김정은 개새끼). Since I am not a North Korean Lazarus hacker, I can say it loud and clear: Kim Jung-un is a son of a xxxxx. To all global blockchain projects out there: Hire a South Korean security officer immediately. *Note: Only native South Koreans who actually grew up in South Korea can catch these subtle nuances. This is not a joke. I am attaching an actual documentary broadcasted by South Korean TV network Channel A, demonstrating exactly how to identify a North Korean hacker. https://t.co/Yz762Gbfou

     6  0  296
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    The tweet warns that the Lazarus hacker group attacked Drift Protocol and recommends hiring a South Korean security expert.
  • Caitlin Long 🔑⚡️🟠 Founder Regulatory_Expert B
     250.50K  @CaitlinLong_
    Watcher.News D
     64.07K  @watchernewsx

    🤯 Drift Protocol says the $285M exploit was the result of a long-term, coordinated infiltration. Attackers spent ~6 months posing as a quant trading firm, approaching team members at global crypto conferences and eventually compromising devices via malicious repo links and TestFlight apps.

     12  3  8.22K
    閱讀原文 >
    釋出後DRIFT走勢
     看跌
    DRIFT因6个月渗透攻击被盗285M美元,前景堪忧