Drift Seeks Contact With The Hacker After $280M Exploit

491
SHARES
1.4k
VIEWS


Drift Protocol, a Solana-based decentralized trade (DEX), stated Friday it had opened onchain contact with wallets tied to funds stolen within the exploit that exterior corporations have estimated at roughly $280 million to $286 million.

Drift said on X that it had initiated onchain contact with wallets holding the stolen Ether (ETH), looking for to open a line of communication.

The staff despatched onchain messages from its Ethereum tackle (0x0934faC) to 4 wallets linked to the exploiter on the time of publication, urging the attacker to succeed in out by way of Blockscan chat. “We’re prepared to talk,” Drift stated.

Onchain messaging has change into a typical tactic in exploit response, permitting protocols to speak straight with attackers whereas preserving anonymity. In previous circumstances, such because the Euler Finance hack, comparable outreach led to the partial restoration of funds.

Drift’s onchain message to the Drift Exploiter on Friday. Supply: Etherscan

Nameless sender tries to stress the attacker

Drift’s communication got here hours after an unknown sender utilizing the ENS identify readnow.eth additionally reached out to wallets linked to the attacker on Thursday by way of onchain messages.

The sender claimed to know the identities behind the assault and demanded a cost of 1,000 ETH in trade for withholding info.

Supply: Etherscan

The claims couldn’t be independently verified and will signify an try to mislead or stress the pockets holder. The incident highlights how, alongside official communications, unverified messages can flow into onchain after crypto exploits.

Solana fallout retains spreading

According to SolanaFloor, Drift’s exploit has up to now affected at the least 20 Solana protocols, together with the decentralized finance (DeFi) platform Gauntlet, which was estimated to be impacted to the size of $6.4 million.

Blockchain safety platform Cyvers said the influence was nonetheless increasing as of Friday morning, with no funds being recovered 48 hours past the attack.

Cyvers stated that the assault was seemingly a “weeks-long, staged operation,” noting that the attacker arrange durable nonces, a Solana function permitting customers to pre-sign transactions for future execution, days earlier than the exploit.

Associated: Crypto hackers steal $169M from 34 DeFi protocols in Q1: DefiLlama

“This intently mirrors the Bybit hack, completely different method, identical root concern: signers unknowingly approving malicious transactions,” Cyvers added.

Some business observers, together with Ledger chief know-how officer Charles Guillemet, suggested the exploit might contain North Korea-linked actors, although particulars stay unconfirmed.

Journal: Nobody knows if quantum secure cryptography will even work