Connect with us
DAPA Banner

Crypto World

Drift Incident Could Constitute Civil Negligence

Published

on

Crypto Breaking News

The Drift Protocol, a Solana-based decentralized finance platform, is drawing renewed scrutiny after a $280 million exploit exposed persistent gaps in its security posture. A post-incident review and commentary from legal counsel frame the breach as something that could have been prevented with basic operational security measures, prompting discussions about civil negligence and the broader risk landscape facing DeFi projects.

Attorney Ariel Givner described the scenario as a failure to safeguard user funds, saying, “In plain terms, civil negligence means they failed their basic duty to protect the money they were managing.” Her assessment followed Drift’s post-mortem detailing how the attack unfolded and how the platform responded. The comments come as critics question the adequacy of Drift’s procedures in a space where attackers frequently rely on social engineering and supply-chain compromises to breach multi-signature setups and other critical controls.

“Every serious project knows this. Drift didn’t follow it,” she said, adding, “They knew crypto is full of hackers, especially North Korean state teams.” Givner continued, “Yet their team spent months chatting on Telegram, meeting strangers at conferences, opening sketchy code repos, and downloading fake apps on devices tied to multisignature controls.”

The debate underscores a larger concern: social engineering and project infiltration remain among the most effective attack vectors in crypto, capable of draining user funds and eroding trust in platforms that users otherwise rely on for high-stakes liquidity and yield opportunities.

Key takeaways

  • Drift Protocol is facing scrutiny over basic security practices after a $280 million exploit, with legal perspectives labeling the incident as civil negligence in light of alleged operational shortfalls.
  • Experts point to missteps such as storing signing keys on non-air-gapped systems and insufficient vendor and developer due diligence, particularly with personnel encountered at conferences.
  • The attackers’ approach reportedly involved months of planning, culminating in targeted social engineering and malware introduced through developer machines.
  • There are signals of a possible link to North Korea–aligned threat actors, with Drift stating a “medium-high confidence” that the same group behind the Radiant Capital hack (October 2024) was involved.
  • Radiant Capital’s 2024 incident has become part of the narrative tying industry-wide risks to well-known escalation patterns in state-sponsored cyber operations.

Attack narrative and defensive lessons

Drift Protocol published an update detailing how the breach unfolded, asserting that the assault was the product of six months of planning. The attackers reportedly approached Drift at a major crypto industry conference in October 2025, signaling interest in potential integrations and partnerships. Over the following months, the bad actors cultivated relationships with Drift developers, ultimately delivering malicious links and embedding malware that compromised the developers’ machines used to manage the protocol’s multisignature controls.

Drift’s account emphasizes that those involved were not North Korean nationals, though the firm conceded that the threat actors were linked to a broader pattern associated with state-backed cyber campaigns. In a contemporaneous assessment with “medium-high confidence,” Drift tied the incident to actors believed to have previously orchestrated the October 2024 Radiant Capital hack. Radiant Capital had disclosed that its breach involved malware spread via Telegram from an operator posing as an ex-contractor connected to North Korea. While Drift’s update stops short of confirming a direct line of responsibility, these correlations highlight a persistent threat environment in which sophisticated adversaries leverage social channels to compromise engineering workflows.

Advertisement

Legal and security observers highlight a recurring theme: even mature crypto teams can underestimate the risk of supply-chain and social-engineering exploits if governance practices do not enforce strict separation between development activities and sensitive credentials. Givner’s critique goes beyond the specifics of Drift’s incident, pointing to a universal expectation that “air-gapped” signing keys should be kept separate from day-to-day developer work, and that engaging with third-party developers or contractors requires rigorous vetting and ongoing due diligence. In her words, many projects already adhere to these principles because the crypto landscape is “full of hackers,” and a lapse can be costly both financially and reputationally.

Industry context: echoes of a broader security paradigm

The Drift incident arrives as a broader discussion unfolds about how DeFi projects manage risk in a period of heightened adversarial activity. Social engineering, phishing, and malware campaigns targeting developer ecosystems have been repeatedly implicated in high-profile hacks. The Radiant Capital case from late 2024, which involved a North Korea–linked operator impersonating an ex-contractor to disseminate malware, is frequently cited in security analyses as a cautionary tale about the limits of conventional defensive measures when human factors become the weakest link.

Industry observers note that the Drift episode reinforces the need for robust governance frameworks around key management, formal vendor assessment processes, and stringent controls on how and where signing keys are stored and used. If the attackers exploited trusted relationships with developers and relied on compromised devices to gain access to multisignature controls, the path to remediation likely involves reinforcing air gaps, implementing hardware security modules for key management, and institutionalizing continuous monitoring and key rotation practices. The emphasis on “due diligence” also raises questions about how conferences, hackathons, and third-party collaborations are vetted, and whether drift toward more rigorous third-party risk management will become standard practice across the sector.

What this means for investors and builders

For investors, the Drift incident is a reminder that risk management remains a primary driver of platform credibility and capital allocation in DeFi. Projects that can demonstrate resilient onboarding, robust key management, and rigorous vendor scrutiny may distinguish themselves in a market where security shocks can quickly alter perceptions of value and reliability. Builders, in turn, face a delicate trade-off between openness and security. While collaboration and rapid integration are hallmarks of DeFi innovation, the Drift episode suggests that even well-resourced teams must normalize security drills, red-teaming, and clear separation of duties to prevent supply-chain breaches from translating into user losses.

Advertisement

As regulators and industry groups debate standardized best practices, Drift’s experience could accelerate conversations about mandatory security benchmarks for on-chain protocols, particularly those relying on multi-party computation and multisignature frameworks. In the meantime, users should monitor how Drift and similar platforms respond—through security upgrades, partner vetting, and transparent post-incident reporting—as a practical barometer for the sector’s willingness to translate rhetoric about security into measurable safeguards.

Meanwhile, Drift has not publicly detailed its next steps beyond the immediate remediation measures described in its update. The extent to which the platform will overhaul its governance, vendor risk management, and incident response cadence remains to be seen, as does the broader industry adoption of stricter security controls that could alter how quickly and fluidly DeFi protocols can operate with external partners.

What remains uncertain is how quickly the market will react to these revelations and whether Trust signals built on vulnerability disclosure will translate into a longer-term commitment by users to platforms that publicly address security gaps. For now, the incident underscores a recurring lesson: in DeFi, the difference between resilience and ruin often hinges on the discipline with which teams implement and enforce fundamental security practices—before a breach, not after.

As the investigation and remediation continue, market watchers will be paying close attention to Drift’s communications, the evolution of industry security standards, and any subsequent movements by competitors to raise the bar for securing developer environments and signing-key management. The path forward for the sector will be shaped by whether this incident catalyzes meaningful adoption of stronger controls and more rigorous third-party risk governance across the ecosystem.

Advertisement

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Jack Dorsey’s Decentralized Bitchat App Removed from China App Store

Published

on

Jack Dorsey's Decentralized Bitchat App Removed from China App Store

Bitchat, a decentralized peer-to-peer messaging app developed by Block CEO Jack Dorsey, has been removed from Apple’s App Store in China for allegedly violating its internet service regulations. 

In an X post on Sunday, Dorsey shared a screenshot from Apple’s app review team informing him that Bitchat had been removed from the App Store in February and that the TestFlight beta version would no longer be available in China at the request of the Cyberspace Administration of China (CAC).

“Bitchat pulled from the China App Store,” he said.

Bitchat has seen its popularity rise during protests in Madagascar, Uganda, Nepal, Indonesia and Iran in recent months, as governments attempted to shut down regular communication channels and internet access to curb dissent. 

Advertisement

The peer-to-peer encrypted messaging service runs entirely over Bluetooth and mesh networks and operates without an internet connection, which could put it at odds with China’s internet-censorship-prone regime. 

Source: Jack Dorsey

Bitchat violated internet regulator’s provision

The CAC argued Bitchat violated Article 3 of its regulations governing online services with public opinion or social mobilization capabilities, which came into force in 2018.

Under the provisions, any online services that could influence public opinion or enable social mobilization are required to conduct a security assessment before launch and “be responsible for the assessment results,” according to a Google Translate version of the regulations.

The app review team also said all apps on its store must comply with local requirements in the countries where they are available.

Related: Dorsey shares AI-integrated workplace vision weeks after Block’s 40% staff cut

Advertisement

“We know this stuff is complicated, but it is your responsibility to understand and make sure your app conforms with all local laws, not just the guidelines below. And of course, apps that solicit, promote or encourage criminal or reckless behavior will be rejected,” they added.

Still available in other countries

Despite being pulled in China, Bitchat remains available in other countries, according to Apple’s app review team. 

Chrome download stats show the app has been downloaded more than three million times, with more than 92,000 in the past week. The Google Play Store has recorded more than one million registered downloads.

However, neither specifies which regions were responsible for the bulk of downloads.

Advertisement

By comparison, WeChat, developed and operated by Tencent, one of China’s largest tech companies, has an estimated 810 million users in China, out of a national population of more than 1.4 billion.

Magazine: Bitcoin may take 7 years to upgrade to post-quantum — BIP-360 co-author