Transcript
A (0:00)
Hi everyone. Welcome to Unchained, your no hype resource for all things crypto. I'm your host, Laura Shin. Thanks for joining this live stream. Before we get started, a quick reminder. Nothing we hear on Unchained is investment advice. This show is for informational and entertainment purposes only and my guest and I may hold assets discussed on the show. For more disclosures, visit unchained crypto.com introducing
B (0:22)
Nexo, the premier digital wealth platform. Receive interest on your digital assets. Borrow against them without selling. Trade a variety of cryptocurrencies all in one platform now available in the U.S. get started today at Nexo.com Unchained.
A (0:42)
Today's topic is the Drift Protocol hack. Here to discuss is Omer Goldberg, founder and CEO of Chaos Labs. Welcome, Omer.
C (0:51)
Hi Laura, thanks for having me.
A (0:54)
Solana's Drift Protocol, the largest decentralized perpetual futures exchange on the Solana blockchain, was hacked for $285 million, which just for context, the protocol's total value locked before the attack was about 500 million. So that was over half of the money in the protocol that was drained. That also puts this hack Amongst the top 10 DeFi hacks of all time and the biggest this year thus far. The Drift token dropped from over 7 cents to 3.9 cents on the news and is now trading a bit above 5 cents. So the hack was pretty multi layered and also quite methodical it seems. It sort of seemed chilling reading about it and it made me feel a little uneasy. The attacker or attackers compromised the system a little while ago actually, and then they kind of waited. So yeah, there are things about it that seem similar to the Bybit attack. But anyway, Omer, why don't you walk us through what it was that it appears these hackers did to perpetrate this hack.
C (2:00)
Yeah, definitely. And I really agree with what you said in the opening that it is chilling. I think we've seen a lot of hacks unfortunately already in this year. Many of them seem like it could be someone who's potentially less experienced and gains access to some key or admin privilege and kind of takes it from there. But this one was very technical, well thought out and from what we know today, spend at least three weeks. I can jump into kind of the end to end timeline or.
A (2:31)
Yeah, yeah, please do.
C (2:33)
Cool. So around, I think as of today, around 21 days ago, for if I'm not mistaken, for the first time, Drift initiated a migration towards a multisig. This multisig was a 205 multisig notably, it had zero time lock on any of the functions it could execute. And for listeners, what time lock means is even though certain privileges in an application need to be signed by whitelisted addresses, a time lock basically says after they sign it, there's a gap between when it actually executes. And this is typically an additional security precaution to make sure that what was signed and the change enacted is indeed what you want it to be. So this happened about 20 days ago. And in parallel to this, there was a fake token set up called cvt, completely fake only, no kind of pre existing activity outside of the sacred. And the attacker waited. I think some of the speculation was that they waited until April 1st for April Fool's Day, so that when messages of the hack were being dispatched, there'd be confusion about whether or not it was real or a prank. And pretty swiftly, within seconds, at least for the first batch, the attacker executed a series of transactions that effectively enabled them to deposit and manipulate the price of the collateral into the Drift vaults and extract all of the blue chip assets. So that was like the first part of the attack. Later, there's how they kind of got out, bridged out and into Ethereum. But there are at least five or six discrete steps that the attacker had to do, which for me indicates that this was not like a random person who stumbled upon the keys. They studied the program, they were methodical and strategic and how they planned everything and executed it.
