CCY
DRIFT
SECURITY
READ
PHANTOM
Drift exploit admin keys became the central security question after Drift Protocol disclosed a durable-nonce-based attack that let a malicious actor seize Security Council powers during a breach the market had already framed as a more than $200 million hit. For users, the immediate lesson is that governance access and signer controls can fail before any formal code-bug postmortem is available.
On April 1, 2026, Drift said it was under active attack and suspended deposits and withdrawals while it investigated.
On April 2, 2026, the protocol said a malicious actor used a durable-nonce-based attack to gain unauthorized access and quickly take over Security Council administrative powers.
That official sequence is the cleanest confirmed record so far. Drift has described a loss of administrative control, but it has not yet published a full root-cause analysis of every system touched in the breach.
Bloomingbit's summary of Drift's statement said the attack combined delayed execution through durable nonces with stolen multisig approvals, which points readers toward privileged-access abuse rather than a simple contract-bug narrative.
Drift's durable-nonce description and Bloomingbit's summary narrow the conversation to transaction authorization and timing. They do not, on their own, establish a full failure chain for every approval step, which is why this remains an incident update rather than a finished postmortem.
The same official update said Drift was coordinating with security firms, exchanges, bridges, and law enforcement to trace and freeze assets. That matters because the response effort already extends beyond patching code inside one protocol interface.
Decrypt reported that Jiang Xuxian said Drift's admin keys were definitely leaked or compromised. That view does not settle the final postmortem, but it fits Drift's own statement that Security Council powers were seized.
"The admin keys behind Drift were definitely leaked or compromised."
Jiang Xuxian, quoted by Decrypt
Drift's disclosure of seized administrative powers and Jiang Xuxian's quoted comment both shift the security lesson toward privileged controls. Code reviews still matter, but the evidence reviewed here points more directly to signer security, approval paths, and governance access.
The admin-power takeover described by Drift also helps explain why the fallout quickly expanded into debates over emergency powers and freezes, the same issue running through Tommy Shaughnessy's criticism of Circle over a USDC freeze in the Drift exploit.
That same official account of compromised control gives the story a policy dimension similar to Fed's Barr warning that stablecoin risks persist as GENIUS oversight rules begin, because both cases turn on who holds critical keys, approvals, and intervention rights when crypto systems fail.
For investors, the practical trust question is no longer limited to whether Drift's code had been audited. The official incident update, the expert comment carried by Decrypt, and Phantom's warning to users all point to a wider operational chain that includes signers, governance permissions, wallet integrations, and crisis-response controls.
Phantom said users trying to access Drift through Phantom would see a required warning while its security team investigated. That turned the breach into a wallet-level risk message, not just a backend incident report.
For retail users, the practical effect of Phantom's warning and Drift's halt on deposits and withdrawals was immediate: access could be interrupted even before the market had a verified final accounting of what was lost.
That is also why an in-product wallet warning matters beyond public relations. When an ecosystem counterparty changes user flow during an active investigation, it signals that the threat is being treated as a broader safety issue rather than a single-app outage.
PeckShield's initial estimate, Phantom's warning, and Drift's admin-control disclosure describe three different kinds of fallout: possible losses, user-risk messaging, and attack mechanics. Treating them as interchangeable figures would overstate what has actually been confirmed.
PeckShieldAlert estimated the initial loss at about $285 million, but the post described that number as an initial estimate rather than a final total.
The reviewed material did not include a full official postmortem, a block-explorer-based reconciliation, or a reimbursement plan. Readers therefore have a clear description of the attack method, but not a settled ledger of the eventual damage or recovery.
Drift confirmed the method and the admin-power takeover, while PeckShield supplied only an initial estimate. That split is exactly why quick rewrites risk flattening the story into a generic exploit headline.
The next important disclosure is a full technical postmortem from Drift that explains how durable nonces, signer approvals, and administrative powers interacted inside the attack path.
A second checkpoint is any public accounting of traced, frozen, or recovered assets. Until those disclosures arrive, the most reliable facts remain Drift's incident timeline, Phantom's user warning, and PeckShield's provisional estimate.
No regulator statement was identified in the reviewed source set, so the story remains centered on incident response rather than enforcement or restitution.
Drift said on April 1, 2026 that it was under active attack and suspended deposits and withdrawals. On April 2, 2026, it said the attacker used a durable-nonce-based method to gain unauthorized access and seize Security Council administrative powers.
No. Drift's own update centered on a takeover of administrative powers, and Bloomingbit's summary of that statement pointed to delayed execution and stolen multisig approvals rather than a published contract-bug root cause.
The most widely cited figure in the reviewed material is about $285 million, and it should be treated as provisional because the estimate was not presented as final.
Phantom said people trying to access Drift through the wallet would see a required warning while its security team investigated.
Drift's description of seized Security Council powers and Jiang Xuxian's quoted comment both point toward admin-key and approval-path risk, which is why the current evidence supports auditing privileged controls as closely as contract code.
Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.
Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making any investment decisions.
Read original article on trustscrypto.com