Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Drift stolen 285 million: It's not a code issue, someone was scammed.
The real problem happened to the people first
@mert’s tweet changed the direction of the whole discussion: it’s not that the contract had a vulnerability, but social engineering— the attacker spent months building trust, met in person offline, and then poisoned it via the TestFlight link. @SheTalksCrypto and @evilcos broke down the $285 million theft from the Drift protocol; some people said it was done by North Korea. But the real issue isn’t which country the hackers are from: months of relationship-building bypassed all code audits. After the incident, outflows from Solana perpetual platform funds rose by about 15%.
People’s views are split: some say it’s a “state-level espionage operation,” while others say it’s just the team being dumb. I think neither side is getting to the point. Fixating on who did it only distracts attention—the real problem is a missing process that can be completely prevented—for example, the 2/5 multisig threshold is too low, and developers use signing devices for other things. Chasing the culprit doesn’t change risk pricing; what got priced wrong is the human layer, not geopolitics.
Key takeaways:
Multisig rules can’t stop a six-month long infiltration
The core issue is: pretending to be a quantitative institution, spending 6 months, and using $1 million in real cash to build trust—this kind of long-term social engineering can pierce any audit that only looks at code. Even though on-chain tracking points to organizations tied to North Korea, smart money moved earlier: major net buys on competing perpetual platforms (such as Hyperliquid) increased by 25%, betting that Drift recovery will be slow. Claims that blockchains are “naturally secure” don’t hold up. Until the protocol enforces hardware-isolated signing, this will still happen—ignoring this is underestimating tail risk.
These different views have created pricing bias. The optimists may be a bit early, but the real opportunity is shorting those protocols that move slowly on human-factor defenses.
Bottom line: Builders upgrading security now and long-term holders will benefit; short-term rotation has basically already happened. The heat of chasing the culprit is fading—don’t focus too much on that; look instead at which perpetual platforms are seriously improving processes.
Conclusion: It’s still not too late for builders and long-term holders to enter now; short-term traders are already late. Capital will flow to teams with “hard processes, device isolation, and high multisig thresholds,” and protocols that ignore the human-factor defenses should be systematically avoided.