SlowMist restores Drift attack chain


The critical vulnerability was planted a week ago.
A week before the attack, Drift adjusted its multi-signature mechanism to "2/5" (1 old signer + 4 new signers) and did not set a timelock — no mandatory waiting period, allowing high-risk configuration changes to be executed immediately.
Subsequently, the attacker gained admin privileges, completing a full attack chain in one go:
Forge CVT tokens to bypass asset verification logic
Manipulate the oracle to distort on-chain pricing
Disable security mechanisms to remove asset withdrawal barriers
Systematically extract high-value assets from the liquidity pool
In the end, over 105,969 ETH (approximately $226 million) was stolen.
SlowMist founder Yu Xian pointed out that DeFi project teams should promptly review extreme risk scenarios following owner/admin private key compromise and improve alert and response mechanisms.
One sentence: Changing multi-signature setups without a timelock is like leaving the door open for attackers.
#Drift #DeFi #SlowMist
ETH-4,58%
View Original
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin