Berlu 313
5.1K posts


defi is fucked lol
drift just got drained for $200M+ and here's how:
- attacker minted 750M fake tokens
- made a raydium pool with $500 liquidity, priced at ~$1/token
- compromised admin key listed the fake token on drift
- disabled all withdrawal guards in one tx
- deposited $785M of fake "collateral" and drained every vault in 31 txs over 12 minutes
- nobody noticed for an hour
- attacker came back 2hrs later to grab a few more million
the multisig was 2/5 with a 0-second timelock. $200M+ protected by two signatures and zero delay.
and people wonder why nobody takes this industry seriously
English

@Only1temmy @ZER0_Mono Stop crying and buy bitcoin. There’s no second best investment in crypto.
English

i can't stop thinking about the drift protocol hack.
not because of the $280m. we've seen big numbers before. i can't stop thinking about how it happened. and what it says about everything we're building.
on april 1st, while people were posting jokes, an attacker drained $280 million from drift protocol in minutes. the team had to literally tweet "this is not an april fools joke."
but this didn't start on april 1st. it started on march 23rd.
that's when the attacker created four durable nonce accounts. two tied to drift's own security council multisig members. two controlled by the attacker. quietly. no alarms. no flags.
on march 27th, drift migrated their security council due to a routine member change. by march 30th, the attacker had already compromised a signer on the new multisig too.
then on april 1st, they executed.
a test transaction first. then one minute later, two pre-signed transactions fired four slots apart. admin takeover. withdrawal limits removed. a malicious asset introduced. every vault drained. jlp. sol. btc. usdc. over 15 tokens gone.
the entire thing took minutes.
this wasn't a bug. this wasn't a smart contract exploit. this wasn't a flash loan or an oracle manipulation. drift's own report confirms it (you can check @DriftProtocol's latest to confirm). no compromised seed phrases. no code vulnerability.
this was social engineering.
the attacker got 2 out of 5 multisig signers to approve transactions they didn't fully understand. used durable nonces to pre-sign them. then waited. patiently. for over a week.
two signatures out of five. that was the security standing between users and $280 million.
two out of five.
i keep coming back to that number because this is the part that should make everyone uncomfortable. not the hack itself. the architecture that made it possible.
we've seen this before. we've seen this so many times.
bybit. $1.4 billion. the attacker compromised the signing infrastructure and tricked signers into authorizing malicious transactions. same concept. social engineering. not code.
ronin bridge. $625 million. compromised validator keys. same story.
cetus protocol. $223 million. different method but same result. hundreds of millions gone.
in 2025 alone, $3.4 billion was stolen in crypto. and the pattern is almost always the same. not brilliant code exploits. not zero-day vulnerabilities. someone was tricked. a key was exposed. a human made a mistake.
only 19% of hacked protocols even used multi-sig wallets. and the ones that did, like drift, got beaten anyway. because the weakest link was never the code. it was always the person holding the key.
now here's what makes me angry.
i've seen people dunking on solana over this. blaming svm. questioning the entire chain. the same thing happened after bybit when people started questioning evm and ethereum's security model.
this is not a solana problem. this is not an ethereum problem. this is not chain-specific at all.
drift's own report says it clearly. the programs and smart contracts worked exactly as designed. the chain did what it was supposed to do. a human was tricked into signing something they shouldn't have. that can happen on any chain. any protocol. any ecosystem.
pointing fingers at solana is a deflection. and it's net negative for the entire space because it distracts from the real conversation we need to have.
which brings me to circle.
nine days before the drift hack, circle froze 16 business wallets overnight. legitimate companies. crypto exchanges. forex platforms. payment processors. no criminal charges. a sealed civil lawsuit that nobody could even read. no advance warning. businesses woke up and couldn't process payments, couldn't settle trades, couldn't serve their customers.
zachxbt called it "potentially the single most incompetent freeze" he'd seen in over five years of investigations. one of the frozen wallets wasn't even a business. it was a dfinity bridge contract used by thousands of users who had nothing to do with the case.
then nine days later, $280 million is being drained from drift in real time. the attacker is converting stolen tokens through jupiter, bridging them to ethereum, moving funds through circle's own cross-chain transfer protocol.
and the freeze didn't come fast enough.
so circle can shut down 16 legitimate businesses overnight for a civil case. but a quarter billion being actively stolen through their own infrastructure? different speed.
i'm not saying circle is the villain here. i'm saying the system is broken in ways that should concern everyone.
now think about who's actually affected by drift.
it's not just traders. protocols are built on top of drift. neobanks integrate with defi infrastructure. real customers with no idea what a multisig even is woke up and saw they couldn't access their money. some platforms said user funds are safe. but nobody could withdraw.
your money is "safe" but you can't touch it. think about what that feels like for someone who just wanted a better savings rate.
i know what it feels like on a smaller scale. i lost $5,000 to social engineering. it's nothing compared to $280 million. but the feeling is the same. that moment when you realize the funds are gone and there's nothing you can do. it doesn't scale with the dollar amount. it's the same pit in your stomach whether it's $5k or $280m.
and here's the question i keep circling back to.
we say defi is the future. we say we're going to onboard the next billion users. we say this technology will replace traditional finance and bank the unbanked and give people financial sovereignty.
but how do we onboard millions of people into a system where a social engineering attack can drain a quarter billion dollars in minutes? where 2 out of 5 signatures is considered security for $280m? where the attacker sets up wallets two weeks early, runs a test transaction, and nobody notices? where circle can freeze legitimate businesses overnight but can't stop a live heist fast enough? where the same attack, the same playbook, the same human error keeps happening year after year after year?
ronin. bybit. cetus. now drift. same cause. different name. different chain. same result.
defi doesn't have a code problem. it has a people problem. and we keep solving for the code.
i haven't interacted with a protocol in a while. i like money. but i love safety more. and right now this space is asking me to choose between the two.
security can't keep being the last conversation. it can't keep being the thing we talk about after the hack and forget about before the next one. it has to be the first priority. not the last.
because right now we're not ready for the next billion users. we're barely keeping the ones we have safe.
English

big personal news:
first off, Solana is dead
second, i now lead Founder Success at @ethereumfndn. my mandate is helping early stage startups that will drive max value.
what will i do at Ethereum:
> support all early stage founders
> migrate top founders from Solana to Ethereum
> bring trenchers to Ethereum
> scale the L1
what motivates me personally:
first off, I am doing this for glory. I want to come in and be instrumental in growing trading activity and onchain tvl.
second, I want to be relevant again. I miss pissing people off while being unavoidable. its fun
thirdly, I got rejected from this position by the Solana Foundation, so I've approached Ethereum.
Thank you for your attention to this matter.
English

@redpillb0t Why? So they can check if we eat their fake meat? Fuck you bill
English

@teslaxander Die Plastik Optik vorne ist einfach nur Horror, niemand will so ein Auto
Deutsch

BMW behauptet, der iX3 neue Klasse sei »ausverkauft«.
Derweil stapeln sich nagelneue iX3 in den Autohäusern und setzen dort Staub an.
Allein bei Mobile de über 100 Inserate. Ziemlich viel für ein nagelneues Auto, das angeblich jeder haben will. Im Ausland stehen weitere rum.
Neuwagen-Besteller müssen tatsächlich bis Ende 2026 oder sogar 2027 warten, die Produktion in Ungarn muss noch hochfahren. Warum verkauft BMW nicht einfach die bereits existierenden Autos an angeblich echte Kunden?
Sind >80.000 Euro vielleicht doch zu viel für ein Auto, das man bei Tesla 30.000 günstiger bekommt?!
(Fundstück von @LucilleChad )
Deutsch

Just secured CryptoPunk #8205 🔥🔥🔥
Another iconic piece added to the collection and I absolutely love the shades 😎
Owning a piece of digital history feels unreal, grateful to be part of something this iconic
What do you guys think of this one? 👀
#CryptoPunks #NFT

English

🚨BIG WARNING: GOOGLE JUST SHOWED THE WORLD HOW TO HACK EVERY CRYPTO WALLET!!!
They dropped a whitepaper today with the exact numbers. How many qubits, how many operations, how long it takes.
The answer? Minutes. Not years. Minutes.
Everyone thought cracking crypto would need millions of qubits. Google just said nah, 500,000 is enough. That's a 20x reduction from what we all assumed.
And they didn't even publish the full circuits. The method is so dangerous they used zero-knowledge proofs to basically say "trust us, we have the recipe" without leaking it.
Read that again. Google themselves thought it was too risky to share openly.
Now here's what nobody is talking about. Satoshi's wallets. Old dormant addresses. Millions of wallets with public keys just out there in the open. That's a multi-billion dollar honeypot waiting for whoever builds this machine first.
Google is already working with Coinbase, Ethereum Foundation, and Stanford to shift everything to quantum-proof cryptography.
The deadline they set? 2029.
That's three years away.
2029 sounds far until it isn't. The best projects are already working on this. Pay attention to which ones.


English

@_StonersRUs_ That shit happens only with Tabak… smoke pure problem solved 🤌🏽
English

Little reminder: After Germany blew up their nuclear power plant cooling towers, last year they blew up one of their biggest coal power plants.
Right in time for the biggest energy crisis in history to hit…
The coal plant was:
- Only 6 years old
- Cost €3 billion
- Produced 1,650 MW
Germany is doing everything in its power to create a perpetual energy crisis.
English
Berlu 313 retweetledi

@mjweb3_ @Berlu_313 @cetsfk @solana @MarkiiiWeb3 @hollyboysol @0xAlienWho @web3rey @Bie_web3 @Deatroy123 @svofshahr @SolflareEmpire once a cet always a cet

English
Berlu 313 retweetledi













