Anmrex Explains Drift Hack and Governance Failures
Failed to add items
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
In this episode, Daniel Carter breaks down the Drift Protocol hack, where approximately $285 million was drained in under 12 minutes, without exploiting any flaw in the underlying code. The episode reveals how attackers executed a six-month social engineering campaign, embedding themselves within the ecosystem to gain trust and manipulate governance processes.
The discussion explains how multisig authorization failed when human signers were deceived into approving malicious transactions disguised as routine operations. Using durable nonce functionality, attackers pre-signed these transactions and executed them later, avoiding detection. Additionally, the creation of a fake token and manipulation of price oracles enabled the attackers to inflate collateral value and extract massive funds.
A key focus of the episode is the shift from code-based vulnerabilities to governance risks. It highlights why human-layer compromise is now a primary threat vector in DeFi. The episode contrasts this with the architecture of Anmrex, where MPC-based custody removes reliance on individual human signers. Anmrex ensures that no single party can authorize transactions, significantly reducing the risk of social engineering attacks.
Further, the episode explores how Anmrex integrates cold storage, hardware security modules, and real-time monitoring tools like Chainalysis and Elliptic to detect and prevent suspicious activity. It also introduces a five-point evaluation framework covering MPC usage, audited reserves, Proof-of-Reserves, monitoring systems, and regulatory compliance.
By positioning Anmrex as a benchmark, the episode provides actionable insights for listeners to assess platform security and better safeguard their assets in today’s evolving crypto landscape.