Solana Foundation unveils security overhaul days after $270 million Drift exploit

SOL3,89%
DRIFT-15,21%
USDC-0,01%
W1,16%

The Solana Foundation announced a suite of security initiatives on Monday, just five days after decentralized finance (DeFi) platform Drift Protocol suffered a $270 million exploit carried out by a North Korean state-affiliated group following a six-month social engineering campaign.

The centerpiece is Stride, a structured evaluation program led by Asymmetric Research that will assess Solana DeFi protocols against eight security pillars and publish its findings publicly. The foundation also introduced the Solana Incident Response Network (SIRN), a membership-based group of security firms and researchers focused on real-time crisis response.

The initiatives address part of the problem exposed by Drift, but not the mechanics that actually caused the loss. Drift’s smart contracts were not compromised, and its code passed audits. The vulnerability was human: The attackers spent six months building relationships with Drift contributors and compromised their devices through a malicious code repository and a fake TestFlight app.

Under Stride, protocols with more than $10 million in total value locked (TVL) that pass the evaluation will receive ongoing operational security and active threat monitoring funded by Solana Foundation grants, with coverage calibrated to each protocol’s risk profile.

For protocols with more than $100 million in TVL, the foundation will also fund formal verification, a mathematical method that checks every possible execution path in a smart contract to guarantee correctness.

In addition to Asymmetric Research, founding members include OtterSec, Neodyme, Squads, and ZeroShadow. The network is available to all Solana protocols but prioritized by TVL.

Stride’s formal verification, however, would not have caught the North Korean attack, which used the compromised devices to obtain multisig approvals that were then locked into durable nonce transactions and executed weeks later.

Neither would 24/7 monitoring of onchain activity, because the transactions were valid by design and indistinguishable from legitimate administrative actions until they were used to drain the vaults. The attack exploited the gap between onchain correctness and offchain human trust, a gap no smart contract audit or monitoring tool is built to cover.

SIRN, however, could have helped with the response. ZachXBT, an onchain security expert, criticized stablecoin issuer Circle Internet (CRCL) for failing to freeze over $230 million of its stolen dollar-pegged USDC during a six-hour window after the attack began.

A dedicated incident response network with established relationships to bridge operators, exchanges and stablecoin issuers might have shortened the response time. Whether it would have been fast enough to prevent the Wormhole bridging and obfuscation through Tornado Cash is an open question.

The foundation was careful to note that the programs “do not transfer the underlying responsibility away from the protocols themselves,” a line that reads differently after Drift’s postmortem revealed that individual contributor devices were the entry point for a nation-state attack.

Solana already hosts several free security tools for builders, including Hypernative for threat detection, Range Security for real-time monitoring, and Neodyme’s Riverguard for attack simulation.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

DoubleZero Edge Boosts Solana Data Speed With Fiber Optic Network

DoubleZero has introduced DoubleZero Edge, a high-performance data transmission platform designed to deliver real-time blockchain information for the Solana ecosystem, with beta access announced on April 16, 2026. The service moves data delivery away from the public internet onto a dedicated fiber o

CryptoFrontier2h ago

Trader Turns $960 into $337K in Under 2 Hours, Achieving 351x Return on SOL and ASTEROID Trade

A trader turned 11 SOL into $337,000 in under two hours by using three wallets to buy 158.51 million ASTEROID tokens and later selling most for 1,539 SOL, while retaining 23.76 million tokens worth about $202,000.

GateNews3h ago

Solana Adoption Surges to 167M While Usage and Price Diverge

Key Insights Solana reached 167 million holders, signaling strong adoption growth even as active addresses declined, showing a widening gap between ownership and usage trends. Institutional interest increased as DeFi Development Corp accumulated over 2.22 million SOL, reinforcing long-term c

CryptoNewsLand16h ago

Bitcoin, Ethereum and Solana ETFs Record Positive Net Inflows on April 16

Gate News message, according to the April 16 update, Bitcoin ETFs recorded a 1-day net inflow of +2,855 BTC (+$209.95M) and a 7-day net inflow of +11,849 BTC (+$871.52M). Ethereum ETFs showed a 1-day net inflow of +15,477 ETH (+$35.44M) and a 7-day net inflow of +90,366 ETH (+$206.94M). Solana ETFs

GateNews18h ago

Circle Issues 250M USDC on Solana

Gate News message, April 16 — According to Whale Alert, Circle has minted 250 million USDC on the Solana blockchain.

GateNews19h ago

Bless Project Transfers 300M $BLESS Worth $3.83M Across Solana and BSC in 9 Hours

The Bless project transferred 300 million $BLESS tokens worth $3.83 million across Solana and BSC. 200 million were deposited into a CEX, and 56.76 million have been sold on BSC, with more sales ongoing.

GateNews21h ago
Comment
0/400
No comments