Please wait we are preparing awesome things to preview...

Crypto Drift: Expert Says Incident Likely Civil Negligence

07.04.2026 07:59

## Crypto Security Breach: Expert Claims Drift Incident Could Be Civil Negligence

Recent developments in the cryptocurrency space are highlighting critical questions surrounding security protocols and regulatory responsibilities, with a legal expert suggesting a major exploit may fall under the purview of civil negligence. The $280 million breach targeting the Drift protocol, a decentralized finance (DeFi) platform built on Solana, is being viewed through a new legal lens by attorney Ariel Givner.

Givner, specializing in both corporate and cryptocurrency law, argues that the incident could be categorized as civil negligence. Her reasoning hinges on the Drift team's failure to implement fundamental security measures expected of serious crypto projects, particularly given the substantial sums of funds entrusted to their platform. She asserted that reasonable steps to safeguard these assets, including stringent software exposure limitations, rigorous vetting of interactions with developer teams, and air-gapping signing keys, were not adequately followed.

The attack, traced to a network linked to North Korea's state-sponsored hacking operations, underscores the persistent threat landscape within the cryptocurrency ecosystem. Givner points to a cascade of well-documented incidents involving North Korean-affiliated groups over the past several years, emphasizing the inherent risks associated with operating in this environment. The breach occurred through a months-long social engineering campaign, where attackers cultivated relationships with Drift’s team via platforms like Telegram and conferences, exploiting vulnerabilities in their security infrastructure.

Ariel Givner’s analysis highlights a concerning pattern of behavior employed by threat actors. Her assessment centers on specific choices made by the Drift team: prolonged communication with unknown contacts, meetings with individuals from undisclosed sources, the opening of suspicious code repositories, and the installation of fraudulent applications on devices connected to multisignature controls. These actions, she contends, directly created the exploitable gateway that ultimately allowed the attackers to infiltrate the protocol and execute the devastating $280 million heist. The incident serves as a stark reminder of the critical role of proactive security measures and the potential legal ramifications of neglecting them in a highly volatile and increasingly regulated sector.