Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Analysis: The money laundering route for Drift stolen funds involves Backpack accounts, with KYC information potentially serving as a key clue.
Deep Tide TechFlow news. On April 02, according to on-chain analyst aryan (@_0xaryan) monitoring, the Drift Protocol treasury has recently been drained. The attacker address [HkG…ZES] obtained initial funds via Near Intents 8 days ago; afterward, it remained inactive for a long period, and then suddenly transferred a large amount of funds out of the Drift treasury.
In terms of the flow of funds, the attacker transferred assets to multiple money-laundering addresses (including 8ub…Gxw, etc.). All of these addresses received funds from a Backpack wallet one day before the incident. Subsequently, the launderers used the cross-chain protocol Wormhole to transfer the funds to an Ethereum address, and the source of funds for that Ethereum address points to Tornado Cash.
In response, Armani Ferrante, co-founder of Backpack, confirmed that the flow of funds is not a direct path of “Backpack → attacker,” but rather an indirect path of “Backpack → non-attacker (cross-chain intent solver) → attacker,” and stated that they have completed verification with the holders of the relevant accounts.