Class Action Filed Against Circle Over Drift $280M Hack; Tether Offers $150M Rescue for Drift

In Q1 2026 attackers stole $450 million across 145 incidents. Losses from smart-contract exploits fell 89% year‑over‑year due to audits and improved protocol architecture. Attackers shifted to phishing and social engineering, which made up about $306 million (nearly two‑thirds) of Q1 losses. The April 1 Drift Protocol breach ($285M), attributed to DPRK-linked group UNC4736, was a six‑month campaign targeting contributors rather than exploiting code. In the two weeks after Drift, a dozen protocols were hit via DNS hijack, forged cross‑chain proofs, oracle manipulation, compromised repos, weaponized wallets and other human/vector attacks. Reports also note the first known exploit of an AI‑authored contract and DPRK actors extracting over $40M via fake VC outreach, raising the core security issue of detecting compromised people with privileged access.
AI Analysis
Negative sentiment: Q1 saw $450M stolen and a $285M breach (Drift) attributed to DPRK-linked UNC4736, and attackers shifted to high‑value phishing/social engineering (~$306M). Market impact: large, concrete losses (total $450M and a single $285M event) are material and occurred recently, so short‑term traders could react, but the shift to social‑engineering (human compromise) reduces direct code‑based exploit predictability.