or
Tether Launches $150M Recovery Program for Drift Protocol After $280M Hack
DeFi

Tether Launches $150M Recovery Program for Drift Protocol After $280M Hack

April 16, 20263 min read

Tether announced on April 16 a $150 million recovery program for Drift Protocol, a decentralized exchange on Solana that was exploited for $280 million on April 2. The world's largest stablecoin issuer is stepping in to restore user funds - and picking up a strategic win over its main competitor in the process.

Key facts: Tether covers $127.5 million (85%) of the total, with undisclosed partners funding the rest. The program also includes Drift switching its settlement asset from USDC to USDT after relaunch.

Recovery structure: funds tied to trading activity

Tether is not releasing all funds upfront. The recovery is linked to Drift's ongoing trading volumes - the more traders return to the platform, the faster user balances are restored. Tether stated: "The structure links funding and recovery to ongoing trading activity on the Drift platform, allowing user balances to be restored as the exchange returns to normal operations."

This approach limits Tether's exposure if the platform fails to recover. For affected users, it means gradual rather than immediate payouts. The mechanism is unusual for the market - but commercially sensible.

Drift drops USDC, switches to USDT

Alongside the recovery announcement, Drift is changing its settlement asset. The platform is moving away from Circle's USDC and adopting USDT from Tether as its primary stablecoin for all trades and settlements after relaunch.

For Tether, this is a strategic win. Drift had been one of the larger DeFi platforms where USDC maintained dominance over USDT. That changes with the relaunch.

Circle had six hours to act - and didn't

The central controversy surrounding the hack is Circle's inaction on the day of the attack. The hacker used CCTP - Circle's own cross-chain bridge - to move over $232 million in USDC from Solana to Ethereum. The operation ran for six hours across more than 100 transactions.

ZachXBT documented the full transfer chain and noted that Circle had the technical ability to freeze the attacker's USDC addresses - a power the company has applied in other crisis situations. This time, no action followed. All $232 million moved to Ethereum without interference.

The market reacted sharply. Circle shares fell 10% on April 9 after widespread criticism from the crypto community. Prices have since recovered roughly 20% from that low - but the reputational damage remains a factor.

Elliptic tied the attacker to North Korea

Analytics firm Elliptic linked the attacker's wallets to groups associated with North Korea. ZachXBT confirmed the connection through on-chain analysis. Drift joins a growing list of DeFi protocols targeted by DPRK-linked hackers in 2026.

Drift Protocol: exploit and recovery figures
Exploit size$280M
Recovery fund$150M
Tether's share$127.5M (85%)
Moved via CCTP$232M USDC
Transactions in attack100+
Attack duration~6 hours

Can Drift recover after relaunch

For a DeFi protocol to survive a $280 million exploit and rebuild is almost without precedent. Most platforms hit at this scale either shut down or faded into irrelevance. Drift has real backing in the form of $150 million from Tether and unnamed partners, but success depends on liquidity returning.

Tying recovery to trading volumes is effectively a bet that traders come back. If they return quickly, the timeline compresses. If not, the process drags - and affected users wait longer.

Tether's model: a new approach for DeFi crises

The Drift recovery sets a precedent across the industry. Before this, victims of major DeFi exploits had little to count on beyond hacker negotiations or on-chain investigations with no guarantees. Tether has shown a different path: a major market participant acting as a de facto recovery guarantor.

Whether other large crypto players will follow this model after future attacks remains to be seen. No answer yet. But the precedent is set.

Comments

Your email address will not be published. Required fields are marked *

or verify by email