
USDC | USDC
$1.01
Coin info
Rank
#6
Market Cap
$79,614,568,677
Volume (24h)
$5,131,832,319
Circulating Supply
79,621,777,960.35
Total Supply
79,652,062,843.72
Do you think the price will rise or fall?
Rise 40%
Fall 60%
Price perfomance
Depth of Market
Depth +2%
Depth -2%

We recommend
News
See more2 Apr 2026, 10:13
Drift explains $280M exploit as critics question Circle over USDC freeze

Drift said a durable nonce attack helped drive its Solana exploit, as critics questioned why stolen USDC moved for hours without a freeze.
2 Apr 2026, 09:15
Critical USDT0 Response to Drift Hack Exposes Stark Contrast in Stablecoin Security Protocols

BitcoinWorld Critical USDT0 Response to Drift Hack Exposes Stark Contrast in Stablecoin Security Protocols In a decisive security move that highlights evolving decentralized finance protocols, Tether’s unified liquidity protocol USDT0 responded to the Drift hack within 90 minutes by halting its cross-chain communication network on Solana. This rapid intervention, announced on March 15, 2025, through official channels, occurred as on-chain analyst ZachXBT revealed Circle had taken no comparable action despite millions in USDC moving through its Cross-Chain Transfer Protocol (CCTP) during the same incident. USDT0 Protocol Executes Swift Security Response Tether’s USDT0 protocol demonstrated remarkable operational efficiency during the Drift security incident. The unified liquidity platform immediately suspended cross-chain communication on the Solana network upon detecting anomalous activity. Consequently, this preventive measure potentially limited further exposure to the exploit. The protocol’s architecture, designed for rapid response capabilities, enabled security teams to implement network-level controls within the critical 90-minute window. Furthermore, this incident represents a significant test for emerging cross-chain protocols. USDT0’s response mechanism, which involves automated monitoring and manual intervention protocols, functioned as intended during a live security event. The protocol’s ability to isolate specific network functions while maintaining overall system integrity provides valuable insights for the broader DeFi security landscape. Security experts note that such targeted responses represent an advancement over blanket shutdowns that can disrupt legitimate users. Circle’s CCTP Protocol Faces Scrutiny Meanwhile, Circle’s Cross-Chain Transfer Protocol (CCTP) operated without intervention during the same security incident. On-chain analyst ZachXBT documented substantial USDC movements through CCTP as the Drift exploit unfolded. This apparent inaction has sparked discussions about varying security philosophies among major stablecoin issuers. Circle’s protocol, which facilitates permissionless cross-chain transfers, presents different security considerations than more centralized alternatives. Industry observers highlight the fundamental design differences between these protocols. USDT0 incorporates centralized control points for emergency response, while CCTP emphasizes decentralization and permissionless operation. These architectural choices directly influence response capabilities during security incidents. The table below illustrates key operational differences: Protocol Feature USDT0 Circle CCTP Emergency Response Mechanism Centralized control points Decentralized validators Response Time Demonstrated 90 minutes No intervention documented Network Impact Targeted function suspension Full network operation Security Philosophy Active intervention capability Permissionless operation priority Cross-Chain Security Implications The Drift incident exposes critical considerations for cross-chain security architecture. Security researchers emphasize several key factors: Response Time Thresholds: The 90-minute benchmark establishes a new industry reference point Protocol Design Trade-offs: Centralized controls versus decentralized principles Communication Protocols: Transparency requirements during security events User Protection Mechanisms: How protocols safeguard end-user assets These elements collectively shape how protocols balance security, decentralization, and usability. The incident particularly highlights the challenges of implementing security measures in permissionless environments where malicious actors can operate alongside legitimate users. Solana Network Security Context The Drift exploit occurred within the broader Solana ecosystem, which has experienced multiple security incidents throughout 2024 and early 2025. Solana’s high throughput and low transaction costs have made it attractive for DeFi applications but have also presented unique security challenges. The network’s architecture, which processes transactions rapidly across multiple parallel threads, creates complex security monitoring requirements. Security analysts note that cross-chain bridges and communication layers represent particularly vulnerable points in blockchain ecosystems. These interfaces between different networks create additional attack surfaces that malicious actors can exploit. The Drift incident specifically involved manipulation of cross-chain communication, highlighting this persistent vulnerability category. Consequently, protocol developers increasingly focus on securing these critical junctures between blockchain networks. Industry Response and Best Practices Following the incident, several industry organizations have begun developing standardized response frameworks. These initiatives aim to establish: Clear communication protocols during security events Standardized response time expectations Cross-protocol coordination mechanisms Post-incident analysis and reporting standards These efforts seek to balance the need for rapid response with the preservation of decentralized principles. The varying approaches demonstrated by USDT0 and CCTP during the Drift incident provide concrete case studies for these developing frameworks. Industry working groups are particularly interested in creating response protocols that maintain network integrity while addressing immediate threats. Regulatory Considerations Emerging The differential response to the Drift hack has attracted regulatory attention. Financial authorities in multiple jurisdictions are examining how decentralized protocols handle security incidents. Key regulatory questions include: Protocol operators’ responsibilities during security events represent a developing area of regulatory focus. The contrast between USDT0’s active intervention and CCTP’s permissionless operation highlights fundamental questions about protocol governance. Regulatory bodies are particularly interested in how these approaches align with existing financial regulations and consumer protection standards. Furthermore, cross-jurisdictional coordination presents additional complexity. Protocols operating across multiple legal frameworks must navigate varying regulatory expectations during security incidents. This complexity increases when protocols incorporate decentralized governance structures that distribute decision-making authority across global participant networks. Conclusion The USDT0 response to the Drift hack establishes important precedents for cross-chain security protocols. The 90-minute intervention demonstrates that rapid response mechanisms can function effectively within decentralized finance ecosystems. Meanwhile, Circle’s CCTP protocol operation during the same incident highlights the ongoing tension between security intervention and permissionless operation principles. These contrasting approaches will likely inform future protocol designs and regulatory frameworks as the industry continues maturing. The incident ultimately underscores that security response capabilities represent critical differentiators in the competitive stablecoin and cross-chain protocol landscape. FAQs Q1: What specific action did USDT0 take during the Drift hack? USDT0 halted its cross-chain communication network on the Solana blockchain within 90 minutes of detecting the security incident, preventing potential further exploitation through its protocol. Q2: How did Circle’s response differ from Tether’s during this incident? Circle’s Cross-Chain Transfer Protocol (CCTP) continued operating without intervention during the Drift exploit, with millions in USDC moving through the protocol as documented by on-chain analyst ZachXBT. Q3: What are the security implications of this differential response? The contrast highlights fundamental design philosophies: USDT0 incorporates centralized control points for emergency response, while CCTP prioritizes permissionless operation and decentralization, creating different security and response capabilities. Q4: Why are cross-chain protocols particularly vulnerable to exploits? Cross-chain bridges and communication layers create additional attack surfaces between different blockchain networks, requiring complex security monitoring and presenting attractive targets for malicious actors. Q5: What industry developments might follow this incident? The event will likely accelerate development of standardized security response frameworks, clearer communication protocols during incidents, and more sophisticated cross-protocol coordination mechanisms for future security events. This post Critical USDT0 Response to Drift Hack Exposes Stark Contrast in Stablecoin Security Protocols first appeared on BitcoinWorld .
2 Apr 2026, 08:10
Drift Protocol hack raises crypto lending red flags as institutional funds chase yields

Drift Protocol, exploited for up to $285M, may have lasting repercussions on Solana DeFi and lending as a whole. The incident exposed significant whale funds, showing the ongoing weakness in Web3 infrastructure. Drift Protocol exposed the weakness of Web3 lending and decentralized trading. The protocol discovered the main cause of the exploit, which was the loss of two private keys to the multisig wallet. This allowed the hacker to change the rules, lock the team out of the admin account, and drain valuable assets against a fake token collateral. Drift Protocol was not exploited through a smart contract, but its governance process was too fast and without failsafe mechanisms. This allowed the hacker to withdraw funds continuously for more than an hour, mimicking borrowing against the posted token collateral . According to OShield Protocol, the compromised wallets allowed the hacker to change the admin key with an on-chain transaction on Solana. Another multisig member, presumably the second compromised key, approved the change. The hacker then created a vault based on a falsely valued token with an inflated oracle price. After that, the hacker was free to use Drift Protocol’s own features for cross-margin and swapping to drain multiple vaults. After the hack, the funds were consolidated on Ethereum addresses in the form of ETH. The hacker used Phantom Wallet , Wormhole bridge and Jupiter’s bridging service to take the funds out of Solana, later using other DEXs to swap out of freezable USDC tokens. The ETH can become hard to trace if mixed through Tornado Cash. On-chain researcher ZachXBT noted Circle did not react to over $230M in USDC while it moved in the early hours after the hack. Update: $230M+ USDC bridged via CCTP from Solana to Ethereum across 100+ txns. 6 hours is how long Circle had to freeze stolen funds from the $280M+ Drift hack. Circle is a centralized stablecoin issuer headquartered in New York and the attack began around 12 pm ET. Why does… pic.twitter.com/v9OKxeOJHN — ZachXBT (@zachxbt) April 2, 2026 In theory, Circle can freeze tokens, but rarely does so, and only if there are legal concerns against a known entity. Which protocols were affected by the Drift Protocol hack? One of the biggest concerns was which other DeFi hubs would be affected by Drift Protocol. The DEX and lending vaults advertised themselves as reliable sources of yield for USDC, just as Solana lending was growing. DeFi Dev Corp., one of the biggest Solana treasury companies, stated it did not get exposure to Drift Protocol. Previously, the DAT company stated it may put some of its funds to use within Solana DeFi vaults, but did not build a direct exposure to Drift. The company still allocates some of its assets to on-chain yield strategies, but has a high standard of risk management. Several smaller DeFi protocols, however, reported indirect losses. In DeFi, vault curation has turned into a tool that sometimes consolidates funds into the largest and presumably, most stable protocols. Before the exploit, Drift Protocol held around $550M in liquidity and was linked to smaller Solana DeFi apps. Protocols include Trade Neutral, Elemental DeFi, SynatraXYZ, Project0, Ranger Finance, and Reflect Money. Carrot Protocol also reported direct losses from funds locked in Drift vaults, an estimated 50% of value locked. After further investigation – Carrot has been impacted by the recent exploit on the Drift protocol. We have paused mint/redeem functions at this time until we can gain more clarity and will update with information when we have it. All Boost and Turbo products are unaffected — Carrot (@DeFiCarrot) April 1, 2026 All user funds were also affected for Pyra Protocol , which was just a storefront for using Drift. The app cannot honor user withdrawals, as all funds were locked with Drift and are completely inaccessible. The exposure of private keys also raises questions about the wider DeFi lending market . Recently, the rise in stablecoin supply and search for yield presented lending as an activity suitable even for institutions. This recent exposure of private keys and admin access hijack showed that Web3 security still has weak spots, which could expose institutional-grade capital to major risks. Following the hack, the overall Solana DeFi value fell from $6.1B to $5.4B , as reported by Defillama. DRIFT tokens also incurred losses, wiping out 37% to a price of $0.04. SOL also lost 5.7% in the past day, sinking below $80. The crypto card with no spending limits. Get 3% cashback and instant mobile payments. Claim your Ether.fi card.
2 Apr 2026, 00:45
Circle USDC Swap Scandal: ZachXBT Exposes Shocking Inaction During Drift Hack

BitcoinWorld Circle USDC Swap Scandal: ZachXBT Exposes Shocking Inaction During Drift Hack In a stunning revelation that has sent shockwaves through the cryptocurrency community, prominent on-chain investigator ZachXBT has exposed what he describes as Circle’s complete failure to act during a critical security incident. The allegations center on the multimillion-dollar Drift protocol hack and raise serious questions about corporate responsibility in the blockchain ecosystem. According to ZachXBT’s detailed analysis published on social media platform X, Circle’s Cross-Chain Transfer Protocol (CCTP) facilitated the movement of stolen funds without any intervention from the stablecoin issuer. Circle USDC Protocol Faces Security Scrutiny Circle’s Cross-Chain Transfer Protocol represents a crucial infrastructure component for the cryptocurrency industry. This system enables users to move USDC tokens seamlessly between different blockchain networks. Furthermore, the protocol has gained significant adoption across various decentralized applications. However, recent events have exposed potential vulnerabilities in its operational framework. The Drift protocol incident occurred on the Solana blockchain, where attackers exploited vulnerabilities to drain substantial funds. Subsequently, the perpetrators utilized Circle’s CCTP to bridge stolen USDC from Solana to the Ethereum network. This cross-chain movement happened without any apparent resistance or monitoring from Circle’s security teams. Consequently, the entire transaction process completed successfully for the attackers. ZachXBT’s Detailed Investigation Timeline On-chain analyst ZachXBT, renowned for exposing cryptocurrency misconduct, published a comprehensive thread detailing the sequence of events. His investigation revealed several critical findings about the security incident. First, the hack targeted the Drift protocol on Solana, resulting in significant financial losses. Second, attackers immediately began moving funds through Circle’s cross-chain infrastructure. Third, and most importantly, Circle’s systems processed these transactions without triggering security protocols. ZachXBT contrasted this inaction with Circle’s previous wallet-freezing actions. Specifically, he referenced incidents from March 26 when Circle allegedly froze 16 exchange-connected wallets. This discrepancy in response has generated considerable controversy within the cryptocurrency community. Comparative Analysis of Circle’s Security Actions Incident Date Action Taken Amount Involved Protocol Used March 26 Wallet Freezing Undisclosed Direct Intervention Drift Hack No Action Millions CCTP Processing This comparative data highlights the inconsistent approach to security enforcement. Industry experts have noted several potential explanations for this discrepancy. Some suggest technical limitations in monitoring cross-chain transactions. Others point to policy differences between direct wallet control and protocol-level oversight. However, the fundamental question remains about consistent security implementation. Cross-Chain Security Implications for DeFi The Drift hack incident exposes broader security challenges in decentralized finance. Cross-chain bridges have become essential infrastructure for blockchain interoperability. Yet, they also represent potential attack vectors and regulatory compliance challenges. The Circle CCTP case demonstrates how security responsibilities become blurred across protocol layers. Several key implications emerge from this security incident: Protocol-level monitoring gaps in cross-chain systems Inconsistent enforcement policies across different scenarios Industry standardization needs for security responses Transparency requirements for stablecoin issuers Blockchain security experts emphasize the growing importance of cross-chain security frameworks. As decentralized finance expands across multiple networks, coordinated security responses become increasingly critical. The Circle case may prompt industry-wide discussions about standardized security protocols. Regulatory and Industry Response Patterns Financial regulators worldwide have increased their scrutiny of cryptocurrency platforms. Stablecoin issuers like Circle face particular attention due to their central role in digital asset markets. The recent incident may influence regulatory approaches to cross-chain transactions. Additionally, industry groups may develop new security standards for bridge protocols. Several cryptocurrency exchanges have already begun reviewing their integration with cross-chain services. Security teams are examining transaction monitoring capabilities across blockchain networks. Furthermore, decentralized protocol developers are considering enhanced security measures for bridge interactions. These collective responses demonstrate the industry’s recognition of systemic security challenges. Technical Analysis of the CCTP Mechanism Circle’s Cross-Chain Transfer Protocol operates through a sophisticated technical architecture. The system utilizes smart contracts on both source and destination chains. When users initiate cross-chain transfers, the protocol burns tokens on the source chain. Subsequently, it mints equivalent tokens on the destination chain. This process requires careful coordination and security validation. The technical implementation involves several security layers: Smart contract verification on both blockchain networks Transaction validation through consensus mechanisms Monitoring systems for unusual activity patterns Emergency pause functionality for critical situations According to ZachXBT’s analysis, none of these security layers triggered during the Drift hack transactions. This failure suggests either technical limitations or policy decisions prevented intervention. The cryptocurrency community now seeks clarification about Circle’s security protocols and response criteria. Conclusion The Circle USDC swap controversy during the Drift hack represents a significant moment for cryptocurrency security standards. ZachXBT’s investigation has exposed critical questions about corporate responsibility in cross-chain transactions. As the industry continues to evolve, consistent security practices become increasingly important. This incident will likely influence future developments in blockchain security protocols and regulatory frameworks. The cryptocurrency community now awaits Circle’s formal response and any subsequent changes to cross-chain security measures. FAQs Q1: What exactly did ZachXBT allege about Circle’s actions during the Drift hack? ZachXBT alleged that Circle failed to intervene or block the movement of millions of dollars in stolen USDC through its Cross-Chain Transfer Protocol during the Drift protocol exploit, despite having previously frozen wallets for other reasons. Q2: How does Circle’s Cross-Chain Transfer Protocol (CCTP) work? CCTP enables USDC transfers between different blockchain networks by burning tokens on the source chain and minting equivalent tokens on the destination chain through coordinated smart contracts. Q3: Why is there controversy about Circle freezing some wallets but not others? The controversy stems from Circle allegedly freezing 16 exchange-connected wallets on March 26 for compliance reasons, while taking no action during the multimillion-dollar Drift hack, creating perceptions of inconsistent policy application. Q4: What security implications does this incident have for cross-chain bridges? The incident highlights potential security monitoring gaps in cross-chain protocols and raises questions about responsibility for preventing illicit fund movements across different blockchain networks. Q5: How might this affect the broader cryptocurrency industry? This case may prompt increased scrutiny of cross-chain security protocols, potential regulatory attention on stablecoin issuers’ responsibilities, and industry discussions about standardized security responses to hacking incidents. This post Circle USDC Swap Scandal: ZachXBT Exposes Shocking Inaction During Drift Hack first appeared on BitcoinWorld .















































