Crypto Regulation News: Legal Expert Calls Drift Incident Civil Negligence Case

Crypto Regulation News: Legal Expert Calls Drift Incident Civil Negligence Case


The post Crypto Regulation News: Legal Expert Calls Drift Incident Civil Negligence Case appeared on BitcoinEthereumNews.com.

Key Insights: Crypto regulation news: Crypto attorney Ariel Givner says the $280 million exploit on Drift protocol could qualify as civil negligence. Attackers used months-long social engineering to deploy malware. Weak security and negligence enabled a breach, raising legal and trust concerns. The latest crypto regulation news indicates that Ariel Givner, an attorney following the Drift protocol, argued that the breach could have been avoided. In her view, the Drift team failed to meet basic security standards that any serious crypto project should already have in place. Threat actors, linked to North Korea’s state-backed hacking network, likely carried out the $280 million attack on Drift Protocol. That view has gained traction as more details emerge about how the attackers got close to the team behind the Solana-based DeFi platform. Crypto Attorney Says Drift Incident Was Civil Negligence As per the latest crypto regulation news, corporate and crypto law attorney Aries Givner said the Drift exploit may rise to the level of civil negligence because the team did not take reasonable steps to protect the funds under its control. Particularly given that the industry expects crypto platforms handling large customer funds to operate under strict security protocols. The protocols should encompass everything from limiting exposure to unknown software, vetting everyone who interacts with the developer teams, and air-gapping signing keys. Crypto regulation news: The crypto attorney’s argument She argued that the warning signs were well-known across the industry. Crypto has dealt with years of attacks tied to North Korean groups, and crypto regulation news has always covered those incidents. Even so, she said, Drift’s team spent months communicating with unfamiliar contacts on Telegram, meeting unknown individuals at conferences, opening suspicious code repositories, and downloading fake applications on devices connected to multisignature controls. In her assessment, those choices created an opening that…



Source link

Leave a Comment

Your email address will not be published. Required fields are marked *