Global Cyber Disruption: Hasbro Systems Offline as Massive DeFi Governance Hack Hits Drift Protocol
Hasbro infrastructure faces weeks of disruption after a cyberattack, while Drift Protocol loses $280M to governance abuse. Explore the latest in cyber security.
By: AXL Media
Published: Apr 6, 2026, 6:55 AM EDT
Source: Information for this report was sourced from Cybersecurity Insider

Hasbro Infrastructure Crippled by Persistent Cyberattack
The global toy and entertainment giant Hasbro has been forced to take its primary systems offline following a targeted cyberattack that triggered an immediate incident response. The breach has disrupted the company’s internal infrastructure, with internal estimates suggesting that the operational impact could persist for several weeks. The outage raises significant concerns regarding the resilience of Hasbro’s global supply chain and the security of its digital services and vast intellectual property ecosystem. As of the current investigation, no specific threat actor has claimed responsibility for the disruption.
Strategic Shift in Decentralized Finance Exploits
In one of the largest financial breaches of the year, Drift Protocol has suffered a $280 million loss following a sophisticated attack on its governance system. Unlike traditional decentralized finance (DeFi) exploits that target smart contract code vulnerabilities, this incident involved the seizure of administrative control. By bypassing code-level defenses to manipulate the governance layer, the attackers impacted over 200,000 users. Security analysts have linked the operation to North Korean threat actors, highlighting a dangerous evolution in how state-sponsored groups are targeting administrative workflows.
The Rising Threat of Governance and Privileged Access Abuse
The Drift Protocol hack underscores a critical shift in the cyber threat landscape, where attackers are increasingly moving away from difficult code exploits in favor of governance abuse. Organizations are now being urged to rethink how they secure privileged access and administrative "multisig" approvals. To mitigate these risks, cybersecurity experts recommend eliminating pre-signed transactions and integrating advanced privileged access management (PAM) with real-time monitoring to detect unauthorized shifts in administrative authority before they can be utilized for large-scale theft.
Categories
Topics
Related Coverage
- New Jersey Pair Sentenced to Prison for $5 Million North Korean Laptop Farm Conspiracy
- European Commission Investigates 350GB Data Theft Following Breach of Cloud Infrastructure Accounts
- National Security Experts Outline Critical Counterintelligence Framework for Protecting Classified Programs Through Enhanced Reporting
- NATO Public Opinion Shifts Toward Viewing Major Cyberattacks as Acts of War