
The Neutrality Paradox: How USDC’s Greatest Strength Turned into a $285 Million Quagmire
TechFlow Selected TechFlow Selected

The Neutrality Paradox: How USDC’s Greatest Strength Turned into a $285 Million Quagmire
Circle has the ability to freeze funds but no mandatory obligation to do so, and lacks “safe harbor” legal protection when executing freezes.
By Blockhead
Translated by Baihua Blockchain
When Circle co-founder Jeremy Allaire describes USDC as “trusted, transparent, and regulated,” the unspoken implication is that funds can be frozen. The ability to blacklist addresses and halt transactions is the fundamental distinction between regulated stablecoins and purely algorithmic ones. This feature makes USDC attractive to law enforcement—but it has also triggered a $285 million volatility incident.
On April 1, Drift Protocol—a Solana-based perpetuals exchange—lost $285 million. According to reports, hackers linked to North Korea, operating under the moniker “Lazarus Group,” had spent up to six years infiltrating the protocol via social engineering and technical exploits, ultimately draining its treasury. Of the stolen funds, an additional $232 million in USDC was transferred from Solana to Ethereum during the attack using Circle’s Cross-Chain Transfer Protocol (CCTP). No intervention occurred, with Circle citing lack of legal authority to act. Yet the question—“Should Circle have intervened?”—has already been answered by existing law.
A Legal Gap in the Freeze Authority Debate
Circle’s terms of service permit blacklisting addresses and freezing USDC involved in suspicious activity. In response to criticism over why it did not proactively freeze the funds, Circle’s standard reply is that it acts only when legally required to do so. This stance is legally conservative and commercially prudent—but critics argue it reflects narrow, inadequate authority.
Salman Banei, General Counsel of Plume, an asset tokenization network, stated: “We’re witnessing a misalignment between the operational capabilities of stablecoin infrastructure and current legal requirements. Issuers need a ‘safe harbor’—legal protection from civil liability when they freeze assets based on ‘reasonable belief’ that illicit transfers are occurring.” Without legislative safeguards, proactive freezing risks liability; yet waiting for law enforcement often means it’s already too late.
In rapidly evolving exploit scenarios, real-world execution happens in minutes, while court orders take days or weeks. This structural gap played out live on April 1: over the course of a six-hour attack window, $232 million completed its cross-chain transfer.
Not Just a Problem—But the Real Problem
The Drift case complicates the moral calculus. This was not a simple smart contract vulnerability—where freezing funds would clearly restore value to victims—but rather involved front-running mining and pre-signed authorizations, making it extremely difficult to determine, at the moment of transaction, whether the activity was illegal. Any decision Circle made would thus involve judgment—not mere compliance.
Ben Levit, founder of Bluechip, put it bluntly: “USDC cannot simultaneously position itself as neutral infrastructure while retaining discretionary intervention rights. Markets can price either ‘absolute non-intervention’ or ‘absolute intervention’—but ‘ambiguity’ is inherently unpriceable.”
The DeFi Multisig Problem
The technical root of Drift’s hack was not a conventional code vulnerability, but a governance failure. Over several months, attackers built trust with team members—and exploited a March 27 security council migration that shifted the protocol to a zero-timelock 2-of-5 multisig setup, eliminating any time delay that might otherwise have allowed the team to detect and block anomalous transactions.
Within roughly 12 minutes, attackers executed 31 withdrawals, injecting liquidity using a counterfeit token called CarbonVote Token and conducting wash trades through Drift’s own front-running engine to mimic legitimate activity. This was not a smart contract exploit—it was a human-factor breach enabled by a governance configuration change that removed latency safeguards.
This has become a verifiable pattern in DeFi incidents. Security breaches at Radiant Capital and Bybit similarly involved social engineering attacks targeting multisig signers—and resulted in rapid asset movement. Audits verify code—but verifying whether signers have been compromised, or whether governance migrations introduce new vulnerabilities, remains an unsolved challenge with no known solution.
A Policy Moment
The U.S.-proposed GENIUS Act and related stablecoin legislation aim to bring issuers under federal regulatory oversight. Yet neither sufficiently clarifies the discretionary freeze question: When may issuers act? When must they act? And what liabilities accompany each?
The Drift incident underscores why this issue is critical. As stablecoins become deeply embedded across DeFi infrastructure, reliance on subjective judgment alone is no longer sustainable. According to TRM Labs, $141 billion in stablecoin transactions in 2025 were linked to money laundering and sanctions evasion. As transaction volumes grow, crises like the one on April 1 will likely occur more frequently.
If USDC is to serve—as its issuer intends—as the “neutral plumbing” of the crypto economy, the rules governing when those pipes can be shut off must be far clearer than they are today. Otherwise, every major attack will reignite the same debate: Should the issuer freeze? Can it legally freeze? And who bears responsibility for the gray zone in between?
Join TechFlow official community to stay tuned
Telegram:https://t.me/TechFlowDaily
X (Twitter):https://x.com/TechFlowPost
X (Twitter) EN:https://x.com/BlockFlow_News














