Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

SwissBorg Solana Earn Program Compromised via Third-Party API Exploit

A supply chain attack exploiting a third-party API enabled unauthorized control over SwissBorg's Solana staking accounts, leading to significant asset drain.
September 23, 20252 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A striking abstract visualization features a dense central structure of numerous blue translucent blocks, surrounded by white spherical nodes connected by thin white lines. This intricate network conceptually illustrates a sharded blockchain architecture, where individual blocks represent data packets or transaction units within a distributed ledger
The image displays a central, textured blue and white spherical object, encircled by multiple metallic rings. A smooth white sphere floats to its left, while two clear ice-like cubes rest on its upper surface

Briefing

In September 2025, SwissBorg, a Swiss wealth management platform, suffered a $42 million hack impacting its SOL Earn Program. The incident stemmed from a supply chain attack where a trusted third-party account, managed by Kiln for Solana staking, was compromised. This exploit allowed attackers to gain control over 192,600 SOL by manipulating a seemingly benign unstaking transaction, leading to a substantial financial loss for the platform. SwissBorg has committed to compensating affected users from its treasury.

Polished blue and metallic mechanical components integrate with a translucent, organic-like network structure, featuring a glowing blue conduit. This intricate visual symbolizes advanced blockchain architecture and the underlying distributed ledger technology DLT powering modern web3 infrastructure

Context

Prior to this incident, the broader DeFi ecosystem faced persistent risks from third-party integrations and supply chain vulnerabilities. Protocols often rely on external services for specialized functions like staking, which can introduce new attack surfaces if not rigorously secured. The prevailing challenge involved ensuring comprehensive security posture extends beyond a protocol’s core infrastructure to encompass all integrated components.

A sleek, metallic device with luminous blue internal elements is prominently displayed, showcasing its intricate design. The central focus is a square-shaped opening leading to a circular interface, suggesting a critical component or connection point

Analysis

The attack vector targeted the Kiln API, which managed SwissBorg’s Solana staking. The attacker executed a standard unstaking transaction that covertly embedded eight malicious authorization instructions. These instructions were designed to transfer control of SwissBorg’s staking accounts to attacker-controlled on-chain addresses.

Upon approval of this seemingly legitimate transaction, the attacker gained unauthorized access, subsequently draining approximately 192,600 SOL from the compromised staking accounts. This exploit leveraged a critical oversight in transaction validation, where the underlying malicious logic within a standard operation went undetected.

A close-up view reveals a high-tech device featuring a silver-grey metallic casing with prominent dark blue internal components and accents. A central, faceted blue translucent element glows brightly, suggesting active processing or energy flow within the intricate machinery

Parameters

  • Protocol Targeted → SwissBorg (SOL Earn Program)
  • Attack Vector → Supply Chain Attack (Kiln API Exploit)
  • Vulnerability → Malicious Logic Concealed in Staking Transaction
  • Financial Impact → Approximately $42 Million (192,600 SOL)
  • Affected Blockchain → Solana
  • Third-Party Involved → Kiln (Solana staking provider)

A sophisticated, silver-toned modular device, featuring a prominent circular interface with a blue accent and various rectangular inputs, is dynamically positioned amidst a flowing, translucent blue material. The device's sleek, futuristic design suggests advanced technological capabilities, with the blue element appearing to interact with its structure

Outlook

This incident underscores the critical need for enhanced third-party risk management and stringent transaction validation mechanisms across the DeFi landscape. Protocols must implement robust due diligence for all external integrations and adopt advanced transaction simulation tools to detect hidden malicious logic. The event will likely catalyze the adoption of more sophisticated security auditing standards, particularly for API interactions and multi-signature approvals, to mitigate contagion risk from similar supply chain vulnerabilities.

A modern, metallic, camera-like device is shown at an angle, nestled within a vibrant, translucent blue, irregularly shaped substance, with white foam covering parts of both. The background is a smooth, light gray, creating a minimalist setting for the central elements

Verdict

The SwissBorg exploit serves as a stark reminder that even robust platforms remain vulnerable to sophisticated supply chain attacks, necessitating a paradigm shift towards comprehensive third-party security audits and real-time transaction integrity checks.

Signal Acquired from → Halborn

Micro Crypto News Feeds

supply chain attack

Definition ∞ A supply chain attack targets the software or hardware supply chain of a digital asset service or platform.

supply chain

Definition ∞ A supply chain is the network of all the individuals, companies, resources, activities, and technologies involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual sale to the end consumer.

solana staking

Definition ∞ Solana Staking is the process of locking Solana (SOL) tokens to support the network's proof-of-stake consensus mechanism and earn rewards.

transaction validation

Definition ∞ Transaction validation is the process of verifying that a digital transaction adheres to all the rules and conditions of the underlying blockchain network.

swissborg

Definition ∞ SwissBorg is a digital asset wealth management platform that offers users a streamlined way to invest in and manage cryptocurrencies.

attack vector

Definition ∞ An attack vector is a pathway or method by which malicious actors can gain unauthorized access to a system or digital asset.

transaction

Definition ∞ A transaction is a record of the movement of digital assets or the execution of a smart contract on a blockchain.

solana

Definition ∞ Solana is a high-performance blockchain platform designed to support decentralized applications and cryptocurrencies with exceptional speed and low transaction costs.

third-party

Definition ∞ A 'third-party' in the cryptocurrency ecosystem is an entity or individual that is not directly involved in a specific transaction or protocol interaction but plays a role in facilitating or verifying it.

third-party risk

Definition ∞ Third-party risk pertains to the potential for financial, operational, security, or compliance issues arising from relationships with external entities or service providers.

security

Definition ∞ Security refers to the measures and protocols designed to protect assets, networks, and data from unauthorized access, theft, or damage.

Tags:

Malicious Transaction Staking Program API Exploit Funds Loss DeFi Security Solana Staking

Discover More

  • A transparent orb, refracting intricate blue geometric patterns, hovers before a complex, multi-faceted metallic and translucent blue structure. This juxtaposition suggests the encapsulation of complex data within a secure, decentralized framework, possibly representing the abstraction of blockchain architecture or a novel cryptographic key management system. The reflective quality of the orb hints at transparency and immutability, core tenets of distributed ledger technology and secure digital asset protocols, potentially illustrating the interplay between user interface elements and underlying cryptographic primitives. Decentralized Clock Network Decouples Ordering from Consensus for Fair Transactions A Decentralized Clock Network assigns provably fair timestamps to transactions, fundamentally eliminating front-running and MEV-driven order manipulation.
  • A sophisticated white and blue modular electronic component, prominently featuring an Application-Specific Integrated Circuit ASIC with a distinct blue frame, integrates into a larger system. This specialized hardware suggests a critical role in decentralized physical infrastructure networks DePIN. Its precise engineering implies robust computational integrity, essential for validator nodes and high-throughput transaction processing within a distributed ledger technology DLT framework. The modular design supports scalable network architecture and efficient smart contract execution, underpinning secure multi-party computation MPC and cryptographic primitives for Web3 functionality. Walmart Enhances Supply Chain Traceability with Blockchain Technology Integrating blockchain technology into supply chain operations dramatically improves product traceability, ensuring data integrity and accelerating dispute resolution for global logistics networks.
  • An abstract, futuristic device features a translucent, textured shell, partially clear and partially vibrant blue, encasing metallic internal structures. A central, glowing blue lens or core suggests active processing, embodying a cryptographic primitive. This secure enclave design visualizes robust digital asset security within a distributed ledger technology framework. The intricate composition reflects the complexity of a consensus mechanism, ensuring immutable record integrity and facilitating secure multi-party computation in Web3 infrastructure. EU Authorities Finalize DORA Standards Mandating Digital Resilience Frameworks Compliance teams must now integrate the comprehensive DORA technical standards, overhauling ICT risk governance and third-party vendor management by the 2025 deadline.
  • A futuristic, intricately designed spherical device features white modular plating and exposed metallic internal components. A vibrant blue light beam emanates from its core, suggesting active data processing or energy transfer. This visual metaphorically represents a high-performance decentralized autonomous organization DAO or a layer-2 scaling solution operating within a distributed ledger technology DLT network. The precise engineering signifies robust protocol optimization and efficient transaction finality, critical for Web3 infrastructure and institutional DeFi applications, ensuring cryptographic security across the network. SEC Dismisses Coinbase Lawsuit Signaling Major Shift in Digital Asset Enforcement The SEC's dismissal with prejudice mandates a strategic re-evaluation of enforcement-driven compliance models, favoring future rulemaking clarity.
  • A close-up view reveals a sophisticated hardware wallet, featuring a prominent faceted blue secure element, reminiscent of a digital asset or token. Brushed metallic surfaces encase transparent components, highlighting an internal blue glow, symbolizing cryptographic key protection. This device represents robust security for private key management, facilitating secure transaction signing and immutable ledger interactions within a decentralized finance ecosystem, safeguarding digital identity and Web3 assets. Multi-Signature Wallet Drained by Sophisticated Phishing Attack via Disguised Approvals Malicious contract approvals, disguised through legitimate interfaces, represent a critical bypass of multi-sig security, endangering user assets.
  • A sophisticated, metallic hardware component integrates a vibrant, translucent blue substance. This textured, viscous element likely functions as a high-performance liquid cooling system for a blockchain validator node or mining rig. The metallic housing includes a control interface, suggesting active protocol execution and network management. The blue core could represent a secure enclave for private keys or a data shard holding transactional data. Its luminous quality hints at active hashrate generation or proof-of-stake validation, critical for decentralized ledger technology and cryptographic security. This advanced distributed ledger technology infrastructure supports on-chain governance. Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudi A developer's unauthorized code deployment and flash loan vulnerability led to a $2.6 million loss, exposing critical internal control failures.
  • A central metallic lens-like node, possibly an oracle, is enveloped by a complex, interconnected white mesh representing a decentralized network. This network facilitates data integrity through cryptographic protocols, managing a dynamic blue substance signifying real-time data streams or smart contract execution. The composition emphasizes the robust security and interoperability inherent in distributed ledger technology, underpinning secure digital asset management within a Web3 ecosystem. New Gold Protocol Suffers $2 Million Oracle Manipulation Exploit A single-source price oracle vulnerability enabled a flash loan attack, compromising protocol integrity and user funds.
  • A faceted digital diamond rests on a complex, illuminated circuit board, symbolizing the intersection of tangible value and decentralized ledger technology. This visual metaphor highlights the potential for tokenizing real-world assets, such as precious stones, onto a blockchain. The intricate circuitry represents the underlying cryptographic security and smart contract mechanisms essential for secure digital asset management and transferability within the DeFi ecosystem, illustrating novel applications for NFTs beyond digital art. GANA Payment Drained $3.1 Million via Smart Contract Ownership Flaw A critical access control vulnerability on the BNB Smart Chain allowed an attacker to seize contract ownership, manipulate reward logic, and drain $3.1M in assets.
  • A close-up view reveals the intricate opening of a translucent blue container, reminiscent of a blockchain protocol entry point. The internal threads symbolize the structured layers of a smart contract or the tokenomics governing a decentralized application dApp. Light reflects off the smooth surfaces, highlighting the clarity and transparency inherent in public ledgers. This digital asset vault metaphorically represents secure cold storage for cryptographic keys or tokenized value, emphasizing protocol security and interoperability within the Web3 ecosystem. Balancer V2 Pools Drained Exploiting Smart Contract Authorization Flaw A critical access control failure in the V2 vault's callback logic permitted unauthorized asset manipulation across composable stable pools.

Tags:

Account CompromiseAPI ExploitAsset DrainDeFi SecurityFunds LossMalicious TransactionSolana StakingStaking ProgramSupply ChainThird-Party Risk

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.