Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

SwissBorg Solana Earn Program Compromised via Third-Party API Exploit

A supply chain attack exploiting a third-party API enabled unauthorized control over SwissBorg's Solana staking accounts, leading to significant asset drain.
September 23, 20252 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A futuristic, metallic device with a prominent, glowing blue circular element, resembling a high-performance blockchain node or cryptographic processor, is dynamically interacting with a transparent, turbulent fluid. This fluid, representative of liquidity pools or high-volume transaction streams, courses over the device's polished surfaces and integrated control buttons, indicating active network consensus processing
A central white, futuristic hub connects to multiple radiating metallic conduits, partially submerged in a vivid blue, agitated liquid. White, foamy substances emanate from the connection points where the conduits meet the central structure, implying active processes

Briefing

In September 2025, SwissBorg, a Swiss wealth management platform, suffered a $42 million hack impacting its SOL Earn Program. The incident stemmed from a supply chain attack where a trusted third-party account, managed by Kiln for Solana staking, was compromised. This exploit allowed attackers to gain control over 192,600 SOL by manipulating a seemingly benign unstaking transaction, leading to a substantial financial loss for the platform. SwissBorg has committed to compensating affected users from its treasury.

A striking abstract visualization features a dense central structure of numerous blue translucent blocks, surrounded by white spherical nodes connected by thin white lines. This intricate network conceptually illustrates a sharded blockchain architecture, where individual blocks represent data packets or transaction units within a distributed ledger

Context

Prior to this incident, the broader DeFi ecosystem faced persistent risks from third-party integrations and supply chain vulnerabilities. Protocols often rely on external services for specialized functions like staking, which can introduce new attack surfaces if not rigorously secured. The prevailing challenge involved ensuring comprehensive security posture extends beyond a protocol’s core infrastructure to encompass all integrated components.

A sophisticated metallic cubic device, featuring a top control dial and various blue connectors, forms the central component of this intricate system. Translucent, bubble-filled conduits loop around the device, secured by black wires, all set against a dark background

Analysis

The attack vector targeted the Kiln API, which managed SwissBorg’s Solana staking. The attacker executed a standard unstaking transaction that covertly embedded eight malicious authorization instructions. These instructions were designed to transfer control of SwissBorg’s staking accounts to attacker-controlled on-chain addresses.

Upon approval of this seemingly legitimate transaction, the attacker gained unauthorized access, subsequently draining approximately 192,600 SOL from the compromised staking accounts. This exploit leveraged a critical oversight in transaction validation, where the underlying malicious logic within a standard operation went undetected.

A close-up view reveals a high-tech device featuring a silver-grey metallic casing with prominent dark blue internal components and accents. A central, faceted blue translucent element glows brightly, suggesting active processing or energy flow within the intricate machinery

Parameters

  • Protocol Targeted → SwissBorg (SOL Earn Program)
  • Attack Vector → Supply Chain Attack (Kiln API Exploit)
  • Vulnerability → Malicious Logic Concealed in Staking Transaction
  • Financial Impact → Approximately $42 Million (192,600 SOL)
  • Affected Blockchain → Solana
  • Third-Party Involved → Kiln (Solana staking provider)

The image displays a close-up of a high-tech mechanism featuring a central circular component filled with vibrant blue liquid, surrounded by numerous small, transparent spheres. This intricate hardware setup is characterized by metallic finishes, blue glowing accents, and a dark, structured base

Outlook

This incident underscores the critical need for enhanced third-party risk management and stringent transaction validation mechanisms across the DeFi landscape. Protocols must implement robust due diligence for all external integrations and adopt advanced transaction simulation tools to detect hidden malicious logic. The event will likely catalyze the adoption of more sophisticated security auditing standards, particularly for API interactions and multi-signature approvals, to mitigate contagion risk from similar supply chain vulnerabilities.

The image displays a sleek, translucent device with a central brushed metallic button, surrounded by a vibrant blue luminescence. The device's surface exhibits subtle reflections, highlighting its polished, futuristic design, set against a dark background

Verdict

The SwissBorg exploit serves as a stark reminder that even robust platforms remain vulnerable to sophisticated supply chain attacks, necessitating a paradigm shift towards comprehensive third-party security audits and real-time transaction integrity checks.

Signal Acquired from → Halborn

Micro Crypto News Feeds

supply chain attack

Definition ∞ A supply chain attack targets the software or hardware supply chain of a digital asset service or platform.

supply chain

Definition ∞ A supply chain is the network of all the individuals, companies, resources, activities, and technologies involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual sale to the end consumer.

solana staking

Definition ∞ Solana Staking is the process of locking Solana (SOL) tokens to support the network's proof-of-stake consensus mechanism and earn rewards.

transaction validation

Definition ∞ Transaction validation is the process of verifying that a digital transaction adheres to all the rules and conditions of the underlying blockchain network.

swissborg

Definition ∞ SwissBorg is a digital asset wealth management platform that offers users a streamlined way to invest in and manage cryptocurrencies.

attack vector

Definition ∞ An attack vector is a pathway or method by which malicious actors can gain unauthorized access to a system or digital asset.

transaction

Definition ∞ A transaction is a record of the movement of digital assets or the execution of a smart contract on a blockchain.

solana

Definition ∞ Solana is a high-performance blockchain platform designed to support decentralized applications and cryptocurrencies with exceptional speed and low transaction costs.

third-party

Definition ∞ A 'third-party' in the cryptocurrency ecosystem is an entity or individual that is not directly involved in a specific transaction or protocol interaction but plays a role in facilitating or verifying it.

third-party risk

Definition ∞ Third-party risk pertains to the potential for financial, operational, security, or compliance issues arising from relationships with external entities or service providers.

security

Definition ∞ Security refers to the measures and protocols designed to protect assets, networks, and data from unauthorized access, theft, or damage.

Tags:

Staking Program Asset Drain Malicious Transaction API Exploit Funds Loss DeFi Security

Discover More

  • A macro view reveals a robust blockchain architecture, featuring intersecting blue and white structural elements forming a central node. These components, reminiscent of cryptographic primitives, are partially enveloped by a translucent, granular material symbolizing a vast decentralized network. The intricate layering of the blue elements suggests complex smart contract logic or secure data flows within a distributed ledger. This visual metaphor encapsulates the precision and interconnectedness essential for a resilient consensus mechanism and efficient node orchestration across the digital asset framework. GANA Payment Protocol Drained $3.1 Million via Smart Contract Logic Flaw A critical access control failure in the payments contract allowed an unauthorized ownership alteration, leading to an immediate, systemic $3.1M liquidity drain.
  • A close-up view of a metallic Bitcoin coin reveals intricate internal mechanisms and circuit board patterns. The iconic Bitcoin symbol is partially disassembled, exposing detailed micro-components, wires, and gears within its structure, representing the complex decentralized ledger architecture. Etched concentric lines resembling data pathways radiate across the coin's surface, signifying the underlying blockchain protocol and cryptographic hash functions that secure digital assets. This visual metaphor highlights the engineering behind proof-of-work consensus and the computational infrastructure driving cryptocurrency. Cross-Chain Protocol Drained via Compromised Third-Party Solver Infrastructure The cross-chain solver compromise exposed critical off-chain dependency risk, resulting in a multi-chain liquidity drain exceeding $10 million.
  • A close-up view reveals a vibrant blue granular substance, reminiscent of aggregated digital assets or a liquidity pool, partially engulfing and interacting with sleek, metallic, modular components. These components, some solid blue and others silver, form an intricate protocol architecture, suggesting an underlying smart contract or consensus mechanism. The textured surface implies a distributed ledger environment, where structured elements facilitate automated processes within a dynamic, tokenized ecosystem. The interplay highlights robust on-chain governance or staking functionality. Balancer V2 Pools Drained Exploiting Precision Rounding Arithmetic Flaw The compounding of minor arithmetic rounding errors in `batchSwap` logic enabled systematic invariant manipulation, compromising over $120M in pool liquidity.
  • A futuristic white and metallic cylindrical apparatus, partially submerged in dark blue water, actively processes. Its open end reveals intricate, glowing blue crystalline structures, indicative of intensive cryptographic operations. From this aperture, a torrent of white, granular material and vibrant blue particles forcefully ejects, signifying substantial liquidity injection. This represents a blockchain infrastructure's robust consensus mechanism generating digital asset issuance or executing complex smart contract logic, impacting network throughput within the DLT ecosystem. Website Supply Chain Attack Drains User Wallets via Malicious Script Third-party resource compromise injected a malicious JavaScript drainer, weaponizing a trusted front-end to steal user token approvals.
  • A pristine white, soft-textured digital asset rests upon a rugged, dark blue blockchain bedrock, partially submerged in rippling on-chain liquidity. Behind, reflective data screens mirror the asset and a metallic oracle sphere, textured with cryptographic primitives. This composition articulates the foundational layer of a decentralized network, where tokenized value interacts with real-time market reflections. It emphasizes protocol stability and secure multi-party computation inherent in Web3 infrastructure, showcasing digital scarcity within a robust ecosystem. Bedrock uniBTC Minting Logic Flaw Drains $2 Million A critical minting logic vulnerability in Bedrock's uniBTC token allowed attackers to exploit a price discrepancy, leading to a $2 million loss.
  • A high-tech metallic core, suggestive of a validator node or protocol engine, is encircled by vibrant blue liquid and frothy white foam. This dynamic interaction visually interprets the intricate processes within a decentralized network. The liquid signifies continuous transaction streams and asset liquidity, while the foam illustrates rigorous data cleansing and verification processes. This visual metaphor encapsulates the efficient operation of smart contracts and the integrity of a distributed ledger, ensuring robust network consensus in corporate crypto applications. Abracadabra Lending Protocol Drained Exploiting Deprecated Smart Contract Logic A critical logic error in the cook function of deprecated cauldrons permitted unauthorized debt minting, bypassing core solvency checks.
  • A sophisticated robotic limb is depicted, featuring transparent and opaque blue components alongside metallic silver elements. This intricate design could symbolize the robust architecture of a decentralized autonomous organization DAO, where smart contracts execute on-chain transactions with cryptographic security. The transparent sections might represent blockchain transparency and immutable ledgers, while the metallic parts suggest hardware wallets or validator nodes ensuring network consensus. Its precision reflects algorithmic trading and protocol governance. European Union DORA Regulation Mandates Comprehensive Digital Operational Resilience Framework CASPs must immediately align ICT risk management, incident reporting, and third-party controls to the EU's unified operational resilience standard.
  • A pristine white modular unit, akin to a network node, reveals an intensely glowing blue core composed of numerous interconnected digital elements. This internal luminescence represents high-throughput data processing and cryptographic hashing, where on-chain transactions are validated. Small, dispersed digital particles emanate from the core, symbolizing fractionalized digital assets or data shards. The blurred background features multiple identical units, illustrating a distributed ledger technology DLT network architecture, emphasizing peer-to-peer consensus mechanisms and decentralized governance. This visual encapsulates the secure execution of smart contract logic within a robust blockchain infrastructure. Force Bridge Compromised: Cross-Chain Exploit Drains Millions in Assets Bridge logic failure enabled unauthorized asset withdrawal, exposing systemic interoperability risk to users.
  • A pristine white spherical module, featuring a transparent lens, functions as a blockchain oracle for data ingestion. Its segmented panels, accented by subtle blue luminescence, suggest internal smart contract execution logic. This core is intricately integrated within a dynamic array of deep blue, fragmented crystalline forms, representing elements of a Distributed Ledger Technology DLT network. These angular structures could symbolize cryptographic hash functions securing data shards, contributing to a robust consensus mechanism. The clean, high-tech composition against a white backdrop emphasizes secure, decentralized processing. GANA Payment Drained $3.1m via Third-Party Security Vulnerability A compromise of an external security dependency enabled the immediate $3.1M contract drain, underscoring the systemic risk of third-party access controls.

Tags:

Account CompromiseAPI ExploitAsset DrainDeFi SecurityFunds LossMalicious TransactionSolana StakingStaking ProgramSupply ChainThird-Party Risk

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2025 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.