Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

SwissBorg Solana Earn Program Compromised via Third-Party API Exploit

A supply chain attack exploiting a third-party API enabled unauthorized control over SwissBorg's Solana staking accounts, leading to significant asset drain.
September 23, 20252 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A sleek, silver-framed device features a large, faceted blue crystal on one side and an exposed mechanical watch movement on the other, resting on a light grey surface. The crystal sits above a stack of coins, while the watch mechanism is integrated into a dark, recessed panel
A sophisticated metallic cubic device, featuring a top control dial and various blue connectors, forms the central component of this intricate system. Translucent, bubble-filled conduits loop around the device, secured by black wires, all set against a dark background

Briefing

In September 2025, SwissBorg, a Swiss wealth management platform, suffered a $42 million hack impacting its SOL Earn Program. The incident stemmed from a supply chain attack where a trusted third-party account, managed by Kiln for Solana staking, was compromised. This exploit allowed attackers to gain control over 192,600 SOL by manipulating a seemingly benign unstaking transaction, leading to a substantial financial loss for the platform. SwissBorg has committed to compensating affected users from its treasury.

The image displays a transparent, ring-like structure containing a textured, frothy blue substance. A white spherical object is suspended centrally, with a thin stream of clear liquid flowing over the blue substance and around the sphere

Context

Prior to this incident, the broader DeFi ecosystem faced persistent risks from third-party integrations and supply chain vulnerabilities. Protocols often rely on external services for specialized functions like staking, which can introduce new attack surfaces if not rigorously secured. The prevailing challenge involved ensuring comprehensive security posture extends beyond a protocol’s core infrastructure to encompass all integrated components.

A detailed view showcases a central white modular hub with four grey connectors extending outwards. Glowing blue cubic structures, representing data streams, are visible within the connections and at the central nexus

Analysis

The attack vector targeted the Kiln API, which managed SwissBorg’s Solana staking. The attacker executed a standard unstaking transaction that covertly embedded eight malicious authorization instructions. These instructions were designed to transfer control of SwissBorg’s staking accounts to attacker-controlled on-chain addresses.

Upon approval of this seemingly legitimate transaction, the attacker gained unauthorized access, subsequently draining approximately 192,600 SOL from the compromised staking accounts. This exploit leveraged a critical oversight in transaction validation, where the underlying malicious logic within a standard operation went undetected.

A luminous, multifaceted blue crystal structure, shaped like an 'X' or a cross, is depicted with polished metallic components at its intersections. The object appears to be a stylized control mechanism, possibly a valve, set against a blurred background of blues and greys, with frosty textures on the lower left

Parameters

  • Protocol Targeted → SwissBorg (SOL Earn Program)
  • Attack Vector → Supply Chain Attack (Kiln API Exploit)
  • Vulnerability → Malicious Logic Concealed in Staking Transaction
  • Financial Impact → Approximately $42 Million (192,600 SOL)
  • Affected Blockchain → Solana
  • Third-Party Involved → Kiln (Solana staking provider)

The image showcases a detailed, close-up perspective of a mechanical assembly, composed of gleaming silver and deep blue elements. Prominently featured within this intricate machinery are several irregularly shaped, translucent blue crystalline forms, reminiscent of ice

Outlook

This incident underscores the critical need for enhanced third-party risk management and stringent transaction validation mechanisms across the DeFi landscape. Protocols must implement robust due diligence for all external integrations and adopt advanced transaction simulation tools to detect hidden malicious logic. The event will likely catalyze the adoption of more sophisticated security auditing standards, particularly for API interactions and multi-signature approvals, to mitigate contagion risk from similar supply chain vulnerabilities.

A faceted, transparent crystal is held by a white robotic manipulator, positioned over a vibrant blue circuit board depicting intricate data traces. This visual metaphor explores the convergence of quantum cryptography and decentralized ledger technology

Verdict

The SwissBorg exploit serves as a stark reminder that even robust platforms remain vulnerable to sophisticated supply chain attacks, necessitating a paradigm shift towards comprehensive third-party security audits and real-time transaction integrity checks.

Signal Acquired from → Halborn

Micro Crypto News Feeds

supply chain attack

Definition ∞ A supply chain attack targets the software or hardware supply chain of a digital asset service or platform.

supply chain

Definition ∞ A supply chain is the network of all the individuals, companies, resources, activities, and technologies involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual sale to the end consumer.

solana staking

Definition ∞ Solana Staking is the process of locking Solana (SOL) tokens to support the network's proof-of-stake consensus mechanism and earn rewards.

transaction validation

Definition ∞ Transaction validation is the process of verifying that a digital transaction adheres to all the rules and conditions of the underlying blockchain network.

swissborg

Definition ∞ SwissBorg is a digital asset wealth management platform that offers users a streamlined way to invest in and manage cryptocurrencies.

attack vector

Definition ∞ An attack vector is a pathway or method by which malicious actors can gain unauthorized access to a system or digital asset.

transaction

Definition ∞ A transaction is a record of the movement of digital assets or the execution of a smart contract on a blockchain.

solana

Definition ∞ Solana is a high-performance blockchain platform designed to support decentralized applications and cryptocurrencies with exceptional speed and low transaction costs.

third-party

Definition ∞ A 'third-party' in the cryptocurrency ecosystem is an entity or individual that is not directly involved in a specific transaction or protocol interaction but plays a role in facilitating or verifying it.

third-party risk

Definition ∞ Third-party risk pertains to the potential for financial, operational, security, or compliance issues arising from relationships with external entities or service providers.

security

Definition ∞ Security refers to the measures and protocols designed to protect assets, networks, and data from unauthorized access, theft, or damage.

Tags:

Asset Drain Third-Party Risk Staking Program DeFi Security Solana Staking Account Compromise

Discover More

  • Glossy white spheres are intricately linked with faceted blue crystalline structures, forming a complex abstract arrangement. A smooth white ring-like element wraps around these components. This composition visually represents the core elements of a decentralized ledger, where white spheres symbolize network nodes or tokenized assets. The brilliant blue crystals signify immutable data blocks, secured by cryptographic security. The white ring suggests a smart contract protocol or a robust consensus mechanism, highlighting the interconnected blockchain architecture essential for distributed computing. Moonwell Protocol Drained via External Oracle Price Manipulation Flaw The systemic failure of an external price oracle to validate asset parity created a 1,600x valuation error, enabling an attacker to deposit minimal collateral and generate millions in unrecoverable bad debt.
  • A sophisticated blue and silver mechanical module, possibly a core component of a decentralized protocol engine, is shown with a dynamic frothy substance actively interacting with its internal mechanisms. The lens-like element suggests on-chain analytics or data input for transaction processing. This intricate system, potentially part of a Layer 2 scaling solution, illustrates robust Web3 infrastructure designed for efficient digital asset management. The foamy element could metaphorically represent complex liquidity pool dynamics or the intricate consensus mechanism at work, ensuring operational integrity. DeFi Protocol Balancer V2 Suffers Massive Smart Contract Logic Exploit A critical rounding error in Balancer's V2 Stable Pool logic allowed attackers to leverage flash loans for unauthorized, multi-million dollar asset depletion.
  • A polished metallic square plate, featuring a layered circular component, is encased within a translucent, wavy, blue-tinted material. This design represents a cryptographic secure element, vital for digital asset security. It functions as a hardware wallet component, safeguarding private keys and seed phrases in cold storage. The resilient enclosure ensures tamper-proof protection for blockchain infrastructure, enabling secure transaction signing for decentralized finance and managing tokenized assets. Siemens Cre8Ventures Partners Minima for Digital Twin Security This strategic alliance integrates decentralized blockchain security into digital twin ecosystems, fortifying critical industrial infrastructure against cyber threats and enabling verifiable data integrity across operational domains.
  • A sophisticated, blue-hued cylindrical mechanism with metallic bands suggests robust blockchain architecture. A translucent, flowing stream, reminiscent of on-chain liquidity, cascades over its textured surface. To the left, a singular, crystalline sphere, symbolizing a digital asset or token, floats. This interplay conveys dynamic transaction processing within a decentralized ledger, highlighting intricate validator node operations. The clean background emphasizes technological precision and protocol execution. Legacy DeFi Pool Drained Exploiting Infinite Token Minting Flaw A critical flaw in a custom stable-swap contract allowed an attacker to mint near-infinite yETH, bypassing core pool solvency checks.
  • A dynamic visualization portrays a translucent, hourglass-shaped structure, vibrant blue with internal reflections, signifying the flow of liquidity pools. Two metallic, cylindrical rods intersect its narrowest point, forming an 'X,' representing cross-chain interoperability and blockchain bridges. The illuminated blue channels within suggest active smart contract execution facilitating atomic swaps across disparate distributed ledger technology networks. This abstract depiction illustrates the intricate DeFi mechanisms driving seamless, secure asset transfer and enhanced transaction throughput. Yearn yUSND Vault Suffers Economic Exploit via Liquidity Slippage Flaw Insufficient liquidity during liquidation reward swaps created an economic vector, allowing a 5.2% capital drawdown on the yUSND vault through severe slippage manipulation.
  • A sophisticated, metallic hardware component integrates a vibrant, translucent blue substance. This textured, viscous element likely functions as a high-performance liquid cooling system for a blockchain validator node or mining rig. The metallic housing includes a control interface, suggesting active protocol execution and network management. The blue core could represent a secure enclave for private keys or a data shard holding transactional data. Its luminous quality hints at active hashrate generation or proof-of-stake validation, critical for decentralized ledger technology and cryptographic security. This advanced distributed ledger technology infrastructure supports on-chain governance. Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudi A developer's unauthorized code deployment and flash loan vulnerability led to a $2.6 million loss, exposing critical internal control failures.
  • Crystalline and spherical elements emerge from calm, dark blue water. A large white sphere, potentially a governance token, is central. Deep blue, faceted utility tokens form a base, supporting clear immutable ledger fragments. Transparent digital assets rise, suggesting on-chain transparency. Irregular white formations, representing network consensus or proof of stake mechanisms, anchor the structure. A smaller silver sphere, a stablecoin, rests among the blue crystals. The water symbolizes liquidity pools within a decentralized finance DeFi ecosystem, highlighting tokenization and algorithmic stability. Memecoin Launchpad Drained Exploiting Thin Liquidity Pool Manipulation The exploitation of low-liquidity pools via self-trading and token inflation confirms that insufficient invariant checks enable catastrophic price oracle failure.
  • A pristine white sphere, bisected by a dark line, is centrally encircled by a thick white ring, suggesting a stable core protocol. Surrounding this central element are numerous deep blue, faceted crystalline structures, representing distributed ledger technology DLT transaction blocks or sharded data partitions. Smaller, lighter blue crystal fragments further illustrate dynamic network interactions and micro-transactions within a complex blockchain ecosystem. The composition highlights the structured governance mechanism around a central system amidst fragmented, yet interconnected, digital assets. SEC Dismisses Coinbase Enforcement Action Signaling Regulatory Policy Pivot The SEC's dismissal of its landmark case pre-empts a critical appellate ruling, forcing a strategic re-evaluation of asset classification risk.
  • A clear, complex, interwoven transparent structure dominates the foreground, resembling a sophisticated algorithmic framework. Behind it, a deep blue, blurred form suggests underlying data streams or a core digital asset pool. This visualization abstractly represents the intricate protocol architecture essential for decentralized ledger technology DLT. Its transparent nature reflects the auditability and immutability inherent in cryptographic primitives, while the interwoven design signifies robust interoperability and the secure execution of a distributed consensus mechanism within a blockchain network. Balancer Protocol Drained by Multi-Chain Smart Contract Logic Flaw A critical access control vulnerability within boosted pools allowed unauthorized asset withdrawals, proving complex contract logic magnifies systemic risk.

Tags:

Account CompromiseAPI ExploitAsset DrainDeFi SecurityFunds LossMalicious TransactionSolana StakingStaking ProgramSupply ChainThird-Party Risk

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.