Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

SwissBorg Solana Earn Program Compromised via Third-Party API Exploit

A supply chain attack exploiting a third-party API enabled unauthorized control over SwissBorg's Solana staking accounts, leading to significant asset drain.
September 23, 20252 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A complex abstract composition features dark, circular metallic elements and silver, ribbed cylindrical components centrally arranged, enveloped by a dynamic, translucent stream of blue-tinted liquid or crystalline structures. Sharp, faceted blue crystal formations are embedded within this flowing medium, all set against a soft, light gray background
A vibrant blue, metallic, cylindrical mechanism forms the central focus, partially enveloped by a dynamic cascade of numerous small, translucent, spherical particles. The particles appear to be in motion, some clinging to the blue surface, others flowing around it, creating a sense of intricate interaction and processing

Briefing

In September 2025, SwissBorg, a Swiss wealth management platform, suffered a $42 million hack impacting its SOL Earn Program. The incident stemmed from a supply chain attack where a trusted third-party account, managed by Kiln for Solana staking, was compromised. This exploit allowed attackers to gain control over 192,600 SOL by manipulating a seemingly benign unstaking transaction, leading to a substantial financial loss for the platform. SwissBorg has committed to compensating affected users from its treasury.

Polished blue and metallic mechanical components integrate with a translucent, organic-like network structure, featuring a glowing blue conduit. This intricate visual symbolizes advanced blockchain architecture and the underlying distributed ledger technology DLT powering modern web3 infrastructure

Context

Prior to this incident, the broader DeFi ecosystem faced persistent risks from third-party integrations and supply chain vulnerabilities. Protocols often rely on external services for specialized functions like staking, which can introduce new attack surfaces if not rigorously secured. The prevailing challenge involved ensuring comprehensive security posture extends beyond a protocol’s core infrastructure to encompass all integrated components.

A modern, metallic, camera-like device is shown at an angle, nestled within a vibrant, translucent blue, irregularly shaped substance, with white foam covering parts of both. The background is a smooth, light gray, creating a minimalist setting for the central elements

Analysis

The attack vector targeted the Kiln API, which managed SwissBorg’s Solana staking. The attacker executed a standard unstaking transaction that covertly embedded eight malicious authorization instructions. These instructions were designed to transfer control of SwissBorg’s staking accounts to attacker-controlled on-chain addresses.

Upon approval of this seemingly legitimate transaction, the attacker gained unauthorized access, subsequently draining approximately 192,600 SOL from the compromised staking accounts. This exploit leveraged a critical oversight in transaction validation, where the underlying malicious logic within a standard operation went undetected.

A vibrant blue, transparent, fluid-like object, resembling a sculpted wave, rises from a bed of white foam within a sleek, metallic device. The device features dark, reflective surfaces and silver accents, with circular indentations and control elements visible on the right

Parameters

  • Protocol Targeted → SwissBorg (SOL Earn Program)
  • Attack Vector → Supply Chain Attack (Kiln API Exploit)
  • Vulnerability → Malicious Logic Concealed in Staking Transaction
  • Financial Impact → Approximately $42 Million (192,600 SOL)
  • Affected Blockchain → Solana
  • Third-Party Involved → Kiln (Solana staking provider)

A close-up shot displays a textured, deep blue, porous object encrusted with a thick layer of sparkling white crystalline structures, resembling frost or snowflakes. A central, slightly blurred opening reveals more of the intricate blue interior

Outlook

This incident underscores the critical need for enhanced third-party risk management and stringent transaction validation mechanisms across the DeFi landscape. Protocols must implement robust due diligence for all external integrations and adopt advanced transaction simulation tools to detect hidden malicious logic. The event will likely catalyze the adoption of more sophisticated security auditing standards, particularly for API interactions and multi-signature approvals, to mitigate contagion risk from similar supply chain vulnerabilities.

This detailed render showcases a sophisticated, spherical computing module with interlocking metallic and white composite panels. A vibrant, bubbling blue liquid sphere is integrated at the top, while a granular white-rimmed aperture reveals a glowing blue core at the front

Verdict

The SwissBorg exploit serves as a stark reminder that even robust platforms remain vulnerable to sophisticated supply chain attacks, necessitating a paradigm shift towards comprehensive third-party security audits and real-time transaction integrity checks.

Signal Acquired from → Halborn

Micro Crypto News Feeds

supply chain attack

Definition ∞ A supply chain attack targets the software or hardware supply chain of a digital asset service or platform.

supply chain

Definition ∞ A supply chain is the network of all the individuals, companies, resources, activities, and technologies involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual sale to the end consumer.

solana staking

Definition ∞ Solana Staking is the process of locking Solana (SOL) tokens to support the network's proof-of-stake consensus mechanism and earn rewards.

transaction validation

Definition ∞ Transaction validation is the process of verifying that a digital transaction adheres to all the rules and conditions of the underlying blockchain network.

swissborg

Definition ∞ SwissBorg is a digital asset wealth management platform that offers users a streamlined way to invest in and manage cryptocurrencies.

attack vector

Definition ∞ An attack vector is a pathway or method by which malicious actors can gain unauthorized access to a system or digital asset.

transaction

Definition ∞ A transaction is a record of the movement of digital assets or the execution of a smart contract on a blockchain.

solana

Definition ∞ Solana is a high-performance blockchain platform designed to support decentralized applications and cryptocurrencies with exceptional speed and low transaction costs.

third-party

Definition ∞ A 'third-party' in the cryptocurrency ecosystem is an entity or individual that is not directly involved in a specific transaction or protocol interaction but plays a role in facilitating or verifying it.

third-party risk

Definition ∞ Third-party risk pertains to the potential for financial, operational, security, or compliance issues arising from relationships with external entities or service providers.

security

Definition ∞ Security refers to the measures and protocols designed to protect assets, networks, and data from unauthorized access, theft, or damage.

Tags:

Funds Loss Solana Staking Account Compromise Malicious Transaction Asset Drain Staking Program

Discover More

  • A sophisticated hardware module, metallic with deep blue accents, showcases a central, glowing blue crystalline component. This secure element, likely a cryptographic processor, is engineered for robust private key management and digital asset custody. Its intricate design suggests advanced tamper-proof mechanisms and secure enclave technology, vital for blockchain security. The device facilitates offline transaction signing and seed phrase protection, essential for non-custodial self-custody within decentralized finance DeFi ecosystems, integrating multi-signature or biometric authentication for enhanced asset protection. Nemo Protocol Suffers $2.6m Exploit from Unaudited Code Deployment An internal developer bypassed audit controls, exposing critical smart contract functions to unauthorized state manipulation.
  • A futuristic, intricately designed spherical device features white modular plating and exposed metallic internal components. A vibrant blue light beam emanates from its core, suggesting active data processing or energy transfer. This visual metaphorically represents a high-performance decentralized autonomous organization DAO or a layer-2 scaling solution operating within a distributed ledger technology DLT network. The precise engineering signifies robust protocol optimization and efficient transaction finality, critical for Web3 infrastructure and institutional DeFi applications, ensuring cryptographic security across the network. SEC Dismisses Coinbase Lawsuit Signaling Major Shift in Digital Asset Enforcement The SEC's dismissal with prejudice mandates a strategic re-evaluation of enforcement-driven compliance models, favoring future rulemaking clarity.
  • A sophisticated digital asset infrastructure displays intricate translucent blue conduits forming a complex network. Luminous blue elements represent active data packets, symbolizing on-chain transaction validation and cryptographic hashing processes. This visual metaphor illustrates the dynamic flow within a decentralized ledger technology system, emphasizing smart contract execution and block propagation across validator nodes. The design suggests advanced scalability solutions and interoperability protocols crucial for robust Web3 infrastructure, highlighting the underlying mechanisms of a high-throughput blockchain network. Cross-Chain DeFi Protocol Suffers $10.8 Million Multi-Chain Exploit A critical failure in third-party solver security enabled a multi-chain drain, underscoring the systemic risk of centralized off-chain dependencies.
  • White, modular, metallic components connect in a chain-like fashion, forming a futuristic processing unit. Vibrant blue liquid or energy vigorously flows and splashes within an open central segment, propelled by internal mechanisms. This represents a high-performance distributed ledger technology DLT system, where transaction throughput is optimized. The dynamic blue flow symbolizes liquidity pools and on-chain data streams being processed by validator nodes within a modular blockchain architecture. It highlights efficient smart contract execution and cross-chain interoperability, essential for robust DeFi protocols and scalable Web3 infrastructure, underpinned by secure cryptographic primitives across a decentralized network. Nemo Protocol Suffers $2.6 Million Exploit from Unaudited Code A publicly exposed flash loan function and state-modifying query vulnerability allowed unauthorized asset drainage, posing a critical risk to protocol integrity.
  • A sleek, metallic blue device, resembling a sophisticated DLT protocol engine, is partially submerged in white foam. The central circular component, a precise cryptographic mechanism, suggests active validation or a hashing process. This imagery conceptually illustrates the rigorous cleansing and maintenance protocols essential for robust blockchain infrastructure. The foam signifies the ongoing decontamination or purification of system vulnerabilities, ensuring optimal smart contract execution and secure tokenomics. It underscores the critical need for constant operational integrity within enterprise blockchain solutions, promoting network health and interoperability. EU Digital Operational Resilience Act Applies to Crypto Service Providers CASPs must integrate a systemic ICT risk management framework, mandating board-level accountability and rigorous third-party oversight.
  • A sophisticated robotic limb is depicted, featuring transparent and opaque blue components alongside metallic silver elements. This intricate design could symbolize the robust architecture of a decentralized autonomous organization DAO, where smart contracts execute on-chain transactions with cryptographic security. The transparent sections might represent blockchain transparency and immutable ledgers, while the metallic parts suggest hardware wallets or validator nodes ensuring network consensus. Its precision reflects algorithmic trading and protocol governance. European Union DORA Regulation Mandates Comprehensive Digital Operational Resilience Framework CASPs must immediately align ICT risk management, incident reporting, and third-party controls to the EU's unified operational resilience standard.
  • An intricate three-dimensional rendering showcases translucent blue structures dynamically interlocked with polished metallic rings, creating a complex protocol architecture. The flowing blue elements, suggestive of secure data streams or liquidity pools, seamlessly integrate with robust silver components resembling consensus mechanism gears. This composition visually articulates the interconnectedness within a decentralized network, emphasizing precise smart contract execution and cryptographic integrity. The interplay of materials conveys both transparency and engineered robustness essential for distributed ledger technology. Lending Protocol Impermax V3 Drained by Collateral Fee Valuation Flaw Flash loan attack exploited Impermax V3 collateral valuation logic, leveraging uncollected fees to create bad debt and drain $400,000.
  • A sophisticated metallic device, likely a hardware wallet, showcases its internal complexity. On one side, a stack of physical coins is secured beneath a brilliant, multifaceted blue crystal, symbolizing tokenized assets and immutable digital value. The opposing side reveals an exposed, intricate mechanical watch movement, abstractly representing a proof-of-stake consensus mechanism or precise timestamping for transaction finality. Two subtle buttons on the device's edge suggest secure private key management and multi-signature capabilities. Multi-Signature Wallet Compromised via DelegateCall, Draining Millions A misconfigured `delegateCall` in a multi-signature wallet granted unauthorized administrative control, enabling asset drain and token minting, posing systemic risk to user funds.
  • A macro view reveals an intricate internal mechanism encased within a porous, bone-like white structure, reminiscent of a decentralized network topology. Bright blue, crystalline elements, suggestive of digital asset liquidity or data packets, flow through metallic silver pathways. These pathways, acting as validator nodes or smart contract execution channels, are secured by the overarching cryptographic primitives. The foamy texture on the white surface implies dynamic interactions or real-time transaction validation processes within a distributed ledger technology DLT framework, ensuring robust data integrity. DeFi Titan Protocol Drained $200 Million via Smart Contract Reentrancy Flaw A critical reentrancy bug allowed the attacker to recursively withdraw funds, bypassing solvency checks and compromising the protocol's entire asset pool.

Tags:

Account CompromiseAPI ExploitAsset DrainDeFi SecurityFunds LossMalicious TransactionSolana StakingStaking ProgramSupply ChainThird-Party Risk

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.