SwissBorg Loses $41.5 Million in Solana Tokens After Partner Company's Security System Gets Hacked

By
Minhyong
7 min read

When Trust Breaks Down: SwissBorg's $41.5 Million Wake-Up Call Exposes Crypto's Infrastructure Crisis

The Swiss crypto platform SwissBorg awoke Monday to every financial firm's nightmare: hackers had drained $41.5 million worth of Solana tokens from wallets tied to its popular SOL Earn product. But this wasn't a typical breach of SwissBorg's systems—it was something potentially more troubling for the broader crypto ecosystem.

The logo of SwissBorg (mzstatic.com)
The logo of SwissBorg (mzstatic.com)

The attack exploited a compromised application programming interface (API) at Kiln, SwissBorg's staking infrastructure partner, highlighting how third-party dependencies have become the Achilles' heel of modern crypto services. As investigators piece together the incident, one stark reality emerges: this represents not an isolated failure, but the latest manifestation of a systemic vulnerability plaguing the entire industry.

The Anatomy of a Modern Crypto Heist

On September 8, attackers gained unauthorized access to Kiln's API—the digital bridge connecting SwissBorg's user-facing application to Solana's staking network. Through this compromised interface, they manipulated withdrawal requests and systematically drained approximately 192,600 SOL tokens from operational wallets.

An API (Application Programming Interface) enables different software applications to communicate and exchange data, playing a crucial role in cryptocurrency platforms for features like market data, trading, and wallet services. While essential for functionality, APIs also introduce significant security risks that must be carefully managed.

The breach affected fewer than 1% of SwissBorg's users, representing roughly 2% of the platform's total assets under management. Despite the significant dollar amount, SwissBorg's executives moved quickly to contain the reputational damage.

"It's a big amount of money, but it doesn't put SwissBorg at risk," CEO Cyrus Fazel stated during an emergency Twitter Spaces session Monday evening, calling the incident "a bad day for SwissBorg" while emphasizing the company's financial stability.

The platform immediately paused SOL Earn redemptions and committed to covering all user losses—a promise backed by what Fazel described as sufficient treasury reserves. SwissBorg's stock response mirrors industry best practices: rapid communication, user protection commitments, and coordination with law enforcement and security firms.

Infrastructure Under Siege

What makes the SwissBorg incident particularly significant isn't its scale—though $41.5 million represents a substantial sum—but its place within 2025's troubling pattern of infrastructure-targeted attacks. According to blockchain analytics firm TRM Labs, approximately 80% of the $2.17 billion stolen from crypto platforms this year originated from infrastructure exploits rather than smart contract vulnerabilities.

Value stolen in crypto hacks, comparing infrastructure exploits to smart contract vulnerabilities.

YearInfrastructure Exploits (Value Stolen)Smart Contract Vulnerabilities (Value Stolen)Total Value Stolen (All Attack Vectors)Key Insights
2025 (So far)Private key theft (e.g., UPCX $70M)Smart contract design flaws, re-entrancy exploits (e.g., GMX V1 $40-42M, Resupply $9.5M, ALEX Protocol $8.3M, Cetus on Sui $220M)Significant, with cross-chain bridges and vault systems (often smart contract-related) being highly exploited.Cross-chain bridges and vault systems remain the most exploited DeFi components. Smart contract design flaws are prime attack vectors, not just code bugs.
2024Private key compromises (43.8% of total stolen) (e.g., DMM Bitcoin $305M, WazirX $234.9M)DeFi exploits remained significant, though centralized services became more targeted in Q2 and Q3.$2.2 billion (Chainalysis), $1.58 billion by July 2024Private key compromises accounted for the largest share of stolen crypto, at 43.8%. Centralized services were the most targeted in Q2 and Q3.
2023Significant, but DeFi's share of stolen funds dropped.$1.1 billion from DeFi protocols (63.7% decrease YoY)$1.7 billion (estimated by Chainalysis)The value lost in DeFi hacks declined by 63.7% year-over-year. The number of DeFi hacks specifically declined by 17.2%.

The year's most devastating attack struck Bybit in February, when hackers exploited vulnerabilities in a third-party cold wallet tool to steal roughly $1.5 billion in Ethereum. U.S. authorities later attributed that breach to North Korea's Lazarus Group, underscoring how sophisticated nation-state actors increasingly target crypto infrastructure.

The Lazarus Group is a notorious North Korean state-sponsored hacking organization. They are widely recognized as nation-state crypto hackers, responsible for numerous high-profile cryptocurrency heists and other cyberattacks to fund the regime.

Similar patterns emerged across other major incidents: Iran's largest exchange Nobitex lost nearly $90 million in June through what investigators described as a "politically-motivated infrastructure breach." Even Coinbase, despite its reputation for security excellence, faced a $65 million loss from compromised API credentials in May.

"The attack surface has fundamentally shifted," explains one cybersecurity analyst who requested anonymity due to client relationships. "Attackers have moved beyond hunting for smart contract bugs. They're targeting the operational infrastructure—APIs, key management systems, signing workflows—that most users never see but that control fund movement."

The Hidden Risks of Convenience

SwissBorg's SOL Earn product exemplifies the convenience-versus-security tradeoffs inherent in modern crypto services. Users deposit Solana tokens through a simple mobile interface to earn staking rewards, while the platform handles the complex technical requirements of validator operations through partners like Kiln.

Crypto staking involves locking up cryptocurrency to support the operations of a proof-of-stake blockchain network, helping to validate transactions. Participants can earn rewards for this contribution, though it's crucial to understand the inherent risks involved.

This model democratizes access to yield-generating opportunities previously available only to sophisticated operators running their own validator nodes. However, it also introduces layers of trust and technical dependencies that many users don't fully understand.

Industry insiders suggest the SwissBorg incident likely stemmed from over-permissive API credentials that allowed unauthorized fund movements without sufficient secondary controls. Modern security frameworks typically require multiple verification layers—IP address restrictions, hardware-backed authentication, transaction velocity limits, and multi-party approvals for large transfers.

"When you abstract away the complexity of staking operations, you also abstract away visibility into the security controls," notes a former exchange security executive. "Users thought they were taking staking risk, but they were also taking API risk, vendor risk, and operational risk."

Market Resilience Meets Growing Caution

Despite the substantial theft, Solana's price remained relatively stable, trading at $217.47 as of Tuesday morning with modest daily gains. This resilience suggests markets correctly identified the incident as an operational failure rather than a fundamental protocol vulnerability.

The data for September 9, 2025, reflects the current Solana (SOL) price, 24-hour change, market capitalization, and 24-hour trading volume. The prices for September 8 and September 7 are approximate values derived by extrapolating backward using the reported 24-hour change for September 9, assuming a consistent trend to illustrate relative stability. Exact historical 24-hour changes, market cap, and volume for previous specific days were not explicitly provided in the search results.

However, the incident's broader implications for the "Earn product" sector appear more concerning. These yield-generating wrappers, which abstract technical complexity for retail users, may face increased scrutiny from both regulators and risk-conscious investors.

Switzerland's financial regulators, known for their crypto-friendly stance, will likely examine how licensed platforms manage third-party vendor risks. The European Union's evolving Markets in Crypto-Assets (MiCA) framework already emphasizes operational resilience requirements that incidents like SwissBorg's could influence.

The Path Forward

SwissBorg's response suggests management understands the incident's teachable-moment potential. The company has pledged to publish a comprehensive post-mortem once investigations conclude, while working with "white-hat hackers, security firms, and law enforcement" to recover stolen funds.

"Proof-of-Reserves" in crypto verifies that a platform holds the assets it claims. In contrast, "Proof-of-Controls" demonstrates the platform's internal management, security, and operational integrity. Both mechanisms are crucial for enhancing overall transparency and trust within the crypto ecosystem.

Security experts anticipate several immediate changes across the industry. Platforms will likely demand more stringent security attestations from infrastructure partners, including detailed documentation of API scopes, key management practices, and transaction approval workflows.

The concept of "Proof-of-Controls"—public disclosures about operational security measures that complement traditional "Proof-of-Reserves" financial attestations—may gain traction as platforms seek to differentiate themselves through transparency.

For SwissBorg specifically, the incident's impact will largely depend on execution of its recovery plan. Quick, full reimbursement of affected users combined with meaningful security upgrades could transform a crisis into a competitive advantage by demonstrating superior risk management.

Investment Implications and Forward Outlook

From an investment perspective, analysts suggest the SwissBorg incident may accelerate existing trends toward infrastructure consolidation. Platforms may reduce their vendor relationships to focus on a smaller number of partners capable of meeting bank-grade security standards.

This consolidation could benefit established custody providers and infrastructure companies with proven track records, while potentially disadvantaging newer entrants lacking comprehensive security frameworks. The incident also highlights opportunities in the emerging "crypto security infrastructure" sector, particularly companies developing policy enforcement engines and API security monitoring tools.

Looking ahead, investors should monitor several key developments: the effectiveness of SwissBorg's user reimbursement program, any recovered funds from law enforcement cooperation, and broader regulatory responses that might reshape operational requirements for crypto platforms.

The SwissBorg incident serves as a sobering reminder that crypto's maturation requires not just technological innovation, but also operational discipline that matches traditional financial services standards. As the industry processes this latest wake-up call, the ultimate test will be whether lessons learned translate into meaningful security improvements across the ecosystem.

Market data indicates past performance does not guarantee future results. Readers should consult qualified financial advisors before making investment decisions.

You May Also Like

This article is submitted by our user under the News Submission Rules and Guidelines. The cover photo is computer generated art for illustrative purposes only; not indicative of factual content. If you believe this article infringes upon copyright rights, please do not hesitate to report it by sending an email to us. Your vigilance and cooperation are invaluable in helping us maintain a respectful and legally compliant community.

Subscribe to our Newsletter

Get the latest in enterprise business and tech with exclusive peeks at our new offerings

We use cookies on our website to enable certain functions, to provide more relevant information to you and to optimize your experience on our website. Further information can be found in our Privacy Policy and our Terms of Service . Mandatory information can be found in the legal notice