On January 31, 2026, Step Finance, an important aggregator in the Solana ecosystem, was reported to have suffered a severe security incident involving its treasury and fee wallet, with approximately 261,854 SOL being unstaked and transferred to unknown addresses. At the time, this was valued at nearly $30 million. This project, which has long played the role of "asset dashboard and yield aggregation entry" in Solana DeFi, suddenly exposed a fatal gap in its treasury, making the entire ecosystem realize that the security system for assets held by project teams on high-performance public chains may be far more fragile than the user experience. On one side, there were claims of deployed multi-layered protection mechanisms, while on the other, large amounts were transferred out seamlessly. This incident quickly escalated into a confrontation of "treasury protection failure and upgraded hacking methods," affecting the nerves of projects, ecosystems, and institutional funds.
Thirty Million Instant Escape: The On-Chain Scene of the Treasury Being Cleared
● On-Chain Process Restoration: On January 31, at 8 AM UTC+8, abnormal operations were detected in the treasury and fee wallet addresses associated with Step Finance, where large staking positions were concentrated and unstaking requests were initiated. Subsequently, after the unlocking window, approximately 261,854 SOL were transferred out in multiple transactions to several unknown new addresses. On-chain records show that this process was completed in a highly concentrated manner within a short time frame, indicating clear premeditation and path planning, rather than random operational errors. Since all actions were completed through standard on-chain commands, the chain itself only recorded "who moved the money," but could not directly provide technical details of the attack vector.
● The Weight of the Fund Amount: Valued at approximately $30 million, the scale of the transferred SOL ranks among the top three security incidents in Q1 2026, significantly impacting the financial stability of a single project and effectively withdrawing a portion of critical liquidity and security buffer from the Solana DeFi ecosystem all at once. For projects that rely on protocol-owned funds as incentives, liquidity subsidies, or risk control reserves, such a level of treasury depletion feels more like "the foundation being pried up," far more complex than just a data loss.
● Information Disclosure and Emotional Evolution: After the incident, Step Finance did not immediately disclose all details at once but adopted a "gradual disclosure" strategy: first confirming that the treasury and fee wallet had experienced unauthorized asset transfers, then supplementing with the approximate quantity and scale of the transferred SOL, and stating that an investigation into the specific causes was underway. Meanwhile, the community, upon seeing the canceled staking and large transfer transactions flagged by monitoring accounts, quickly reacted with panic and anger, questioning the effectiveness of centralized asset management and risk control systems, and expressing distrust towards the official's slow-paced explanations.
Why the Defense Line Failed: The Hidden Dangers of Concentrating Assets in One Basket
● Systemic Risk of Single Point Failure: From the currently available information, the affected assets are highly concentrated pools in the treasury and fee wallet, which are often viewed as the "core funding hub" in project governance and operations. When a large amount of operational funds, fee income, and even future incentive reserves are concentrated in a few addresses, any lapse in control over these addresses can instantly escalate from a "local bug" to a "systemic disaster." The Step Finance incident presented this single point failure risk in the most intuitive way: the defense line was not slowly eroded in a specific business module but was cut off entirely at the treasury center.
● Monitoring Blind Spots and Response Time Gaps: For large staked assets, unstaking and subsequent transfers should be among the processes requiring the most meticulous monitoring. However, in Solana, where high-frequency and massive operations have become the norm, even within the project, some "large unstaking" actions may be mistakenly regarded as routine asset adjustments, leading to the highest-level alerts not being triggered immediately during the initial few abnormal operations. By the time a large amount of SOL had been unlocked from staking and completed the initial round of transfers, the time gap between the monitoring system and manual checks had widened into a significant chasm between attackers and defenders, with the attackers completing critical steps before the team truly realized the severity of the situation.
● Speculation of Wallet-Level Compromise: In the absence of official disclosure of the attack vector, a mainstream speculation of "wallet-level compromise" emerged within the community, suggesting that this incident might be related to private key management, signing permissions, or the security of related infrastructure. However, it is important to emphasize that this judgment is still merely an inference based on on-chain appearances, with no conclusive evidence to support it, and the official has not provided similar conclusions. Therefore, it should be viewed as information pending verification rather than established fact. In the absence of more details, hastily attributing responsibility entirely to a specific wallet or technical aspect could mislead public opinion and hinder a rigorous post-incident review.
On-Chain Tracking Stalls: Hacker Funds Still Roaming in the Shadows
● Cash-Out Exits Not Yet Appeared: According to publicly available information from on-chain monitoring accounts, the transferred 261,854 SOL did not show any "liquidation exit" pattern concentrating into one or two mainstream centralized platforms shortly after the incident. The monitoring party stated, "No concentrated exit to exchanges has been observed," indicating that the attackers, at least in the initial stages, were not in a hurry to cash out all the stolen funds directly but chose to distribute them across multiple new addresses. In this state, the funds seem "frozen in the shadows," providing a window for further tracking but also increasing the risk of a sudden concentrated escape in the future.
● Challenges of Batch Transfers and Mixing Strategies: Without the need to fabricate specific path details, it can be expected that attackers will employ common strategies such as batch transfers, layered address splitting, and mixing with other liquidity to weaken on-chain observers' continuous perception of "a whole block of stolen funds." Such tactics are particularly effective on high-performance public chains—transaction records of a single address can be diluted among a massive number of ordinary transactions, and the choice of paths across multiple protocols and assets makes simple "following one address" ineffective. For trackers, maintaining long-term monitoring without alarming the attackers constitutes a test of endurance.
● Monitoring Bottlenecks of High-Performance Public Chains: Solana is known for its high throughput and low latency, but this technical characteristic also creates new contradictions in security monitoring. On one hand, the speed at which on-chain data flows in far exceeds that of traditional blockchains, dramatically increasing the cost of real-time capture and analysis; on the other hand, abnormal behaviors are often hidden within the "noise" of normal user operations, making it difficult to accurately classify the risk of every large operation even with deployed rule engines or machine learning models. This incident further exposed the challenge: in a high-performance public chain environment, finding a balance between performance and observability to ensure that protocol-level and project-level monitoring is truly "real-time and actionable" remains an unresolved issue.
Project Team's Cautious Approach: The Tug of War Between Crisis Management and Technical Response
● Official Statements and External Assistance: After confirming the abnormal fund transfers, Step Finance publicly stated that the team "is contacting cybersecurity companies for assistance in the investigation," attempting to enhance the authority of event tracing and risk assessment through professional third-party intervention. This statement released two signals: first, the project team acknowledges its limited resources in emergency response and evidence collection, needing to leverage specialized security teams; second, it conveys to the community that "we are not facing this alone," hoping to buffer the erosion of trust through the reputation endorsement of external institutions. However, since specific investigation progress has not been disclosed, the outside world cannot assess to what extent this collaboration will facilitate the resolution of the incident.
● Pros and Cons of Gradual Disclosure: The "gradual disclosure" strategy chosen by Step Finance is a double-edged sword in crisis communication. On the positive side, releasing information in phases helps avoid misleading before the facts are clarified, buying time for the technical team and security companies; it also allows for targeted responses to community concerns after confirming key points. On the downside, when the scale of funds has reached tens of millions of dollars and on-chain data is publicly accessible, overly restrained information disclosure can easily be interpreted as "concealment," intensifying users' doubts about transparency and allowing rumors and conspiracy theories to fill the information vacuum.
● Possible Boundaries of Technical Defense Actions: In the phase where the attack vector has not been disclosed, the team theoretically has a series of operational defense options in permission freezing, key rotation, and multi-signature strategy adjustments, such as tightening access to the remaining treasury, urgently rotating high-permission keys, and raising signature thresholds. However, the outside world currently does not know which measures have been implemented or the specific execution details and timelines. It is certain that as long as the incident is not fully clarified, any operations related to permissions and signatures must strike a delicate balance between "avoiding further risks" and "maintaining necessary operational capabilities," which itself constitutes a highly pressured management game.
The Collective Proposition of Solana DeFi: From Yield Frenzy to Treasury Self-Rescue
● Position in the Security Landscape of Q1 2026: In terms of fund volume, the Step Finance incident has been statistically ranked by multiple parties as one of the top three security incidents in Q1 2026. This not only dealt a heavy blow to a single project but also sounded an alarm on a larger scale: even protocols that have accumulated a certain reputation within the ecosystem and are viewed as infrastructure-level entry points do not constitute a "naturally secure zone." For developers and funders accustomed to viewing DeFi protocols as "composable Legos," this incident is reshaping their valuation of "base security."
● Deficiencies and Absences in Governance Practices: Over the past period, the Solana ecosystem has largely remained at the stage of "individual project exploration" rather than "industry consensus" in decentralized treasury governance practices such as multi-signature management, modular treasuries, and risk control whitelists. Many protocols still use early centralized wallet management models or remain at a compliance level in multi-signature implementation rather than substantial decentralization—signers are highly concentrated, risk control rules are vague, and asset scheduling lacks transparent processes. In this context, any management error or misuse of permissions could evolve into the entire treasury being wiped out, with Step Finance merely being the first case illuminated by the spotlight in this cycle.
● From Yield Aggregation to Security Repricing: The deeper impact is that this incident is prompting a turning point in the mindset of DeFi participants. In the past, project teams often used yield aggregation capabilities, high APRs, and multi-protocol routing as core selling points, while treasury security and governance mechanisms were often seen as backend matters to be "slowly supplemented after contract launch." Now, institutional funds and mature users are beginning to view "treasury security" as a prerequisite for participation: without a clear multi-signature structure, lacking publicly available treasury governance rules and audit records, projects may be directly classified as "ineligible targets." The depletion of Step Finance's treasury is forcing the entire industry to shift from chasing yield curves to re-evaluating the pricing of security itself.
After the Crisis: An Opportunity to Shift from Passive Defense to Active Construction
This treasury attack incident has starkly exposed the weaknesses of Step Finance and the Solana DeFi ecosystem to the public: first, asset concentration management has amplified the cost of single point failure to a systemic level; second, real-time on-chain monitoring and response mechanisms are lagging, failing to secure enough response time during critical moments of large unstaking and fund transfers; third, transparent disclosure faces dilemmas, constantly weighing public pressure, user emotions, and the integrity of investigations. For projects and the ecosystem, this is both a crisis of passive defense and an opportunity for forced upgrades.
Looking ahead, whether for Step Finance or the broader Solana ecosystem, rebuilding trust will inevitably require traversing three essential paths: first, implementing multi-signature and separation of duties effectively, introducing more granular permission management and treasury modularization to prevent any single entity from holding absolute power; second, constructing a real-time monitoring and alert system tailored to the characteristics of high-performance public chains, ensuring that every abnormal unstaking and transfer can be identified and intervened within seconds; third, promoting public audits and governance transparency as the norm, bringing treasury rules, audit reports, and emergency plans to the forefront of decision-making for users and institutions. For project teams and institutional funds, the core insight from this incident is: "Treasury security" should no longer be a secondary consideration after yields, but must become a prerequisite for all DeFi participation; otherwise, any seemingly high returns could vanish in a single hacker operation.
Join our community to discuss and become stronger together!
Official Telegram community: https://t.me/aicoincn
AiCoin Chinese Twitter: https://x.com/AiCoinzh
OKX Benefits Group: https://aicoin.com/link/chat?cid=l61eM4owQ
Binance Benefits Group: https://aicoin.com/link/chat?cid=ynr7d1P6Z
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。



