{"id":459,"date":"2023-02-01T15:10:20","date_gmt":"2023-02-01T13:10:20","guid":{"rendered":"https:\/\/ackeeblockchain.com\/blog\/?p=459"},"modified":"2024-05-16T13:35:51","modified_gmt":"2024-05-16T11:35:51","slug":"2022-solana-hacks-explained","status":"publish","type":"post","link":"https:\/\/ackee.xyz\/blog\/2022-solana-hacks-explained\/","title":{"rendered":"2022 Solana Hacks Explained"},"content":{"rendered":"<p><em><span style=\"font-weight: 400;\">Cryptocurrency ecosystems have traditionally been attractive to hackers and scammers, and 2022 proved it again. Over $4B was estimated to be lost for good in the crypto space during the last year, of which over $500M was stolen on Solana.\u00a0<\/span><\/em><\/p>\n<p><em><span style=\"font-weight: 400;\">Let&#8217;s have a deep dive into these hacks and manipulations to see why and how they happened, are there any patterns and how the projects could have protected themselves.\u00a0<\/span><\/em><\/p>\n<h3><b>Wormhole<\/b><\/h3>\n<h4><b>About\u00a0<\/b><\/h4>\n<h4><span style=\"font-weight: 400;\"><a href=\"https:\/\/wormhole.com\/\" target=\"_blank\" rel=\"noopener\">Wormhole<\/a> is a <strong>message-passing protocol<\/strong> enabling the <strong>transfer<\/strong> of tokenized assets <strong>between<\/strong> supported <strong>chains<\/strong>, for instance, one can send ETH from Ethereum and receive a wrapped wormhole ETH (wETH) on Solana.\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">It becomes possible because each supported chain has a wormhole <strong>contract<\/strong> that <strong>emits<\/strong> or <strong>processes<\/strong> wormhole <strong>messages<\/strong> with the help of the so-called &#8216;<strong>Guardians<\/strong>&#8216;, a distributed set of nodes that <strong>monitor<\/strong> the state of transactions and after <strong>consensus<\/strong> sign the messages.\u00a0<\/span><\/p>\n<h4><b>What happened\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In February 2022, an attacker <strong>stole<\/strong> assets worth roughly <strong>$338M<\/strong> (at the time of the exploit) by <strong>circumventing<\/strong> the <strong>signing process<\/strong> and minting 120k wrapped ETH tokens on Solana without locking an equivalent on Ethereum. Wormhole team sent a <a href=\"https:\/\/www.notifi.xyz\/messages\/1497\" target=\"_blank\" rel=\"noopener\">message<\/a> to the hacker offering <strong>a white hat agreement<\/strong> but there was <strong>no response<\/strong>. The hacker used 93,750 of the minted wrapped ETH to <strong>redeem<\/strong> back equivalent ETH tokens on Ethereum, thus <strong>draining<\/strong> the money from Ethereum liquidity pool. The rest of the tokens were <strong>sold<\/strong> for <strong>SOL<\/strong> and <strong>USDC<\/strong>, as seen in the hacker&#8217;s <a href=\"https:\/\/solscan.io\/account\/CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka#splTransfers\" target=\"_blank\" rel=\"noopener\">wallet<\/a>. Wormhole&#8217;s <strong>investor<\/strong>, Jump Crypto <strong>replenished<\/strong> all 120k ETH, virtually <strong>bailing<\/strong> <strong>Wormhole<\/strong> <strong>out<\/strong>.<\/span><\/p>\n<h4><b>How it happened<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The <strong>bug&#8217;s root cause<\/strong> was a <a href=\"https:\/\/github.com\/solana-labs\/solana\/blob\/master\/sdk\/program\/src\/sysvar\/instructions.rs#L240\" target=\"_blank\" rel=\"noopener\"><strong>deprecated<\/strong> <strong>function <\/strong><\/a><\/span><\/p>\n<pre><span style=\"font-weight: 400;\">load_instruction_at <\/span><\/pre>\n<p><span style=\"font-weight: 400;\">being used during the Wormhole <strong>signature<\/strong> <strong>verification<\/strong>. The way to build custom instructions that &#8216;do&#8217; <strong>signature verification<\/strong> is by <strong>sending<\/strong> a transaction made of (at least) <strong>two instructions<\/strong> and <strong>checking<\/strong> that the native program instruction was sent.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, Wormhole&#8217;s implementation of the <strong>signature verification did not use<\/strong> the suggested <\/span><\/p>\n<pre><span style=\"font-weight: 400;\">load_instruction_at_checked function <\/span><\/pre>\n<p><span style=\"font-weight: 400;\">and instead used\u00a0<\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/github.com\/solana-labs\/solana\/blob\/master\/sdk\/program\/src\/sysvar\/instructions.rs#L240\" target=\"_blank\" rel=\"noopener\"><strong>a deprecated version <\/strong><\/a><\/span><\/p>\n<pre><span style=\"font-weight: 400;\">load_instruction_at<\/span><\/pre>\n<p><span style=\"font-weight: 400;\">This function <strong>does not check<\/strong> that the <strong>origin<\/strong> of data to deserialize is actually from the sysvar account and not a fake account.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read <\/span><a title=\"2022 Solana Hacks Explained: Wormhole\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-wormhole\/\" target=\"_blank\" rel=\"noopener\"><b>this<\/b><\/a><span style=\"font-weight: 400;\"> for more technical details.\u00a0<\/span><\/p>\n<h4><b>In simple words<\/b><\/h4>\n<p>T<span style=\"font-weight: 400;\">he Wormhole hack was quite sophisticated on one side, but after all, the <strong>root cause<\/strong> was a <strong>missing ownership check<\/strong> on one account, which allowed the hacker to <strong>fake the transaction signature<\/strong> and <strong>mint tokens<\/strong> on one chain without providing collateral on the other.\u00a0<\/span><\/p>\n<h3><b>Cashio<\/b><\/h3>\n<h3><b>About<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/github.com\/cashioapp\/cashio\" target=\"_blank\" rel=\"noopener\">Cashio<\/a> was a<strong> decentralised stablecoin<\/strong> fully backed by interest-bearing Saber USD liquidity provider tokens.<\/span><\/p>\n<h4><b>What happened\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Like with the <a title=\"2022 Solana Hacks Explained: Wormhole\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-wormhole\/\" target=\"_blank\" rel=\"noopener\">Wormhole<\/a> hack, the attacker used <strong>fake accounts<\/strong> to <strong>mint<\/strong> Cashio&#8217;s CASH tokens and <strong>stole<\/strong> over <strong>$52M<\/strong>. It is worth mentioning that Cashio was n<strong>ever audited by a third party.<\/strong><\/span><\/p>\n<h4><b>How it happened<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Due to a <strong>collateral token validation flaw<\/strong>, the attacker minted 2 billion CASH tokens using a <strong>faked<\/strong> worthless <strong>token<\/strong> as <strong>collateral<\/strong>. He then <strong>burnt<\/strong> part of the tokens for the Saber USDT-USDC LP tokens that he <strong>swapped<\/strong> for $16.4 USDC and $10.8 USDT, respectively. The remaining CASH tokens were <strong>swapped<\/strong> out for <strong>$8.6M UST<\/strong> and <strong>$17M USDC<\/strong> through Saber. What&#8217;s curious is that the hacker embedded a <a href=\"https:\/\/etherscan.io\/tx\/0xa8394d2e55042f84d096c72dd1075fa2648faf88e248c7992273b4d50a6a647b\" target=\"_blank\" rel=\"noopener\">hidden message<\/a> in the transaction that, after viewing the input data as UTF-8 says:<\/span><\/p>\n<p style=\"text-align: center;\"><em><span style=\"font-weight: 400;\"> &#8220;Accounts with less than 100k have been returned. All other money will be donated to charity&#8221;.<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Read <\/span><a title=\"2022 Solana Hacks Explained: Cashio\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-cashio\/\"><b>this<\/b><\/a><span style=\"font-weight: 400;\"> for more technical details.\u00a0<\/span><\/p>\n<h4><b>In simple words<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The exploiter had to perform multiple steps and <strong>supply the worthless tokens<\/strong> he created earlier as <strong>collateral<\/strong> to mint <strong>2 billion CASH tokens.<\/strong> The reason why he managed to do this boils down to the <strong>flawed verification of input accounts.<\/strong><\/span><\/p>\n<h3><b>Crema Finance<\/b><\/h3>\n<h4><b>About<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.crema.finance\/\" target=\"_blank\" rel=\"noopener\">Crema Finance<\/a> is a <strong>liquidity pool<\/strong> based on <strong>CLMM<\/strong> (Concentrated Liquidity Market Maker) that allows liquidity providers to set <strong>specific price ranges<\/strong>, add <strong>single-sided liquidity<\/strong> and do <strong>range order trading<\/strong>. The project is <strong>closed source<\/strong>, so the available information about the hack is rather limited. The only publicly available <a href=\"https:\/\/docsend.com\/view\/rc7w5xr3vxfh2h8i\" target=\"_blank\" rel=\"noopener\">security audit<\/a> took place in October <strong>after<\/strong> the incident.<\/span><\/p>\n<h4><b>What happened\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">On July 2, 2022, the pool was subject to an <strong>exploit<\/strong>, draining over <strong>$8M<\/strong> worth of assets.\u00a0<\/span><\/p>\n<h4><b>How it happened<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">According to <a href=\"https:\/\/twitter.com\/Crema_Finance\/status\/1543638844410499073\" target=\"_blank\" rel=\"noopener\">Crema Finance tweet<\/a>, the CLLM <strong>depends on a tick account<\/strong> that holds information about price tick data. The hacker used a combination of <strong>flash loan<\/strong> and <strong>exploitation of owner verification. <\/strong><\/span><span style=\"font-weight: 400;\">After the incident, Crema Finance <strong>suspended<\/strong> the protocol and <strong>offered<\/strong> the hacker an <strong>$800k white hat bounty<\/strong> via <a href=\"https:\/\/etherscan.io\/tx\/0xa38b894b2bb1c8a3eaf816d879a542e080443f7bf5a84214a00e6e509f9f6130\" target=\"_blank\" rel=\"noopener\">on-chain message<\/a> to the hacker&#8217;s Ethereum address. After negotiations, the hacker <strong>agreed<\/strong> to take the <strong>45455 SOL<\/strong> bounty (approximately<strong> $1.5M<\/strong> at that time) and <strong>returned<\/strong> the rest to the protocol.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read <\/span><a title=\"2022 Solana Hacks Explained: Crema Finance\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-crema-finance\/\" target=\"_blank\" rel=\"noopener\"><b>this<\/b><\/a><span style=\"font-weight: 400;\"> for more technical details.\u00a0<\/span><\/p>\n<p><b>In simple words,<\/b><span style=\"font-weight: 400;\"> everything points again to the common problem that the <strong>input accounts were not properly checked<\/strong>, however as the protocol is closed source, some details may be missing.<\/span><\/p>\n<h3><b>Nirvana Finance<\/b><\/h3>\n<h4><b>About<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.nirvana.finance\/\">Nirvana Finance<\/a> is a Solana-based <strong>DeFi protocol<\/strong> with an <strong>algorithmic stablecoin<\/strong>.\u00a0<\/span><\/p>\n<p><b>What happened\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">On July 28, 2022, it ran into l<strong>iquidity issues<\/strong> due to a <strong>flash loan attack<\/strong> where an attacker <strong>drained<\/strong> approximately <strong>$3.5M<\/strong> from the liquidity pool. The protocol is <strong>closed source<\/strong> and underwent only an <a href=\"https:\/\/uploads-ssl.webflow.com\/62acc2bbfa68c06f0b46f628\/62c729b1b482b308072715b2_nirvana-audit-certificate.pdf\" target=\"_blank\" rel=\"noopener\"><strong>automated audit<\/strong> <\/a>before the exploit. A <strong>manual human audit<\/strong> is still being <strong>scheduled<\/strong> as of the time of writing (January 2023).<\/span><\/p>\n<p><b>How it happened<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Based on the technical <a href=\"https:\/\/medium.com\/nirvanafinance\/technical-post-mortem-d738935aeec\" target=\"_blank\" rel=\"noopener\">post-mortem<\/a> analysis from the Nirvana Finance team, the attacker was able to <strong>manipulate the inputs<\/strong> to the program and <strong>buy<\/strong> the <strong>ANA<\/strong> token at an <strong>artificially low price<\/strong>. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read <\/span><a title=\"2022 Solana Hacks Explained: Nirvana\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-nirvana\/\"><b>this<\/b><\/a><span style=\"font-weight: 400;\"> for more technical details.\u00a0<\/span><\/p>\n<p><b>In simple words,<\/b><span style=\"font-weight: 400;\"> it was a combination of a market manipulation with some hacking: first he artificially lowered the price to buy himself ANAs and by doing so, the exploiter pushed the price upwards and made a profit from the spread.<\/span><\/p>\n<h3><b>Slope Wallet<\/b><\/h3>\n<h4><b>About<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/slope.finance\/\" target=\"_blank\" rel=\"noopener\">Slope Finance<\/a> is a community-driven full-stack <strong>platform<\/strong> that consists of the sectors of <strong>DEX, Wallet,<\/strong> and <strong>NFTs<\/strong> built on Solana.\u00a0<\/span><\/p>\n<h4><b>What happened\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">On August 2, 2022 an attacker <strong>drained<\/strong> 9229 wallets of approximately <strong>$4.1M<\/strong> worth of assets.<\/span><\/p>\n<h4><b>How it happened\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">No one really knows, despite the fact that the team published an <a href=\"https:\/\/slope-finance.medium.com\/slope-wallet-sentry-vulnerability-digital-forensics-and-incident-response-report-d7a5904e5a39\" target=\"_blank\" rel=\"noopener\">extensive incident report<\/a>. On-chain data showed that the malicious <strong>transactions<\/strong> were <strong>signed correctly<\/strong> and, therefore, the <strong>private wallet keys<\/strong> had been <strong>leaked<\/strong> or <strong>compromised<\/strong>.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It had been confirmed that the <strong>mobile version<\/strong> of Slope Wallet application was <strong>collecting<\/strong> <strong>sensitive information<\/strong> (i.e. private keys) and <strong>transmitting<\/strong> it (using HTTPS TLS encryption) to a <strong>third-party<\/strong> monitoring service Sentry, where it was stored <strong>un-encrypted<\/strong> in an access-secured central database. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet, the investigations showed that only <strong>5,367<\/strong> wallet private keys were <strong>stored in the database<\/strong>, and only <strong>1,444<\/strong> of them <strong>were<\/strong> actually <strong>drained<\/strong> by the attacker, there were <strong>no proofs<\/strong> that the other affected wallets\u2019 information had ever been stored with Sentry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Solana Foundation claimed that <strong>no core code<\/strong> or anything r<strong>elated to Solana protocol<\/strong> itself was involved in the attack; it was isolated to the Slope Wallet provider.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read <\/span><a title=\"2022 Solana Hacks Explained: Slope Wallet\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-slope-wallet\/\"><b>this<\/b><\/a><span style=\"font-weight: 400;\"> for more details.\u00a0<\/span><\/p>\n<p><b>In simple words,<\/b><span style=\"font-weight: 400;\"> we don\u2019t know what exactly happened. Even though there is <strong>no evidence<\/strong> that the private <strong>keys<\/strong> of Slope\u2019s users <strong>were compromised<\/strong>, it is definitely a big security <strong>risk<\/strong> to <strong>store<\/strong> sensitive information <strong>unencrypted<\/strong>. <\/span><\/p>\n<h3><b>Mango Markets<\/b><\/h3>\n<h4><b>About\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/mango.markets\/\" target=\"_blank\" rel=\"noopener\">Mango Markets<\/a> is a <strong>platform<\/strong> for <strong>cross-collateralized leverage trading.\u00a0<\/strong><\/span><\/p>\n<h4><b>What happened\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">On October 12, 2022, an attacker <strong>drained<\/strong> over <strong>$116M<\/strong> worth of assets by <strong>manipulating<\/strong> the <strong>oracle price<\/strong> data.<\/span><\/p>\n<p><b>How it happened\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The attacker used over <strong>$5M USDC<\/strong> to fund an account, took a <a href=\"https:\/\/trade.mango.markets\/account?pubkey=CQvKSNnYtPTZfQRQ5jkHq8q2swJyRsdQLcFcj3EmKFfX\" target=\"_blank\" rel=\"noopener\">short MANGO-PERP position,<\/a> and offered 488M MANGO-PERP to sell at $0.0382. Next, he funded another account with <strong>additional $5M USDC<\/strong>, took <a href=\"https:\/\/trade.mango.markets\/account?pubkey=4ND8FVPjUGGjx9VuGFuJefDWpg3THb58c277hbVRnjNa\" target=\"_blank\" rel=\"noopener\">a long MANGO-PERP position<\/a>, and bought <strong>488M<\/strong> MANGO-PERP. Due to <strong>low liquidity<\/strong> on the exchange between MANGO and USDC, the attacker was able to <strong>pump<\/strong> the price of MANGO on various exchanges <strong>5-10x<\/strong> in a matter of minutes. The updated <strong>prices<\/strong> <strong>by Oracles<\/strong> were <strong>pumped<\/strong> up to $0.91 per unit and allowed the attacker to <strong>take out a loan of $116M<\/strong> worth and withdraw BTC (Sollet), USDT, SOL, mSOL, USDC from Mango.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read <\/span><a title=\"2022 Solana Hacks Explained: Mango Markets\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-mango-markets\/\"><b>this<\/b><\/a><span style=\"font-weight: 400;\"> for more details.\u00a0<\/span><\/p>\n<p><b>In simple words, <\/b><span style=\"font-weight: 400;\">Mango Markets<strong> wasn\u2019t hacked<\/strong> at all, it was exploited. The exploiter <strong>pumped<\/strong> the price of the Mango\u2019s native token, then sold, thus <strong>dumped<\/strong> the price and <strong>profited<\/strong> from the spread. <\/span><\/p>\n<h3><b>Solend<\/b><\/h3>\n<h4><b>About\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/solend.fi\/\" target=\"_blank\" rel=\"noopener\">Solend<\/a> is a decentralized lending and borrowing protocol on Solana.\u00a0<\/span><\/p>\n<p><b>What Happened\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">On November 2, 2022, an attacker <strong>drained<\/strong> assets from Solend&#8217;s Stable, Coin98, and Kamino isolated pools resulting in <strong>$1.26M<\/strong> of bad debt.<\/span><\/p>\n<p><b>How it happened\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The attacker<strong> spent 100k USDC to pump<\/strong> USDH price on Saber, and then he <strong>started spamming<\/strong> the Saber account so that <strong>no arbitrage could occur<\/strong> in the same slot. The attacker then <strong>arbitraged himself<\/strong> in the next slot, and the Switchboard <strong>oracle<\/strong> <strong>picked the high price<\/strong>. By repeating the same procedure, he <strong>pumped up the price<\/strong> of USDH, and by depositing, he <strong>borrowed<\/strong> assets worth <strong>$1.26M<\/strong>, effectively draining all pools.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read <\/span><a title=\"2022 Solana Hacks Explained: Solend\" href=\"https:\/\/ackeeblockchain.com\/blog\/2022-solana-hacks-explained-solend\/\"><b>this<\/b><\/a><span style=\"font-weight: 400;\"> for more details.<\/span><\/p>\n<p><b>In simple words, <\/b><span style=\"font-weight: 400;\">it was a combination of a <strong>hack<\/strong> and <strong>market manipulation<\/strong>: the hacker <strong>pumped<\/strong> the tokens price and <strong>spammed<\/strong> the oracle to make sure it picks the price which would be the most profitable for him.\u00a0\u00a0<\/span><\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>Blockchain hacks come in different forms, some of them can&#8217;t be really called hacks, they are rather exploits as they don&#8217;t involve any coding, like in case with Mango Markets. Others may be a combination of both a hack and market manipulation.<\/p>\n<p>Is there any way for a protocol to protect itself from attackers as they grow more and more ingenious? <span style=\"font-weight: 400;\">We firmly believe that being audited by a third-party is one of the best ways to do so. Although no audit can be a 100% guarantee and a single audit can never be enough, it&#8217;s a basic requirement for a reputable web3 project, yet some of the protocols who suffered from a hack or an exploit hadn\u2019t been audited manually or at all.<\/span><\/p>\n<h4><strong>References<\/strong><\/h4>\n<p><a href=\"https:\/\/www.linkedin.com\/pulse\/320-million-wormhole-hack-explained-giap-nguyen\/\" target=\"_blank\" rel=\"noopener\">1<\/a>, <a href=\"https:\/\/twitter.com\/0xavarek\/status\/1506812700516503554\" target=\"_blank\" rel=\"noopener\">2<\/a>, <a href=\"https:\/\/medium.com\/nirvanafinance\/technical-post-mortem-d738935aeec\" target=\"_blank\" rel=\"noopener\">3,<\/a> <a href=\"https:\/\/www.certik.com\/resources\/blog\/4XzSJEeWC2bRppR9CeBckw-crema-finance-exploit\" target=\"_blank\" rel=\"noopener\">4<\/a>, <a href=\"https:\/\/slope-finance.medium.com\/slope-wallet-sentry-vulnerability-digital-forensics-and-incident-response-report-d7a5904e5a39\" target=\"_blank\" rel=\"noopener\">5<\/a>, <a href=\"https:\/\/blog.sentry.io\/2022\/08\/10\/slope-wallet-solana-hack\/\" target=\"_blank\" rel=\"noopener\">6<\/a>,\u00a0<a href=\"https:\/\/solana.com\/news\/8-2-2022-application-wallet-incident\" target=\"_blank\" rel=\"noopener\">7<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/mangomarkets\/status\/1580053208130801664\" target=\"_blank\" rel=\"noopener\">8<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/joshua_j_lim\/status\/1579987655110324224\" target=\"_blank\" rel=\"noopener\">9<\/a>,\u00a0<a href=\"https:\/\/www.bankinfosecurity.com\/everything-we-know-about-mango-markets-hack-a-20250\" target=\"_blank\" rel=\"noopener\">10<\/a>, <a href=\"https:\/\/blog.solend.fi\/usdh-price-manipulation-impact-on-isolated-pools-4f79ff6af2ba\" target=\"_blank\" rel=\"noopener\">11<\/a><\/p>\n<pre><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency ecosystems have traditionally been attractive to hackers and scammers, and 2022 proved it again. Over $4B was estimated to be lost for good in the crypto space during the last year, of which over $500M was stolen on Solana.\u00a0 Let&#8217;s have a deep dive into these hacks and manipulations to see why and how they happened, are there any patterns and&hellip;<\/p>\n","protected":false},"author":15,"featured_media":460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85,84,5],"tags":[14,86,6,19],"class_list":["post-459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exploits","category-hacks","category-solana","tag-exploit","tag-hack","tag-solana","tag-solana-security"],"aioseo_notices":[],"featured_image_src":"https:\/\/ackee.xyz\/blog\/wp-content\/uploads\/2023\/02\/Solana-hacks-2022-1-600x400.png","featured_image_src_square":"https:\/\/ackee.xyz\/blog\/wp-content\/uploads\/2023\/02\/Solana-hacks-2022-1-600x600.png","author_info":{"display_name":"Aleksandra Yudina","author_link":"https:\/\/ackee.xyz\/blog\/author\/aleksandra-yudina\/"},"_links":{"self":[{"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/posts\/459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/comments?post=459"}],"version-history":[{"count":0,"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/posts\/459\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/media\/460"}],"wp:attachment":[{"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/media?parent=459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/categories?post=459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ackee.xyz\/blog\/wp-json\/wp\/v2\/tags?post=459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}