Read on Medium

What we know about the Solana attacks

3 August 2022
Nearly 8,000 Solana wallets have been drained by attackers. Here’s what we know about the attacks.

1. Private keys were stolen and used to sign transactions that drained victims’ wallets. Here’s the list of wallets and the hackers’ accounts:

Phantom, Slope, Solflare, TrustWallet wallets were affected across multiple platforms, as well as a few wallets on other chains, including Ethereum.

2. The theft probably occurred through a “supply-chain attack” on a cross-chain app, since the only ETH wallets drained were linked to Solana ones. Supply-chain attacks work by corrupting application dependencies rather than the main repository. There’s no concrete evidence yet for this, but there is indirect evidence in that no hardware wallets were affected.

3. There was also some speculation that perhaps some software was using a crypto library wrong in a way that would reveal the private key, which is easy to do: there are at least 50 libraries that allow clients to do the wrong thing, including ed25519-dalek, which Solana relies on. There’s no concrete evidence for this, though, and the fact that the attack was not more widespread means it’s probably not the exploit in this case.

4. Several Solana RPC nodes went down. Some reported a DDOS attack by white hat hackers attempting to slow down the network to prevent the attackers’ transactions from going through:

However, this was never confirmed by Solana. Instead, @kiyomiwallet stays they were told it was a software bug:

Update: As of August 3, it no longer appears that the attack was a supply-chain attack., a blockchain auditing group, discovered that a week ago, Slope began logging seed phrases to its Sentry logs. Someone with access to the logs would have all the information they needed to drain the accounts.

We’ll update this post as we get more information.