The decline in Bitcoin’s price has brought about significant losses, compounded lately by security breaches causing further downfalls. One such incident involved the Solana-based DeFi platform, Step Finance, which recently announced an issue concerning its treasury wallet, resulting in its altcoin plummeting by 95%. With market collapses followed by hacking incidents, it is critical to stay updated on the news and to employ stop-loss strategies.
Step Finance Compromised
Step Finance acknowledged that its treasury wallets had been compromised, resulting in 261,854 SOL coins being moved by attackers. The collapse of FTX led to increased interest in DeFi, making platforms like Hyperliquid gain popularity. However, DeFi is not without risks; similar to how exchanges like FTX can be stripped bare by their owners, DeFi protocols also face threats of being hacked. Until now, numerous DeFi protocols have been hacked, with liquidity pools drained and protocols connected to users’ wallets being exploited.
In a statement, Step Finance explained: “Earlier today, during APAC hours, several of our treasury wallets were seized by a sophisticated actor through a well-known attack vector. Immediate remedial measures were taken, and we are working closely with top security experts. Relevant authorities have been informed. We are working around the clock and will update you as we learn more.”

Step Coin’s Plummet
The exact method used by the attackers to seize control of the wallet remains unclear, as does the total extent of the damage. What is clear, according to CoinGecko data, is that after yesterday’s hack, STEP Coin lost 95% of its value. Founded in 2021, Step Finance is one of the new-generation DeFi initiatives, providing users access to various Solana-based DeFi protocol products and services from a single dashboard. Hence, it describes itself as Solana’s homepage.

Despite the ever-growing number of DeFi protocols, security is not always taken seriously. Especially notable is how protocols worth merely a few million dollars disregard major expenses related to security measures, penetration tests, regular code reviews, and vulnerability scans. Therefore, one should ensure that the protocols utilized have comprehensive and regular security checks in place.




