Backpack Wallet and Blockaid Thwart $26.6 Million in DeFi Attacks on Solana

Backpack Wallet and Blockaid have prevented a $26.6 million loss from DeFi attacks on Solana, identifying over 71,000 malicious transactions and highlighting the need for improved security measures in the crypto space.

Backpack Wallet and Blockaid have successfully prevented a staggering $26.6 million loss from decentralized finance (DeFi) attacks targeting users on the Solana network. Through a vigilant partnership, they identified over 71,000 malicious transactions between June and September 2024, safeguarding more than 5% of Backpack's user base.

Key Takeaways

  • Backpack Wallet detected over 71,000 malicious transactions.
  • $26.6 million in potential losses were avoided for users.
  • The attacks were primarily linked to the rise of memecoin trading.
  • Phishing scams accounted for $127 million in losses in Q3 2024.

The Rise of DeFi Attacks on Solana

The Solana network has become a prime target for malicious actors, particularly as the popularity of memecoins has surged. According to Ben-Natan, the CEO of Backpack Wallet, the security measures in Ethereum-based networks have matured, making it harder for attackers to exploit users there. Consequently, they have shifted their focus to Solana, where security is still catching up.

Partnership with Blockaid

Backpack Wallet's collaboration with Blockaid has proven crucial in identifying and mitigating threats. By scanning over 180 million transactions, they were able to pinpoint suspicious activities and prevent significant financial losses. This proactive approach highlights the importance of partnerships in enhancing security within the crypto space.

The Phishing Threat

Phishing attacks remain a prevalent threat across blockchain networks. In September alone, approximately $46 million was stolen from 10,800 investors through these scams. The total losses from such attacks in the third quarter of 2024 reached a staggering $127 million. Notably, one victim lost $32.43 million in Spark Wrapped Ethereum tokens due to a permit phishing signature attack.

Future Implications for Security

As Solana improves its security measures, experts predict that attackers will likely shift their focus to other blockchain networks, such as Tron and TON. This trend underscores the need for continuous advancements in security protocols across all platforms to protect users from evolving threats.

A Call for Industry Responsibility

Ben-Natan emphasizes that the responsibility for user protection should not solely rest on the shoulders of individual users. Instead of merely advising users on how to avoid scams, the industry must prioritize creating robust security measures that protect users from potential threats. He stated, "Attackers are always moving forward, always looking for an in, and it only takes one incident for a user to lose everything."

Conclusion

The collaboration between Backpack Wallet and Blockaid serves as a vital example of how proactive measures can significantly reduce the risk of financial loss in the DeFi space. As the landscape of cryptocurrency continues to evolve, the focus must remain on enhancing security to safeguard users against the ever-present threat of cyberattacks.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

Address Reputation API: Scores and Evidence
25.12.2025
[ Featured ]

Address Reputation API: Scores and Evidence

Explore the Address Reputation API: understand scores, data sources, performance, and how to operationalize insights for faster threat detection and response.
Read article
Security Benchmark for Wallets: Scoring Method
25.12.2025
[ Featured ]

Security Benchmark for Wallets: Scoring Method

Explore the security benchmark for wallets with our scoring method. Learn about continuous monitoring, AI-driven security, and smart contract risk quantification.
Read article
Postmortem for Crypto Hacks: Template and Checklist
24.12.2025
[ Featured ]

Postmortem for Crypto Hacks: Template and Checklist

Learn how to conduct postmortem crypto hacks analysis with our template and checklist. Understand attack vectors, root causes, and preventative measures for Web3 security.
Read article