The Step Finance Autopsy: Why $27M in Audited Contracts Died From a Phishing Email
On January 31, 2026, Step Finance — the self-proclaimed "front page of Solana" — lost $27.3 million in 90 minutes. Not from a flash loan. Not from a reentrancy bug. Not from an oracle manipulation....

Source: DEV Community
On January 31, 2026, Step Finance — the self-proclaimed "front page of Solana" — lost $27.3 million in 90 minutes. Not from a flash loan. Not from a reentrancy bug. Not from an oracle manipulation. From a compromised laptop. Their smart contracts were audited. Their code was clean. Their bug bounty was live. And none of it mattered, because the attacker didn't need to hack the code — they just needed to phish an executive. This isn't a post-mortem of Step Finance. It's a field manual for every DeFi team that thinks "we passed our audit" means "we're secure." The Attack: 90 Minutes From Inbox to Insolvency Here's the timeline, reconstructed from CertiK's on-chain analysis and Step Finance's own disclosures: Step 1: Device Compromise The attacker gained access to executive team devices — plural — through what Step Finance euphemistically called "a well-known attack vector." Translation: social engineering. Most likely a targeted phishing email during APAC hours, when the team's guard was