The Step Finance decentralized finance analysis and management platform confirmed at the end of January that it was the victim of an attack that cost it tens of millions in digital assets. According to the company, the attackers accessed devices belonging to the executive team and from there they committed several portfolios of the treasure, a tactic that, although not always publicly detailed, fits with attack vectors seen in other incidents of the critical ecosystem.
Step detected the gap on 31 January and, barely confirmed the intrusion, activated cyber security investigators and notified the authorities. In a first balance sheet, external firms such as CertiK estimated that the funds stolen amounted to SOL 261,854 - a figure that at that time was valued at about $28.9 million - although Step itself subsequently expanded that estimate to a $40 million. The initial communication of Step and the follow-up to CertiK are available in its public publications: Step's release and CertiK's notice. Later, Step updated its calculation here: Step update.

Part of the money was recovered thanks to collaboration with partners and active protections in the platform infrastructure. Step indicated that about $3.7 million in Remora-related assets and approximately $1 million in other positions could be recovered through coordinated actions, taking advantage of chain tracing and locking mechanisms. He also noted that Remora Markets - a product that belongs to Step - was isolated from the incident and that rTokens are supported 1: 1.
What this means for users. Step expressly requested that users do not interact with the native STEP token while continuing the investigation. The platform also announced that it will take a snapshot from the pre-explosion state to prepare a solution for the holders of STEP. In practice, this means that Step aims to preserve an immutable picture of the state of accounts before the attack to assess compensation or restorative measures, although the final details have not yet been realized.
The company has not disclosed all the technical details of the attack and has not publicly identified those responsible, and this opacity has fueled speculation about the possibility of a "rug pull" or an internal failure. It is important to stress that, so far, such suspicions have not been proven and that forensic investigations into such incidents require time and access to sensitive information that companies cannot always or should make public immediately.
Contextualizing the coup: the 40 million Step are significant, but they are part of a larger picture of losses for crypto cybercrime. CertiK, which monitors security incidents in lockchain, reported losses of almost $398 million only in January - with a partial recovery of about 4.366 million - and recalled that 2025 accumulated 147 hacks confirmed by about 2.87 billion in losses, while 2022 remains the year with the highest recorded figure so far. This data is available on CertiK public channels: Summary of losses and on your corporate page certik.com.
From a technical and security point of view, the step incident again shows several known but often forgotten lessons in the critical sector. The blockchain ecosystem is public and traceable, which facilitates tracking of fund flows, but also depends to a large extent on the safe management of private keys and sound governance practices in teams that control treasury and smart contracts. When personal devices or administrative keys are compromised, attackers can move assets quickly and disperse them through multiple directions in search of jumps to exchangers or mixers.
For users and projects, it is appropriate to strengthen basic but effective measures: to segregate cash funds from cash in portfolios with multiple-signature controls, to use cold storage for significant reserves, to implement strict credentials and access management policies, and to use independent audits and custody providers where appropriate. In the case of Step, coordination with forensic blockchain specialists and ecosystem partners made it possible to recover some of the funds; however, full recovery in such incidents is not guaranteed and is often dependent on the speed of response and cooperation of exchanges and other intermediaries.

If you use the platform or have related tokens, a prudent recommendation is to avoid interactions with associated contracts or markets until Step publishes a more detailed forensic report and clear mitigation measures. It is also good practice to revoke unnecessary approvals from personal portfolios, check unusual activity in your directions with block scouts and, if you maintain relevant amounts, consider migrating them to custody solutions with better security controls.
Step keeps your site and official channels for updates; the platform's main page is available here: step.finance. Meanwhile, the signs of the incident and its fit in the wave of attacks on critical projects recall that, despite improvements in tools and audits, operational safety and digital hygiene remain the weakest link in many cases.
In a sector where transparency and confidence are almost everything, how Step documents intrusion and acts on user claims will be crucial to regain credibility. The eyes of the ecosystem are placed in research and corrective measures; until then, the recommendation is to be informed through official channels and to take precautions in any interaction with related assets.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...