Security

[REDACTED] Hackathon - Tracking Money Laundering on Solana

We're sponsoring a bounty to map the laundering routes in Solana. Help us understand how attackers think and keep defenders one step ahead.

Syed C, Range

[REDACTED] Hackathon - Tracking Money Laundering on Solana
[REDACTED] Hackathon - Tracking Money Laundering on Solana

At Range, we believe better intelligence isn’t just about tools – it’s about action. That’s why we’re proud to sponsor a $15,000 bounty track at the [REDACTED] hackathon hosted by Helius, focused on tracking and exposing money laundering pathways in the Solana ecosystem.

This isn’t just another hackathon bounty. It’s an opportunity to surface a growing blind spot in onchain security: the laundering layer. And it’s a chance for Range – and the community – to push forward visibility, accountability, and observability across one of the most performant blockchains in the industry.

The Solana ecosystem stands out for its deep liquidity, low fees, and robust infrastructure – attributes that make it attractive to builders and users, as well as to attackers and exploiters.

In February 2025, Bybit suffered a $1.44 billion theft - the largest in the history of all thefts, onchain or offchain. The exploit and its subsequent activity revealed how sophisticated crypto laundering operations have become. The attacker used:

  • Over 20,000 wallets

  • Multiple mixers, cross-chain bridges and protocols

  • Dozens of asset swaps

  • They even brought some stolen funds into Solana to obfuscate and move value.

It was a familiar pattern: bridge, swap, route, repeat. Millions moved with zero resistance. While some of the funds were eventually frozen, the attack made one thing clear: laundering is fast, complex, and often invisible – until it’s too late.

This got us thinking: how could malicious actors use the Solana ecosystem to launder funds?

Focus of our bounty: Exfiltration Phase of an exploit

Almost all web3 exploits follow a four-phase lifecycle:

  • Funding – Initial capital for the attack

  • Preparation – Deploying malicious contracts or infrastructure

  • Execution – The actual exploit

  • Exfiltration – Laundering and off-ramping the stolen funds

Our bounty focuses on Step 4: Exfiltration – the phase where funds are moved, swapped, and routed through increasingly complex paths to avoid detection and escape security controls.

The goal? Map the laundering surface of Solana. Understand how attackers think, and help defenders get one step ahead.

How does this bounty help Solana

Money laundering in web3 is still a huge problem.

Exploits are getting more sophisticated, but the tools for tracing and detecting malicious flows often lag. While we've made great strides in infrastructure, speed, and UX, observability and intelligence are still underbuilt across most chains.

With its performance and growing adoption, Solana is a prime target – not just for new app developers, but for attackers too. Two things were clear in the aftermath of the Bybit hack: exploiters will use complex trails to launder funds through multiple protocols, and many protocols that wanted to stop their platform from being used for laundering just did not have enough time to act. 

Our team at Range has already built tools to track these movements. Range Trail, our onchain forensics and intelligence engine, helps teams analyze cross-chain flows, cluster addresses, and trace compromised funds. 

Going beyond forensic analysis, we want to be proactive in helping teams flag possible malicious routes and patterns so that they can implement in-protocol safeguards before the need arises. 

So we are calling on all parts of the Solana community - builders, researchers and onchain sleuths - help us identify laundering routes and keep Solana crime-free!

What we are expecting

We’ll be judging submissions both quantitatively and qualitatively. We’re looking for: 

  • A report documenting investigation methodology and results

  • A list of assets (SOL and non-SOL) with high liquidity and no freeze authority that malicious actors may use to launder funds

  • A labeled dataset of wallets, protocols, and off-ramps used for laundering. These could be everything from CEXs, OTC desks, Custodial Swappers, Fintech Apps, Off-Ramps, Bridges, Mixers and DEXs

While we are hoping for a long list of laundering routes and wallet addresses of those platforms that could be tracked onchain, we are hoping to uncover some novel routes that security researchers are not usually monitoring.

The goal isn't to catch every laundering case perfectly, but to push the tooling and intelligence forward. Learn more about the bounty and submit – War Games: Money Laundering in Solana

Our broader commitment to security in Solana 

This bounty is part of our larger commitment to strengthening Solana’s security infrastructure.

Over the last year, we’ve partnered with the Solana Foundation and Squads Protocol to bring full-stack monitoring and intelligence to the ecosystem. Our capabilities include:

Shape the Solana intelligence layer

Security doesn’t improve automatically. It improves because people – developers, analysts, founders – decide to build better tools, surface harder problems, and share what they find.

Range builds intelligence and security infrastructure for some of the most important ecosystems in web3, including Solana. Our tools help teams monitor multisigs, screen wallets, and investigate hacks. But intelligence is only as good as the people contributing to it.

Whether you're a security researcher, a builder, or an analyst, this is your chance to shape the intelligence layer of Solana.

Get started on the Solana [REDACTED] hackathon →

The blockchain security and intelligence platform

Helping the best teams build and use DeFi protocols, blockchains, rollups, and cross-chain bridges with peace of mind.

Get in touch

Areas of interest*

The blockchain security and intelligence platform

Helping the best teams build and use DeFi protocols, blockchains, rollups, and cross-chain bridges with peace of mind.

Get in touch

Areas of interest*

The blockchain security and intelligence platform

Helping the best teams build and use DeFi protocols, blockchains, rollups, and cross-chain bridges with peace of mind.

Get in touch

Areas of interest*

The blockchain security and intelligence platform. Featuring a comprehensive security and risk management suite powered by machine learning and security expertise.

Resources

The blockchain security and intelligence platform. Featuring a comprehensive security and risk management suite powered by machine learning and security expertise.

Resources

The blockchain security and intelligence platform. Featuring a comprehensive security and risk management suite powered by machine learning and security expertise.

Resources