Summary
Cashio was a Solana-based algorithmic stablecoin protocol that allowed users to mint $CASH tokens backed by Saber USD liquidity provider (LP) tokens. On March 23, 2022, an unidentified attacker exploited a critical missing validation in the smart contract's collateral verification logic, minting approximately 2 billion unbacked $CASH tokens and draining roughly $52 million from the protocol's liquidity pools. The $CASH token collapsed from its $1 peg to near zero, permanently ending the protocol.
No evidence submitted yet — be the first.
Editorial decisions, corrections, and updates are anchored on Solana.
Protocol Overview
Cashio was a decentralized stablecoin application built on the Solana blockchain, developed under the pseudonym '0xGhostchain.' The protocol allowed users to deposit Saber USD liquidity provider (LP) tokens as collateral in exchange for minting $CASH, a US dollar-pegged stablecoin. Collateral was routed through the Arrow Protocol, a Solana-based yield-bearing token wrapper, and held in Saber liquidity pools containing stablecoin pairs such as USDC-USDT. The design was intended to maintain the $CASH peg through the value of the underlying LP token collateral. Cashio launched on Solana mainnet and, prior to the March 2022 exploit, held approximately $28–52 million in total value locked (TVL). The protocol was never subjected to a third-party smart contract security audit.
- [1]MEDExplained: The Cashio Hack (March 2022) - Halbornresearch
- [2]MED2022 Solana Hacks Explained: Cashio - Ackee Blockchainresearch
- [3]MEDCashio App Incident Analysis - CertiKresearch
The Exploit (March 23, 2022)
At approximately 08:15 UTC on March 23, 2022, an unknown attacker began exploiting Cashio's minter contract. The exploit was made possible by two missing validation checks in the collateral deposit logic. First, the contract validated that the token type matched the saber_swap.arrow account, but critically did not validate the .mint field within that account. Second, the depositor_source parameter was never verified to ensure consistency with collateral requirements. These two omissions allowed the attacker to construct a chain of entirely fake accounts — a counterfeit Arrow protocol account, a fake Saber LP token, and a fraudulent collateral vault — that passed all existing checks because each fraudulent account was only compared against the other fraudulent accounts in the chain rather than any legitimate contract reference. The attacker interacted with the Arrow program's deposit_vendor() function to deposit 2,000,000,000 counterfeit LP tokens and used these to mint an equal quantity of $CASH tokens. These unbacked tokens were then swapped for legitimate stablecoins across Cashio's liquidity pools: the attacker obtained approximately $16.4 million in USDC and $10.8 million in USDT via LP token redemptions, and an additional $17 million in USDC and $8.6 million in UST through secondary swaps — totaling approximately $52 million in stolen assets. The $CASH token's price collapsed from $1.00 to $0.00005 within hours, effectively wiping out all liquidity providers. Cashio developer 0xGhostchain issued a public warning on Twitter at 09:59 UTC — roughly 1 hour and 44 minutes after the attack began — urging users not to mint $CASH and to withdraw funds from pools.
- [1]HIGHStablecoin Cashio Suffers 'Infinite Glitch' Exploit - CoinDesknews article
- [2]HIGHStablecoin Cashio on Solana exploited for $52.8 million - The Blocknews article
- [3]MEDCashio - REKTresearch
- [4]MEDExplained: The Cashio Hack (March 2022) - Halbornresearch
Technical Breakdown: Fake Account Chain
The attack exploited Solana's account-based programming model, in which programs must explicitly validate the legitimacy of accounts passed as input. Cashio's minter contract performed numerous validation checks but was missing two critical ones. The contract's crate_collateral_tokens function confirmed that token types matched the saber_swap.arrow account, but omitted any check on the .mint field of that account. This meant an attacker could supply a self-referential chain of counterfeit accounts: (1) a fake bank initialized with a worthless token mint; (2) a fake Arrow protocol account (saber_swap.arrow) pointing to the fake bank; (3) a fake Saber LP token; and (4) a counterfeit Sunny/Saber vault. Because each fake account only needed to be internally consistent with the other fake accounts — not with any on-chain program-derived address or legitimate reference — all validation checks passed. The attacker called deposit_vendor() on the Arrow program with 2 billion fake LP tokens, receiving 2 billion fake collateral tokens in return. These fake collateral tokens were then passed to the print_cash instruction, which minted 2 billion real $CASH tokens. The attacker then used those real $CASH tokens to drain the genuine USDC and USDT in Cashio's Saber liquidity pools. The root cause was the absence of a verification that the bank's token and the ultimately minted CASH token were related to a legitimate, program-derived collateral chain — a check that an independent security audit would likely have identified.
- [1]MEDCashio App Incident Analysis - CertiKresearch
- [2]MED2022 Solana Hacks Explained: Cashio - Ackee Blockchainresearch
- [3]MEDExplained: The Cashio Hack (March 2022) - Halbornresearch
- [4]MEDMar 2022 - Cashio App Solana Fake Account Exploit - Quadriga Initiativeresearch
Scale of Damage
The exploit resulted in the theft of approximately $52 million in stablecoins. The attacker obtained roughly $16.4 million in USDC and $10.8 million in USDT from LP token swaps on Saber, and an additional $17 million in USDC and $8.6 million in UST from secondary swaps. The $CASH token depegged instantly, falling from $1.00 to $0.00005 — a near-total loss for all holders. Cashio's total value locked (TVL) dropped from approximately $28–29 million to under $600,000 within hours of the attack. All liquidity providers who had deposited stablecoins into Cashio's Saber pools were effectively wiped out. Roughly $25 million of the stolen funds remained unrecovered as of mid-2022, per CertiK's incident analysis. The protocol never resumed operations after the exploit.
- [1]MEDSolana Stablecoin Project Cashio Plummets to Zero After Hack - Decryptnews article
- [2]MEDCashio App Incident Analysis - CertiKresearch
- [3]MEDThe Cashio Hack: Lessons from a $48 Million DeFi Exploit - Vidmaresearch
Fund Movement and Alleged Laundering
After draining the Cashio liquidity pools on Solana, the attacker bridged the stolen stablecoins to Ethereum using Jupiter (a Solana liquidity aggregator) and the Wormhole cross-chain bridge. Approximately $15.3 million in USDC and USDT were moved from Solana to Ethereum in three transactions. Once on Ethereum, the attacker converted the stablecoins to Ether (ETH), ultimately accumulating over 16,000 ETH. According to on-chain data from Etherscan, the attacker subsequently transferred 1,610 ETH to an Ethereum mixer service across 17 transactions — all but one consisting of 100 ETH each — in an alleged effort to obscure the funds' origin and destination. The majority of the approximately $52 million in stolen funds was never returned or recovered.
- [1]MEDCashio - REKTresearch
- [2]MEDSolana Cashio Hack Loots $52.8M - Yahoo Financenews article
- [3]MEDDecoding the if, but, and so of Cashio Hack - AMBCryptonews article
The Attacker's On-Chain Messages and Alleged Partial Returns
Approximately three hours after the exploit began, the attacker embedded a message in the input data of an Ethereum transaction stating: 'Account with less 100k have been returned. all other money will be donated to charity.' On-chain records showed hundreds of small USDC transactions distributed to addresses that had lost less than $100,000 in the attack, consistent with the attacker's stated intention. In a subsequent message sent on approximately March 28, 2022, the attacker announced a further change of stance: victims who had lost more than $100,000 would also have the opportunity to receive a refund by submitting an application. The message stated: 'The inntention [sic] was only to take money from those who do not need it, not from those who do.' It is unclear from available sources how much was actually returned to larger claimants or whether any charitable donations were made. The attacker was never publicly identified, and no arrests or criminal charges related to the Cashio hack have been reported as of the time of this investigation.
- [1]MEDRobin Hood-esque attacker steals $52M from Cashio - Web3 Is Going Greatnews article
- [2]MEDCrypto Robin Hood stole $50 million and says he'll donate to charity - Fortunenews article
- [3]MEDCashio Hacker Asks Affected Users to State Their Case - BeInCryptonews article
- [4]MEDCrypto hacker says victims can get their money back if they plead their case - Fortunenews article
Developer Response
The Cashio protocol was developed pseudonymously under the handle '0xGhostchain.' Following the exploit, 0xGhostchain posted on Twitter warning users not to mint any $CASH, stating that the team was investigating the root cause and urging liquidity providers to withdraw their funds from pools. The developer indicated that a postmortem would be published. A post-incident statement regarding the impact on Saber and its users was published on or around March 28, 2022. The Cashio protocol did not resume normal operations following the exploit. No formal recovery or relaunch plan was executed, and the protocol is considered permanently collapsed.
Saber and Sunny Aggregator Connection
Cashio was deeply integrated with Saber, a Solana-based stablecoin automated market maker (AMM), and Sunny Aggregator, a yield optimization layer built on top of Saber. $CASH was minted against Saber USD LP tokens, meaning the exploit directly drained Saber's USDC-USDT and other liquidity pools. Both Saber and Sunny Aggregator were built by Ian Macalinao (also known as 'iMac' or 'Surya Khosla') and his brother Dylan Macalinao of Saber Labs. A CoinDesk investigation published in August 2022 revealed that Ian Macalinao had secretly built Cashio, along with more than a dozen other protocols in the Saber ecosystem, using 11 different pseudonymous developer identities — including 'kiwipepper' (Crate), 'oliver_code' (Arrow), and 'Larry Jarry' (Quarry). These interlocking protocols were designed so that a single dollar of collateral would be counted multiple times across each protocol layer, artificially inflating Solana's reported TVL. At peak, Saber and Sunny together accounted for approximately $7.5 billion of Solana's $10.5 billion TVL, much of which was the result of this double- and triple-counting scheme.
Ian Macalinao Pseudonym Scandal and DOJ Investigation
CoinDesk's August 2022 investigation revealed that Ian Macalinao operated at least 11 pseudonymous developer identities to build an interlocking web of Solana DeFi protocols that each used the outputs of the prior one as inputs — inflating TVL metrics by counting the same underlying dollar multiple times. Ian wrote in a then-unpublished blog post: 'I devised a scheme to maximize Solana's TVL: I would build protocols that stack on top of each other, such that a dollar could be counted several times.' Among the projects secretly attributed to Ian were Cashio (via pseudonymous contributions), Arrow Protocol, Crate, and Quarry, in addition to Saber and Sunny. In January 2023, CoinDesk reported that the U.S. Department of Justice had opened an investigation into Ian and Dylan Macalinao in connection with these Solana-based DeFi and stablecoin projects, including Cashio. The DOJ was reported to be seeking information on the web of projects that orbited Saber. The Macalinao brothers subsequently withdrew from Protagonist VC, the crypto venture-capital firm they had co-founded, and transferred control of some pseudonymously built protocols to Marinade, another Solana DeFi protocol. No charges had been publicly filed as of the time of this investigation.
- [1]HIGHJustice Department Probing Saber Labs Founders Over Solana-Based Projects - CoinDeskregulatory
- [2]HIGHMaster of Anons: How a Crypto Developer Faked a DeFi Ecosystem - CoinDesknews article
- [3]MEDIan Macalinao Revealed to Have Pumped Solana TVL - Web3 Is Going Greatnews article
- [4]MEDBrothers Behind Solana Saber Labs Under DOJ Investigation - Tron Weeklynews article
Impact on Solana DeFi
The Cashio exploit occurred during a period of broader stress for Solana's DeFi ecosystem, and contributed to eroding confidence in Solana-native protocols. The revelation that Saber's TVL had been artificially inflated through double-counting across Ian Macalinao's pseudonymous protocol stack — with Cashio itself being one node in that stack — raised systemic concerns about the reliability of Solana TVL figures and the ecosystem's apparent depth. The exploit also highlighted the specific risks of unaudited smart contracts on Solana, where account validation must be performed manually by developers rather than enforced at the runtime level. Multiple security researchers cited the Cashio hack as a reference case for the importance of input account validation in Solana programs. The incident contributed to a broader reassessment of Solana DeFi's actual health during 2022, a year that also saw FTX's collapse further damage confidence in the Solana ecosystem.
- [1]MED2022 Solana Hacks Explained: Cashio - Ackee Blockchainresearch
- [2]MEDThe Cashio Hack: Lessons from a $48 Million DeFi Exploit - Vidmaresearch
- [3]MEDTop Ten DeFi Hacks of 2022 - BeInCryptonews article
Red Flags and Security Lessons
Several pre-existing red flags were present before the Cashio exploit occurred. The protocol was never independently audited — a critical omission for a stablecoin protocol holding tens of millions of dollars. The protocol's collateral validation logic was incomplete, failing to verify the .mint field of Arrow accounts or to confirm that the depositor_source was consistent with legitimate collateral. The protocol was pseudonymously developed with no public team identity beyond '0xGhostchain.' After the exploit, the broader context revealed that Cashio was embedded in an ecosystem of interlocking protocols built by a single developer using multiple false identities — a fact not publicly known at the time of the exploit. The lack of transparency about the protocol's authorship, the absence of an audit, and the reliance on a complex multi-protocol collateral chain (Saber LP tokens routed through Arrow) all represented material risks that users could not fully assess. The exploit is widely cited in Solana security literature as a canonical example of account validation failures in Anchor-based Solana programs.
- [1]MEDExplained: The Cashio Hack (March 2022) - Halbornresearch
- [2]MEDCashio App Incident Analysis - CertiKresearch
- [3]MED2022 Solana Hacks Explained: Cashio - Ackee Blockchainresearch
Timeline
2022-01-01
Cashio protocol operates on Solana mainnet, accepting Saber LP tokens as collateral for minting $CASH stablecoin. No third-party audit is commissioned.
Ackee Blockchain / CertiK2022-03-23
At approximately 08:15 UTC, an unknown attacker begins exploiting Cashio's missing collateral validation, minting approximately 2 billion unbacked $CASH tokens and draining roughly $52 million from Saber liquidity pools.
CoinDesk2022-03-23
Cashio developer 0xGhostchain issues a Twitter warning at 09:59 UTC urging users not to mint $CASH and to withdraw from pools. The $CASH token collapses from $1.00 to $0.00005.
Decrypt / The Block2022-03-23
Attacker bridges stolen stablecoins from Solana to Ethereum via Jupiter and Wormhole, converting proceeds to over 16,000 ETH. Approximately 1,610 ETH is subsequently sent through a mixer across 17 transactions.
REKT News / AMBCrypto2022-03-23
Attacker embeds an on-chain message in an Ethereum transaction: 'Account with less 100k have been returned. all other money will be donated to charity.' Hundreds of small USDC distributions are sent to affected addresses.
Web3 Is Going Great / Fortune2022-03-28
Cashio team publishes a statement regarding the vulnerability's impact on Saber users. Protocol does not resume operations.
Solana News Today2022-03-28
Attacker sends a second on-chain message indicating that victims who lost more than $100,000 may also apply for a refund.
Fortune / BeInCrypto2022-08-04
CoinDesk publishes an investigation revealing that Ian Macalinao built Cashio, Saber, Sunny Aggregator, and more than a dozen other Solana protocols under 11 pseudonymous identities, artificially inflating Solana's TVL by billions of dollars.
CoinDesk2023-01-11
CoinDesk reports that the U.S. Department of Justice has opened an investigation into Saber Labs founders Ian and Dylan Macalinao, with Cashio listed among the projects under scrutiny.
CoinDeskResearch Gaps
5 open · agent-resolvableHeuristic next-actions surfaced for researchers and worker agents. Resolving these strengthens the page's evidence base and trust score.
- [high]no addresses
No on-chain addresses cited. Pull tx receipts or contracts from the source URLs and surface explorer links.
- [high]no regulatory
No regulatory or sanctions cross-check. Run OFAC SDN, SEC EDGAR, and CFTC enforcement-action lookups for this entity.
- [med]single source
Only one source has reported on this entity. Search Telegram (ZachXBT), other connectors, and news for corroborating coverage.
- [med]unarchived sources
Cited sources are not Wayback-archived. Run the archiver to pin their content before they rot.
- [low]weak evidence
Page has thin evidence. Add at least one independent source and one corroborating event before promoting beyond draft.
This investigation is cryptographically anchored to the Solana blockchain and source URLs are archived via the Internet Archive. Full audit log →
model: claude-code-investigator
generated: 5/4/2026, 2:54:50 AM
last updated: 5/7/2026, 4:36:45 PM
avoid.net — verified advice for a post-truth world