Solana Wet Presale Hijacked By Sybil Wallets As Humidifi Resets Launch

Solana Wet Presale Hijacked By Sybil Wallets As Humidifi Resets Launch

Bubblemaps CEO Nick Vaiman said Sybil attacks are increasing across presales and airdrops, calling on teams to use KYC or algorithmic detection.

A Solana presale event encountered distribution issues after a bot farm reportedly used over 1,000 wallets to snipe nearly the entire Wet (WET) token sale in seconds.

Hosted through the decentralized exchange aggregator Jupiter, the presale sold out almost instantly. But genuine buyers effectively had no chance to participate because a single actor dominated the presale, according to organizers.

Solana automated market maker (AMM) HumidiFi, the team behind the presale, confirmed the attack and scrapped the launch entirely. The team said it would create a new token and hold an airdrop to legitimate participants while explicitly excluding the sniper.

“We are creating a new token. All Wetlist and JUP staker buyers will receive a pro-rata airdrop. The sniper is not getting shit,” HumidiFi wrote. “We will do a new public sale on Monday.”

On Friday, the blockchain analytics platform Bubblemaps announced that it had identified the entity behind the presale attack, having observed unusual wallet clustering during the token sale.

In an X thread, the company reported that at least 1,100 out of the 1,530 participating wallets displayed identical funding and activity patterns, suggesting that a single actor controlled them.

Bubblemaps CEO Nick Vaiman told Cointelegraph that their team analyzed presale participants using their platform and saw patterns, including new wallets with no prior onchain activity, all being funded by a handful of wallets.

These also received funding in a tight time window with similar Solana (SOL) token amounts.

“Despite some of the clusters not connected together onchain, the behavioral similarities in size, time, and funding all point to a single entity,” Vaiman told Cointelegraph.

Source: CoinTelegraph