Centralized Stablecoin Bank Drained $50 Million via Private Key Compromise
A compromised private key facilitated the exfiltration of $49.5 million in USDC, exposing critical failures in centralized key management.
CoinDCX Operational Hot Wallet Compromised, $44 Million Drained via Infrastructure Exploit
The exploitation of backend infrastructure vulnerabilities and hot wallet operational controls represents a critical failure in asset segmentation and access management, exposing substantial liquidity to unauthorized exfiltration.
UXLINK Multi-Signature Wallet Exploited via Delegatecall Vulnerability
A critical `delegatecall` flaw in UXLINK's multi-signature wallet granted unauthorized administrative access, enabling massive token minting and asset exfiltration.
ALEX Protocol Suffers $8.3 Million Exploit via Malicious Token Verification Flaw
A critical vulnerability in token self-listing verification logic allowed an attacker to manipulate permissions, enabling unauthorized vault access and asset exfiltration.
UXLINK Multi-Signature Wallet Compromised, Enabling Unauthorized Token Minting
A delegate call vulnerability within a multi-signature wallet granted administrative control, allowing unauthorized asset transfers and limitless token minting.
UXLINK Multi-Signature Wallet Compromised via Delegate Call Vulnerability
A critical delegate call flaw in UXLINK's multi-sig wallet granted unauthorized administrative control, enabling significant asset exfiltration.
UXLINK Multi-Signature Wallet Compromised, Billions of Tokens Minted
A delegate call vulnerability in UXLINK's multi-signature wallet granted administrative control, enabling unauthorized token minting and significant financial loss.
Truflation Treasury and Personal Wallets Compromised by Malware Attack
Malware compromised Truflation's operational wallets, exposing over $5 million to direct exfiltration and undermining trust in asset security.
Shibarium Bridge Validators Compromised, $2.8 Million Drained in Exploit
A critical compromise of Shibarium bridge validator keys enabled malicious transactions, exposing the Layer 2 network to significant asset exfiltration.