Web3 Users Compromised by AI-Aided Phishing Network Stealing Seed Phrases
The FreeDrain campaign leverages AI-generated content and search engine spamdexing to steal mnemonic phrases, bypassing traditional security controls at scale.
Private Key Holders Targeted by Automated Malware and Physical Coercion
Automated CaaS malware now bypasses local security, weaponizing phishing and physical coercion to compromise private keys at scale.
User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
