Bedrock uniBTC Suffers $2 Million Exploit via Faulty Minting Logic
A critical minting logic flaw allowed attackers to exploit disparate asset valuations, compromising Bedrock's uniBTC collateral.
UXLINK Multi-Signature Wallet Compromised, $11.3 Million Drained, Tokens Minted
A `delegateCall` vulnerability in UXLINK's multi-signature wallet enabled unauthorized administrative control, leading to asset exfiltration and arbitrary token minting, underscoring critical smart contract design and access control failures.
UXLINK Multi-Signature Wallet Compromised, $11.3 Million and Tokens Drained
A critical `delegateCall` vulnerability in UXLINK's multi-signature wallet allowed unauthorized administrative control, enabling asset exfiltration and illicit token minting.
Moby Options Protocol Suffers Private Key Compromise, Millions Lost
A compromised administrative private key enabled unauthorized contract upgrades, leading to significant asset drain and highlighting critical key management failures.
Nemo Protocol Suffers $2.59 Million Exploit Due to Unaudited Code
A critical vulnerability stemming from unaudited code and single-signature deployment enabled a $2.59 million state manipulation attack on the Sui-based Nemo Protocol.
Abracadabra Finance Suffers $13 Million Flash Loan Liquidation Exploit
A critical smart contract vulnerability in Abracadabra's lending cauldrons allowed flash loan manipulation, enabling unauthorized liquidation profit extraction.
New Gold Protocol Suffers $2m Flash Loan Oracle Manipulation Exploit
A critical flaw in the protocol's price oracle and transfer logic enabled a flash loan attack, compromising $2 million and devaluing the NGP token by 88%.
Cetus Protocol on Sui Suffers $223 Million Arithmetic Overflow Exploit
An arithmetic overflow vulnerability in a third-party library allowed an attacker to manipulate asset calculations, leading to a catastrophic $223 million drain from the Cetus Protocol.
Shibarium Bridge Validators Compromised, Millions Drained in Exploit
A critical vulnerability in Shibarium's validator key management enabled attackers to manipulate the bridge, leading to significant asset exfiltration.
