ALEX Protocol Suffers $16.18 Million Access Control Exploit
A critical access control flaw in ALEX Protocol's vault system allowed an attacker to bypass validation and drain $16.18 million in assets.
New Gold Protocol Suffers $2 Million Flash Loan Oracle Manipulation
A single-source price oracle vulnerability, exploitable via flash loans, allowed an attacker to manipulate asset valuation and drain liquidity, jeopardizing user capital.
Kinto Ethereum L2 Suffers Counterfeit Token Exploit, Announces Shutdown
A critical smart contract loophole enabling unauthorized token minting led to a $1.55 million drain, forcing the protocol's imminent closure and underscoring the severe consequences of unaddressed vulnerabilities.
Radiant Capital Suffers $53 Million Access Control Exploit
A critical access control vulnerability allowed unauthorized operations, leading to a significant $53 million asset exfiltration from Radiant Capital.
Future Protocol Suffers $4.2 Million API Exploit
An API vulnerability allowed attackers to drain $4.2 million, highlighting critical risks in external service integrations and access control.
Lazarus Group Targets Venus Protocol, $13.5 Million Theft Recovered
A sophisticated phishing attack, attributed to an Advanced Persistent Threat group, attempted to drain $13.5 million from Venus Protocol, highlighting persistent social engineering risks.
Web3 Wallet Transaction Simulation Spoofing Drains User Funds
Attackers manipulate Web3 wallet transaction previews via time-delay exploits, enabling full wallet drains after user approval, a critical flaw in user-facing security.
Marginfi Protocol Secures $160 Million from Flash Loan Vulnerability
A critical collateral management flaw in Marginfi was responsibly disclosed, averting a $160 million flash loan exploit.
New Gold Protocol Suffers $2 Million Oracle Manipulation Exploit
A single-source price oracle vulnerability enabled a flash loan attack, compromising protocol integrity and user funds.
Evolving Crypto Scams Cost Users $25.4 Million in September
Evolving social engineering and technical attack vectors exploit user vigilance and smart contract weaknesses, leading to escalating financial losses.
User Wallet Drained by Phishing Permit Signature Exploit
Malicious permit signatures leveraging EIP-2612 enable off-chain asset drainage, posing a critical risk to DeFi users' staked and wrapped holdings.
THORChain Founder’s Personal Wallets Compromised via Social Engineering
A sophisticated social engineering attack leveraging compromised communication channels drained $1.35 million from a prominent founder's private wallets.
Numa Protocol Suffers $313k Exploit via NumaVault Manipulation
A critical vulnerability in Numa Protocol's NumaVault allowed malicious nuBTC minting, enabling attacker to liquidate user positions and drain funds.
DeFi Ecosystem Confronts Evolving Smart Contract Vulnerabilities and Systemic Risk
The pervasive reliance on complex smart contract logic and external data feeds introduces critical attack vectors, demanding a paradigm shift in security posture to mitigate multi-billion dollar exposures.
Balancer V2 Vault Vulnerability Risks Liquidity Manipulation
A critical flaw in Balancer V2's internal balance mechanism could allow unlaunched token manipulation, jeopardizing liquidity pools.
Shibarium Bridge Compromised by Validator Key Leak and Flash Loan
A critical compromise of Shibarium validator keys allowed a flash loan attack, enabling malicious state changes and draining $2.8 million in assets.
Zksync Airdrop Contract Admin Key Leak Leads to Unauthorized Minting
A compromised administrative key in a zkSync airdrop contract enabled unauthorized token minting, highlighting critical access control vulnerabilities.
Blockchain Ecosystems Face Evolving Smart Contract Vulnerabilities
Evolving smart contract vulnerabilities, from access control to oracle manipulation, expose digital assets to systemic exploitation, demanding adaptive security postures.
Unverified Contract Exploited Due to Access Control Vulnerability
A critical lapse in smart contract access control allowed an attacker to drain funds, exposing the systemic risk of unaudited code in DeFi.
DroseraNetwork Launches Security Protocol, Enhancing Web3 Ecosystem Resilience
DroseraNetwork's Traps system automates on-chain threat response, fundamentally enhancing dApp security and fostering trustless innovation across Web3 verticals.
Marginfi Protocol Safeguards $160 Million from Collateral Management Vulnerability
A critical flaw in Marginfi's collateral management function could have enabled unauthorized flash loans, exposing $160 million to manipulation.
Automated Formal Verification Secures Stellar DeFi Lending Protocols
A new automated formal verification tool, Certora Sunbeam Prover, mathematically guarantees the security of Stellar's Soroban smart contracts, mitigating critical DeFi vulnerabilities.
U.S. Exchange Breached via Outsourcing Firm Social Engineering
Sophisticated social engineering against third-party vendors exposes exchanges to supply chain attacks, enabling significant asset exfiltration.
Bedrock uniBTC Minting Vulnerability Exploited for $2 Million
A critical code flaw in Bedrock's uniBTC minting logic allowed attackers to arbitrage price discrepancies, leading to a significant asset drain.
Nemo Protocol Hacked via Developer’s Unaudited Code Deployment
A developer's unreviewed code introduced critical flash loan and query function flaws, enabling a $2.6 million state manipulation exploit.
Venus Protocol User Account Compromised via Social Engineering
A sophisticated social engineering attack leveraged a compromised Zoom client, granting delegate control over a Venus Protocol user's account and putting $13 million at risk.
Venus Protocol User Phished, $13.5 Million Funds Recovered
A sophisticated phishing attack targeting a high-value user's delegated account control highlights persistent social engineering risks within DeFi.
Munchables Developer Exploits Lock Contract, Drains $63 Million Ether
A compromised insider leveraged elevated contract privileges and storage manipulation to illicitly mint and withdraw substantial protocol assets.
Force Bridge Suffers $3.9 Million Private Key Compromise across Chains
Compromised private keys enabled unauthorized privileged function calls, draining multi-chain assets and exposing critical cross-chain bridge vulnerabilities.
