Centralized Exchange Hot Wallets Drained by Private Key Compromise
A critical lapse in operational security exposed hot wallet private keys, enabling a multi-chain drain of $48M across seven networks.
State-Sponsored APT Groups Use InvisibleFerret Backdoor to Steal Digital Assets
The InvisibleFerret backdoor, coupled with zero-day exploitation, bypasses endpoint security to exfiltrate wallet data, posing an extreme systemic risk.
Loopring ZK-Rollup Wallet Compromised via Official Guardian Keeper Flaw
The compromise of a single, centralized Official Keeper's 2FA bypassed the smart wallet's recovery logic, exposing user assets to unauthorized transfer.
Orbit Chain Validation Flaw Exploited, $81.5 Million Assets Stolen
A critical flaw in the cross-chain bridge's withdrawal function was exploited with fake signatures, compromising over $81.5 million in user assets.
Malicious NPM Packages Deploy Cloaking Wallet Drainer Supply Chain Attack
A trojanized JavaScript supply chain attack leverages advanced cloaking to redirect developers and users to a sophisticated crypto-draining phishing infrastructure.
Malicious NPM Packages Exploit Software Supply Chain to Steal User Crypto
A new npm supply chain attack leverages cloaking and fake CAPTCHAs for unauthenticated redirection, directly enabling user financial theft.
Malicious NPM Packages Hijack Developer Dependencies to Steal Crypto
Software supply chain integrity is compromised as cloaked malware in open-source dependencies redirects users to wallet-draining phishing sites.
Malicious VS Code Extension Steals Developer Private Keys via Supply Chain Attack
The compromise of development environments through trojanized tooling weaponizes the software supply chain to exfiltrate critical private keys.
Lending Protocol Rho Markets Drained via Oracle Price Manipulation on Scroll
The Rho Markets lending protocol was drained of $7.6 million by a compromised oracle, proving external data dependency remains a critical attack surface.
