State-Sponsored APT Groups Use InvisibleFerret Backdoor to Steal Digital Assets
The InvisibleFerret backdoor, coupled with zero-day exploitation, bypasses endpoint security to exfiltrate wallet data, posing an extreme systemic risk.
Malicious VS Code Extension Steals Developer Private Keys via Supply Chain Attack
The compromise of development environments through trojanized tooling weaponizes the software supply chain to exfiltrate critical private keys.
Malicious Wallet Extension Steals Seed Phrases via Covert Sui Microtransactions
A malicious browser extension covertly exfiltrates user seed phrases by encoding them into negligible Sui microtransactions, enabling silent, total asset compromise.
Threat Actor LARVA-208 Targets Web3 Developers via Fake AI Platform Malware
Sophisticated spearphishing campaign delivers the Fickle infostealer via malicious 'audio driver' download, compromising developer credentials and project supply chains.
User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
Truflation Treasury and Personal Wallets Compromised by Malware Attack
Malware compromised Truflation's operational wallets, exposing over $5 million to direct exfiltration and undermining trust in asset security.
North Korean Hackers Deploy BeaverTail Malware via Fake Crypto Job Offers
A sophisticated social engineering campaign leverages fake job opportunities to distribute advanced malware, directly compromising user credentials and crypto wallets.
Cryptocurrency Traders Targeted by ClickFix Malware Campaign
A sophisticated phishing campaign leverages "ClickFix" lures and compiled malware executables, posing an immediate risk of system compromise for cryptocurrency and retail sector personnel.
