ALEX Protocol Suffers $8.3 Million Exploit via Self-Listing Logic Vulnerability
A critical flaw in self-listing verification logic enabled malicious token manipulation, bypassing controls to drain liquidity pools.
Shibarium Bridge Drained by Flash Loan and Validator Key Exploit
A sophisticated flash loan attack exploited Shibarium's validator key management, compromising network consensus and enabling significant asset exfiltration.
Nemo Protocol Suffers $2.6 Million Exploit from Unaudited Code
A publicly exposed flash loan function and state-modifying query vulnerability allowed unauthorized asset drainage, posing a critical risk to protocol integrity.
Nemo Protocol Developer Deployed Unaudited Code, Enabling $2.6m Exploit
An unaudited code deployment enabled a flash loan and state manipulation attack, compromising Nemo Protocol and jeopardizing user assets.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Multi-Sig Wallet Drained via Sophisticated Phishing Attack
A meticulously crafted phishing scheme exploited a multi-signature wallet, leveraging disguised approvals to siphon over $3 million in USDC from an unsuspecting investor.
Shibarium Bridge Suffers Flash Loan Validator Key Compromise
A flash loan attack manipulated Shibarium's validator consensus, enabling unauthorized asset siphoning and exposing critical governance vulnerabilities.
Shibarium Bridge Compromised via Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's Layer 2 bridge allowed attackers to exploit governance token mechanics, enabling unauthorized validator control and asset exfiltration.
Multi-Sig Wallet Drained by Sophisticated Phishing Attack
A cunning phishing attack exploited a multi-signature wallet, leading to the unauthorized transfer of assets by disguising malicious approvals.
