Onyx Protocol NFT Liquidation Contract Exploited, Draining $3.8 Million
A critical flaw in Onyx Protocol's NFT liquidation contract enabled vUSD stablecoin draining, highlighting risks in complex DeFi contract interactions.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
Onyx Protocol Suffers $3.8 Million Exploit via NFT Liquidation Contract
A critical flaw in Onyx Protocol's NFT liquidation contract enabled an attacker to drain $3.8 million, compromising stablecoin peg integrity.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
Phemex Hot Wallets Compromised, $85 Million in Crypto Drained
A breach of Phemex's hot wallets, likely through compromised private keys, allowed threat actors to drain over $85 million, underscoring critical centralized exchange vulnerability.
Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudited Code
A critical lapse in code review and governance allowed a developer to deploy unaudited smart contracts, creating an exploitable vector for significant asset drain.
Shibarium Bridge Compromised via Flash Loan and Validator Key Control
A flash loan exploit manipulated governance tokens to seize validator control, enabling unauthorized asset drainage from the Shibarium bridge.
Cetus Protocol on Sui Suffers $223 Million Arithmetic Overflow Exploit
An arithmetic overflow vulnerability in a third-party library allowed an attacker to manipulate asset calculations, leading to a catastrophic $223 million drain from the Cetus Protocol.
UXLINK Multi-Signature Wallet Compromised, $11.3 Million Drained, Tokens Minted
A `delegateCall` vulnerability in UXLINK's multi-signature wallet enabled unauthorized administrative control, leading to asset exfiltration and arbitrary token minting, underscoring critical smart contract design and access control failures.
