Malicious NPM Packages Hijack Developer Dependencies to Steal Crypto
Software supply chain integrity is compromised as cloaked malware in open-source dependencies redirects users to wallet-draining phishing sites.
Malicious NPM Packages Exploit Software Supply Chain to Steal User Crypto
A new npm supply chain attack leverages cloaking and fake CAPTCHAs for unauthenticated redirection, directly enabling user financial theft.
Aerodrome Velodrome DNS Hijacking Compromises User Token Approvals
Centralized DNS registrar vulnerability enabled front-end hijacking, exposing user wallets to malicious token approval transactions.
Aerodrome Finance Users Drained by Malicious Token Approvals via DNS Hijacking
Centralized domain registrar failure enabled DNS hijacking, compromising the front-end and tricking users into signing unlimited token approvals.
New Phishing-as-a-Service Group Targets Web3 Wallet Token Approvals
The emergence of Eleven Drainer professionalizes social engineering, weaponizing malicious `permit` and `approve` calls to systematically sweep user-approved assets.
Aerodrome and Velodrome Users Drained via Centralized DNS Hijacking Attack
Centralized domain registrar vulnerability enabled DNS hijacking, weaponizing the front-end to steal user token approvals.
Website Supply Chain Attack Drains User Wallets via Malicious Script
Third-party resource compromise injected a malicious JavaScript drainer, weaponizing a trusted front-end to steal user token approvals.
Balancer Users Drained via DNS Provider Social Engineering Attack
A third-party DNS provider compromise redirected users to a malicious front-end, enabling unauthorized token approvals and asset draining.
Phishing Airdrop Tricked Users into Malicious Token Approval Theft
Malicious airdrop claims weaponized token approvals, bypassing private key security to execute authorized asset draining across multiple chains.
