Website Supply Chain Attack Drains User Wallets via Malicious Script
Third-party resource compromise injected a malicious JavaScript drainer, weaponizing a trusted front-end to steal user token approvals.