Goldfinch User Wallet Drained via Malicious Token Approval Compromise
A compromised contract approval allowed an attacker to execute a `transferFrom` call, bypassing wallet security and draining user assets.
New EVM Chain Users Targeted by ERC-20 Log Spoofing Phishing Attack
The ERC-20 standard permits non-transferring contracts to emit fake logs, weaponizing block explorers for large-scale social engineering.
New Phishing-as-a-Service Drainer Targets Individual Crypto Wallet Users
The Eleven Drainer PhaaS threat leverages social engineering to bypass user security, tricking victims into signing unlimited token allowances and draining all assets.
Multi-Signature Wallet Drained by Sophisticated Phishing Attack via Disguised Approvals
Malicious contract approvals, disguised through legitimate interfaces, represent a critical bypass of multi-sig security, endangering user assets.
Multi-Sig Wallet Drained via Sophisticated Phishing Attack
A meticulously crafted phishing scheme exploited a multi-signature wallet, leveraging disguised approvals to siphon over $3 million in USDC from an unsuspecting investor.