Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudited Code
A critical lapse in code review and governance allowed a developer to deploy unaudited smart contracts, creating an exploitable vector for significant asset drain.
MYX Finance Airdrop Exploited by Sybil Attack, $170 Million Siphoned
A Sybil attack on MYX Finance's airdrop mechanism allowed coordinated entities to exploit distribution, highlighting critical gaps in anti-fraud measures.
MYX Finance Airdrop Exploited by Sybil Attackers for $200 Million
Airdrop distribution mechanisms, vulnerable to Sybil attacks, enable coordinated entities to disproportionately claim token rewards, posing significant market integrity and fairness risks.
New Gold Protocol Drained by Flash Loan Oracle Manipulation
Single-source oracle reliance in DeFi protocols creates critical price manipulation vectors, exposing users to immediate asset devaluation and loss.
Arcadia Finance Suffers $3.5 Million Input Validation Exploit
A critical input validation flaw in Arcadia Finance's rebalance function allowed an attacker to drain $3.5 million in liquidity.
THORChain Founder’s Personal Wallets Compromised via Social Engineering
A sophisticated social engineering attack leveraging compromised communication channels drained $1.35 million from a prominent founder's private wallets.
Numa Protocol Suffers $313k Exploit via NumaVault Manipulation
A critical vulnerability in Numa Protocol's NumaVault allowed malicious nuBTC minting, enabling attacker to liquidate user positions and drain funds.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
Kinto Ethereum L2 Suffers Reentrancy Exploit, Loses $15 Million USDC
A reentrancy vulnerability in Kinto's minting contract allowed attackers to siphon $15 million in USDC, exposing critical L2 smart contract design flaws.
Onyx Protocol Suffers $3.8 Million Exploit via NFT Liquidation Contract
A critical flaw in Onyx Protocol's NFT liquidation contract enabled an attacker to drain $3.8 million, compromising stablecoin peg integrity.
Abracadabra Suffers $13 Million Flash Loan Exploit via State Tracking Error
A critical state tracking error within Abracadabra's GMX-integrated cauldrons allowed a flash loan attack to manipulate liquidation logic, leading to significant asset drain.
Safe Wallet User Drained by Malicious Request Finance Contract Impersonation
A sophisticated contract impersonation attack leveraged near-identical addresses to trick a Safe multi-sig wallet user into unknowingly approving a malicious batch transaction, resulting in a $3 million fund loss.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
Abracadabra Suffers $13 Million Exploit via GMX Integration Vulnerability
A critical state tracking error within Abracadabra's GMX-integrated lending cauldrons enabled a flash loan attack, compromising $13 million in user funds.
Truflation Wallets Compromised in $5 Million Malware Attack
Malware compromised Truflation's operational security, enabling unauthorized access to treasury and personal funds, highlighting critical risks in key management.
Bedrock uniBTC Mint Function Exploited, $2 Million Drained
A critical flaw in Bedrock's uniBTC minting logic allowed attackers to bypass price validation, enabling disproportionate token creation and liquidity drainage.
Bedrock uniBTC Minting Vulnerability Exploited for $2 Million
A critical code flaw in Bedrock's uniBTC minting logic allowed attackers to arbitrage price discrepancies, leading to a significant asset drain.
Onyx Protocol NFT Liquidation Contract Exploited, Draining $3.8 Million
A critical flaw in Onyx Protocol's NFT liquidation contract enabled vUSD stablecoin draining, highlighting risks in complex DeFi contract interactions.
Shibarium Network Suffers $2.4 Million Flash Loan Validator Key Exploit
A flash loan attack manipulated governance tokens to seize validator control, exposing critical Layer 2 consensus vulnerabilities.
Shibarium Bridge Suffers $2.4 Million Flash Loan and Validator Key Exploit
A flash loan attack exploited Shibarium's governance token mechanism, compromising validator keys and enabling unauthorized asset exfiltration, exposing critical systemic risk.
CrediX Finance Suffers $4.5 Million Exploit via Compromised Multisig Admin Access
A critical vulnerability in CrediX Finance's multisig administration led to unauthorized collateral minting, draining $4.5 million and exposing systemic access control risks.
New Gold Protocol Suffers $2 Million Price Oracle Manipulation Exploit
A critical vulnerability in NGP's single-source price oracle allowed flash loan manipulation, enabling the illicit draining of $2 million and an 88% token value collapse.
Shibarium Bridge Drained by Flash Loan Exploiting Validator Keys
A flash loan attack on Shibarium's bridge compromised validator keys, enabling unauthorized asset drainage and exposing critical L2 consensus vulnerabilities.
NewGold Protocol Suffers $2 Million Smart Contract Exploit
A smart contract vulnerability in the NewGold Protocol enabled an attacker to drain $2 million in assets, triggering an 88% token price crash.
On-Chain Data Exposes Narrative Manipulation in Volatile Markets
Verifiable on-chain data objectively disproved a dramatic market narrative, demonstrating its critical role in cutting through speculative noise.
Radiant Capital Hacker Nearly Doubles Stolen Funds to $94 Million
A DeFi multisig exploit enabled a hacker to nearly double their illicit gains to $94 million through strategic on-chain asset trading, exposing persistent post-breach liquidity risks.
Nemo Protocol Market Pool Drained via Undisclosed Exploit
A lack of immediate root cause disclosure for a market pool drain highlights the inherent risks in nascent DeFi protocols.
ALEX Protocol Suffers $8.3 Million Exploit via Self-Listing Logic Vulnerability
A critical flaw in self-listing verification logic enabled malicious token manipulation, bypassing controls to drain liquidity pools.
Shibarium Bridge Drained via Validator Key Compromise and Flash Loan
A critical vulnerability in validator key management combined with flash loan manipulation enabled a $2.4 million asset drain from the Shibarium bridge, underscoring systemic risks in L2 security models.
