Npm Supply Chain Compromise Redirects Cryptocurrency Transactions
A compromised developer account facilitated the injection of malicious code into widely used npm packages, enabling the silent redirection of cryptocurrency during transactions.
NPM Supply Chain Compromised, Crypto Wallets Targeted by Self-Replicating Malware
A sophisticated supply chain attack on the NPM ecosystem injects wallet-swapping malware and a self-replicating worm, posing systemic risk to digital asset users.
NPM Supply Chain Compromise Redirects Crypto Transactions via Malicious Packages
A phishing-induced account takeover enabled malicious code injection into widely used NPM packages, silently rerouting cryptocurrency transactions at the browser level.
Crypto Developers Targeted by Supply Chain Malware via Ethereum Smart Contracts
Exploiting open-source dependencies and blockchain for covert malware delivery represents an advanced supply chain vector, directly compromising developer environments and digital assets.
Developers Targeted by Supply Chain Attack Using Ethereum Smart Contracts
A sophisticated supply chain compromise leverages malicious npm packages and deceptive GitHub repositories, utilizing Ethereum smart contracts to covertly deliver malware payloads.
Balancer V2 Stable Pools Exploited via Precision Rounding Error
A low-level arithmetic precision flaw in Balancer's V2 Composable Stable Pools allowed invariant manipulation, resulting in a catastrophic $128M asset drain across multiple chains.
Libbitcoin Explorer Flaw Exposes over 120,000 Private Keys
A critically flawed random number generator in a core library compromises cryptographic entropy, making thousands of Bitcoin private keys predictable.
Open-Source Trading System Leaks User Private Keys and Exchange API Credentials
The compromise of an open-source trading system's integrity has exposed private keys and exchange API credentials, enabling total asset loss.
Open-Source Supply Chain Compromised to Inject Global Web3 Wallet Drainer Malware
A single phishing vector compromised critical JavaScript dependencies, weaponizing the software supply chain to silently hijack user crypto transactions.
