Web3 Wallet Transaction Simulation Spoofing Drains User Funds
Attackers manipulate Web3 wallet transaction previews via time-delay exploits, enabling full wallet drains after user approval, a critical flaw in user-facing security.
NPM Package Compromise Redirects Cryptocurrency Transactions via Phishing Attack
A supply chain compromise of critical npm packages, initiated by a phishing attack, injects malicious code to siphon browser-based cryptocurrency transactions.
User Wallet Drained by Phishing Permit Signature Exploit
Malicious permit signatures leveraging EIP-2612 enable off-chain asset drainage, posing a critical risk to DeFi users' staked and wrapped holdings.
Crypto Developers Targeted by Phishing Malware Campaign
Attackers leverage social engineering to distribute macOS malware, compromising sensitive user data and risking asset theft.
THORChain Founder’s Personal Wallets Compromised via Social Engineering
A sophisticated social engineering attack leveraging compromised communication channels drained $1.35 million from a prominent founder's private wallets.
User Wallets Drained by Fake Zoom Social Engineering Attack
Malicious software delivered via a compromised communication channel enabled private key exfiltration, underscoring the pervasive threat of social engineering.
Safe Wallet User Drained by Malicious Request Finance Contract Impersonation
A sophisticated contract impersonation attack leveraged near-identical addresses to trick a Safe multi-sig wallet user into unknowingly approving a malicious batch transaction, resulting in a $3 million fund loss.
Investor Loses $6 Million to Phishing-Induced Multicall Transaction
A deceptive link led to an unauthorized multicall transaction, demonstrating how social engineering can bypass user intent and drain digital assets.
Crypto Investor Suffers $6 Million Loss from Phishing Multicall Exploit
A deceptive phishing attack leveraged a malicious link to induce an unsuspecting user into authorizing a multicall transaction, leading to a significant asset drain.
