Goldfinch User Wallet Drained via Malicious Token Approval Compromise
A compromised contract approval allowed an attacker to execute a `transferFrom` call, bypassing wallet security and draining user assets.
New EVM Chain Users Targeted by ERC-20 Log Spoofing Phishing Attack
The ERC-20 standard permits non-transferring contracts to emit fake logs, weaponizing block explorers for large-scale social engineering.
New Delegation Flaw Exploited by Wallet Drainers to Steal User Assets
EIP-7702-style delegation is weaponized to bypass traditional `approve` checks, granting malicious contracts persistent, batch execution authority over user assets.
Malicious VS Code Extension Steals Developer Private Keys via Supply Chain Attack
The compromise of development environments through trojanized tooling weaponizes the software supply chain to exfiltrate critical private keys.
Malicious Wallet Extension Uses Sui Transactions to Covertly Steal Seed Phrases
This novel on-chain exfiltration vector encodes BIP-39 mnemonics into Sui transaction recipient addresses, bypassing all conventional network monitoring.
Decentralized Exchange Front-End Compromised via DNS Hijack Injecting Inferno Drainer
A DNS-level compromise injected the Inferno Drainer malware, exposing user wallets to asset-draining transaction approvals.
