New EVM Chain Users Targeted by ERC-20 Log Spoofing Phishing Attack
The ERC-20 standard permits non-transferring contracts to emit fake logs, weaponizing block explorers for large-scale social engineering.
Moonwell Lending Protocol Exploited via Oracle Price Manipulation on Base Network
A temporary oracle malfunction mispriced collateral, enabling a classic economic exploit that allowed the attacker to over-borrow and drain assets.
Balancer Protocol Drained $120 Million Exploiting Precision Rounding Logic
A systemic flaw in pool math allowed attackers to manipulate asset precision, draining $120M and exposing connected DeFi aggregators to contagion risk.
Cardano Network Partitioned by Legacy Delegation Transaction Flaw
A legacy software vulnerability allowed a malformed delegation transaction to partition the network, compromising chain integrity.
Balancer Multi-Chain Pools Drained Exploiting Critical Access Control Flaw
Systemic weak permission controls across Balancer's multi-chain architecture enabled a massive $128M unauthorized asset drain, demanding immediate risk-mitigation action.
Balancer V2 Stable Pools Drained Exploiting Precision Rounding Flaw
Precision rounding errors in core swap logic created an economic invariant manipulation, exposing multi-chain liquidity to systemic theft.
Balancer V2 Pools Drained by Multi-Chain Precision Rounding Exploit
A critical precision loss vulnerability in the Balancer V2 `batchSwap` function allowed attackers to systematically drain $128M across six chains.
Cross-Chain Bridge Flaw Allows Attacker to Mint Billions of Protocol Tokens
A critical vulnerability in the cross-chain bridge logic allowed unauthorized token minting, creating massive supply inflation and immediate value collapse.
Cardano Network Integrity Compromised by Legacy Transaction Validation Flaw
A legacy bug enabled an oversized transaction hash to partition the chain, proving that protocol-level integrity remains a critical risk.
