North Korean Hackers Compromise Web3 Developer Supply Chain via Malicious NPM Packages
The compromise of 197 open-source NPM dependencies introduces systemic risk, enabling remote code execution and project-level key exfiltration during build processes.
NutzBoot Ethereum Wallet Handler Exposed by Remote Information Disclosure Flaw
A critical flaw in the NutzBoot Ethereum Wallet Handler permits remote information disclosure, immediately compromising confidential user wallet data.
Web3 Users Compromised by EtherHiding Malware Campaign via JavaScript Injection
Threat actors are leveraging compromised websites and four BSC contracts to deploy credential-stealing malware, bypassing traditional network defenses.
State Actors Target Web3 Developers via Malicious NPM Supply Chain Attack
State-sponsored actors are leveraging npm typosquatting and social engineering to deploy the OtterCookie malware, compromising the Web3 development supply chain.
Chromium V8 Zero-Day Flaw Enables Private Key Theft and Wallet Draining
A critical V8 engine zero-day (CVE-2025-10585) permitted remote code execution, exposing user private keys and draining hot wallets.
Unpatched Ray AI Framework Flaw Exploited to Launch Global Cryptomining Botnet
Critical unauthenticated Ray API access allows threat actors to weaponize compute clusters for self-propagating, illicit cryptojacking.
AI Framework Vulnerability Exploited for Global Self-Propagating Cryptojacking Operation
Unauthenticated Remote Code Execution in the Ray AI framework's API is being weaponized to hijack high-value compute resources for illicit cryptocurrency mining, turning orchestration features into a global botnet.
Unpatched XWiki Servers Exploited by RCE Flaw for Global Cryptomining Botnet
The critical CVE-2025-24893 eval injection flaw enables unauthenticated remote code execution, weaponizing enterprise infrastructure for illicit cryptomining and DDoS botnets.
Malicious NPM Packages Exploit Software Supply Chain to Steal User Crypto
A new npm supply chain attack leverages cloaking and fake CAPTCHAs for unauthenticated redirection, directly enabling user financial theft.
