Sophisticated Phishing Drains $3m from Multi-Signature Wallet via Malicious Approval
Malicious contract impersonation and Safe Multi Send abuse enabled a $3M phishing drain, highlighting critical authorization vector risks.
New Gold Protocol Suffers $2m Flash Loan Oracle Manipulation
A flawed pricing oracle, susceptible to flash loan manipulation, enabled an attacker to drain nearly $2 million from a newly launched DeFi protocol.
Abracadabra Suffers $13 Million Flash Loan Exploit via GMX Integration
A flash loan vulnerability in Abracadabra's GMX V2 integration allowed an attacker to manipulate liquidation logic, draining $13 million.
Abracadabra Suffers $13 Million Flash Loan Exploit via State Tracking Error
A critical state tracking error within Abracadabra's GMX-integrated cauldrons allowed a flash loan attack to manipulate liquidation logic, leading to significant asset drain.
Resupply Protocol Suffers $9.5 Million Price Oracle Manipulation Exploit
Price oracle manipulation via ERC-4626 vault's floor division flaw enabled $9.5M drain from Resupply Protocol.
Open-Source Trading System Leaks User Private Keys and Exchange API Credentials
The compromise of an open-source trading system's integrity has exposed private keys and exchange API credentials, enabling total asset loss.
GANA Payment Drained $3.1m via Third-Party Security Vulnerability
A compromise of an external security dependency enabled the immediate $3.1M contract drain, underscoring the systemic risk of third-party access controls.
GANA Payment Drained $3.1 Million Exploiting Contract Ownership Flaw
A critical access control flaw in GANA's smart contract allowed an attacker to seize administrative power and drain $3.1M, underscoring the risk of centralized contract keys.
Constant-Size Proofs Secure Distributed Verifiable Random Functions Efficiently
Cryptographers developed a Distributed Verifiable Random Function with proofs of constant size, eliminating bilinear pairings for faster, pairing-free verification.
