Aerodrome Finance Users Drained via Malicious DNS Hijacking Front-End Attack
The protocol's reliance on a centralized DNS provider was exploited, enabling a malicious frontend to solicit unlimited token approvals from users.
Ionic Protocol on Mode L2 Drained via Fake Collateral Social Engineering
Operational failure allowed attackers to whitelist counterfeit collateral, compromising the lending protocol's core solvency.
New EVM Chain Users Targeted by ERC-20 Log Spoofing Phishing Attack
The ERC-20 standard permits non-transferring contracts to emit fake logs, weaponizing block explorers for large-scale social engineering.
Single Wallet Drained of ARB Tokens via Sophisticated Phishing Scam
Malicious token approval from a phishing vector bypassed cold storage security, leading to a swift $350K asset drain.
Web3 Users Targeted by Evolving Social Engineering Malware Campaign
The attack leverages sophisticated social engineering to trick high-value users into installing a malicious binary, fundamentally bypassing smart contract security.
Phishing Airdrop Tricked Users into Malicious Token Approval Theft
Malicious airdrop claims weaponized token approvals, bypassing private key security to execute authorized asset draining across multiple chains.
Malicious Signature Phishing Drains User Wallets across Web3 Ecosystem
The systemic risk is shifting from smart contract flaws to user-signed malicious approvals, enabling rapid, irreversible wallet-draining attacks.
Individual Crypto Investor Drained $11 Million via Physical Coercion Attack
The most critical vulnerability remains the human element, which physical "wrench attacks" exploit to bypass all digital security controls.
