Balancer Users Drained via DNS Provider Social Engineering Attack
A third-party DNS provider compromise redirected users to a malicious front-end, enabling unauthorized token approvals and asset draining.
New Monad Users Targeted by Fabricated ERC20 Transfer Log Spoofing
ERC20 standard flexibility allows malicious contracts to emit fabricated transfer logs, creating a spoofing vector for urgent wallet-draining phishing attacks.
Aerodrome Finance Users Drained by Malicious Token Approvals via DNS Hijacking
Centralized domain registrar failure enabled DNS hijacking, compromising the front-end and tricking users into signing unlimited token approvals.
Individual Bitcoin Holder Drained by Physical Coercion Home Invasion
The physical security layer remains the critical failure point; high-value targets face extreme, non-technical extortion risks.
Malicious NPM Packages Deploy Cloaking Wallet Drainer Supply Chain Attack
A trojanized JavaScript supply chain attack leverages advanced cloaking to redirect developers and users to a sophisticated crypto-draining phishing infrastructure.
State-Sponsored Actors Infiltrate US Companies Using Stolen Identities for Crypto Revenue
APT38's fraudulent employment scheme weaponizes stolen US identities to bypass corporate vetting, generating illicit revenue laundered through virtual assets.
Decentralized Exchange Front-End Compromised via DNS Hijack Injecting Inferno Drainer
A DNS-level compromise injected the Inferno Drainer malware, exposing user wallets to asset-draining transaction approvals.
