Venus Protocol User Account Compromised via Social Engineering
A sophisticated social engineering attack leveraged a compromised Zoom client, granting delegate control over a Venus Protocol user's account and putting $13 million at risk.
Venus Protocol User Phished, $13.5 Million Funds Recovered
A sophisticated phishing attack targeting a high-value user's delegated account control highlights persistent social engineering risks within DeFi.
Outsourcing Service Breach Compromises Crypto Exchange User Data
A sophisticated social engineering and supply chain attack on a third-party vendor exposed user data, leading to over $400 million in crypto losses.
Bybit Cold Wallet Compromised via Sophisticated Social Engineering Attack
A targeted social engineering campaign against a multi-signature wallet developer enabled attackers to manipulate transaction logic, bypassing critical security controls.
THORChain Founder’s Wallet Drained via Sophisticated Social Engineering Attack
A targeted social engineering exploit, leveraging compromised communication channels, bypassed traditional wallet security, highlighting critical human-factor vulnerabilities.
Coinbase Clients Defrauded via Outsourced Employee Data Theft Conspiracy
A compromised third-party vendor employee facilitated a data breach, enabling attackers to impersonate exchange staff and defraud users of cryptocurrency.
Venus Protocol User Phished, $13.5 Million Recovered by Governance
A sophisticated phishing attack leveraging a malicious client compromised a user's delegated account control, exposing DeFi to social engineering vulnerabilities.
Multi-Signature Wallet Drained by Sophisticated Phishing Contract Exploit
A meticulously crafted phishing attack bypassed multi-signature security, enabling the unauthorized transfer of digital assets through disguised malicious approvals.
Sophisticated Phishing Drains $3m from Multi-Signature Wallet via Malicious Approval
Malicious contract impersonation and Safe Multi Send abuse enabled a $3M phishing drain, highlighting critical authorization vector risks.
