Individual Bitcoin Investor Drained $91 Million via Social Engineering Attack
This high-value breach confirms that the human layer remains the critical attack surface, leveraging sophisticated impersonation to bypass hardware wallet security.
Malicious VS Code Extension Steals Developer Private Keys via Supply Chain Attack
The compromise of development environments through trojanized tooling weaponizes the software supply chain to exfiltrate critical private keys.
Centralized Exchange Drained $44.2 Million via Employee Malware Attack
A sophisticated social engineering vector bypassed internal controls, leveraging employee access to compromise core exchange servers and drain assets.
Crypto Users Drained by Malicious Front-End Script Injection on Information Sites
The escalating shift from smart contract exploits to client-side supply chain attacks bypasses server-side security, weaponizing user trust.
New Phishing-as-a-Service Group Targets Users with Wallet Drainer Kits
The emergence of the Eleven Drainer PhaaS syndicate industrializes social engineering, weaponizing malicious smart contract scripts to bypass user-side wallet security.
Malicious Wallet Extension Steals Seed Phrases via Covert Sui Microtransactions
A malicious browser extension covertly exfiltrates user seed phrases by encoding them into negligible Sui microtransactions, enabling silent, total asset compromise.
EIP-7702 Exploit Weaponizes Wallet Upgrade Functionality against Users
The weaponization of EIP-7702's delegation logic by Phishing-as-a-Service syndicates bypasses traditional wallet security, accelerating user-level asset drain operations.
Threat Actor LARVA-208 Targets Web3 Developers via Fake AI Platform Malware
Sophisticated spearphishing campaign delivers the Fickle infostealer via malicious 'audio driver' download, compromising developer credentials and project supply chains.
Malicious Chrome Extension Steals Seed Phrases via Covert Sui Transactions
A high-ranking malicious wallet extension weaponized the Sui blockchain to covertly exfiltrate user mnemonics, bypassing traditional network monitoring.
