Malicious Rust Crates Hijack Developer Keys for Solana and Ethereum Wallets
A sophisticated supply chain attack, leveraging typosquatting in Rust's package registry, compromises developer environments to exfiltrate critical blockchain private keys.
NPM Debug Package Compromised via Phishing, Redirecting Crypto Transactions
A compromised NPM package, widely integrated into browser-based applications, enabled malicious redirection of user cryptocurrency transactions.
Yala Stablecoin Protocol Suffers $7.64 Million Key Compromise Exploit
A compromised deployment key enabled an attacker to mint unauthorized tokens and drain significant assets across multiple chains, exposing critical off-chain security lapses.
JavaScript Supply Chain Attack Threatens DeFi Ecosystem
A compromised JavaScript package, widely integrated across DeFi, enables transaction hijacking, posing a systemic risk to user funds and operational integrity.
North Korean Hackers Deploy BeaverTail Malware via Fake Crypto Job Offers
A sophisticated social engineering campaign leverages fake job opportunities to distribute advanced malware, directly compromising user credentials and crypto wallets.
UPCX Platform Suffers $70 Million Private Key Compromise and Contract Upgrade Exploit
A compromised administrative private key enabled a malicious smart contract upgrade, allowing an attacker to drain $70 million from the UPCX payment platform.
Coinbase Customers Targeted by Insider Data Theft and Social Engineering
A compromised third-party vendor employee facilitated data theft, enabling social engineering attacks that drained user funds through impersonation.
Coinbase Customers Suffer $400 Million Loss via Outsourcing Firm Data Breach
The systemic compromise of third-party customer support data enabled sophisticated social engineering, directly jeopardizing user assets and eroding trust in centralized custody.
Global Phishing-as-a-Service Operation Dismantled, Crypto Payment System Exposed
The takedown of a sophisticated Phishing-as-a-Service platform reveals the critical intersection of traditional credential theft and cryptocurrency-funded cybercrime, posing persistent risks to digital asset security.
Safe Wallet User Drained by Malicious Request Finance Contract Impersonation
A sophisticated contract impersonation attack leveraged near-identical addresses to trick a Safe multi-sig wallet user into unknowingly approving a malicious batch transaction, resulting in a $3 million fund loss.
Chrome V8 Engine Vulnerability Exposes Crypto Wallets to Website Attacks
A critical "Type Confusion" bug in Chrome's V8 engine enables remote code execution, allowing attackers to drain crypto wallets via malicious websites.
U.S. Exchange Breached via Outsourcing Firm Social Engineering
Sophisticated social engineering against third-party vendors exposes exchanges to supply chain attacks, enabling significant asset exfiltration.
Bybit Cold Wallet Compromised via Sophisticated Social Engineering Attack
A targeted social engineering campaign against a multi-signature wallet developer enabled attackers to manipulate transaction logic, bypassing critical security controls.
Supply Chain Attack Poisons JavaScript Packages, Threatening Crypto Wallets
A phishing compromise of critical JavaScript package maintainers exposed DeFi to widespread transaction redirection, highlighting systemic supply chain vulnerabilities.
JavaScript Supply Chain Attack Threatens DeFi Wallet Transactions
A phishing-induced compromise of widely used JavaScript packages exposes a critical supply chain vulnerability, allowing attackers to hijack crypto transactions.
Coinbase Clients Defrauded via Outsourced Employee Data Theft Conspiracy
A compromised third-party vendor employee facilitated a data breach, enabling attackers to impersonate exchange staff and defraud users of cryptocurrency.
NPM Supply Chain Compromised, Crypto Wallets Targeted by Self-Replicating Malware
A sophisticated supply chain attack on the NPM ecosystem injects wallet-swapping malware and a self-replicating worm, posing systemic risk to digital asset users.
NPM Supply Chain Compromised by Self-Replicating Shai-Hulud Token-Stealing Worm
A novel self-replicating worm is actively compromising NPM developer accounts, injecting malicious code into popular packages to steal cloud service tokens and expose private repositories, posing systemic risk to software supply chains.
NPM Supply Chain Compromised, Crypto Wallets Targeted by Clipper Malware
A compromised open-source dependency allows silent address substitution, posing a systemic risk to browser-based crypto transactions.
Npm Supply Chain Compromise Redirects Cryptocurrency Transactions
A compromised developer account facilitated the injection of malicious code into widely used npm packages, enabling the silent redirection of cryptocurrency during transactions.
SwissBorg Solana Earn Compromised by Kiln API Manipulation
A compromised third-party staking API enabled attackers to siphon $41 million in Solana, exposing critical supply chain risks.
SwissBorg Solana Earn Program Compromised via Third-Party API
An exploited staking partner API allowed attackers to siphon $41 million in SOL, highlighting critical supply chain risks in DeFi integrations.
SwissBorg Solana Earn Program Suffers $41m Third-Party API Exploit
A compromised third-party API allowed unauthorized withdrawal authority, exposing on-chain controls and draining $41 million in SOL from a DeFi staking program.
