BtcTurk Hot Wallets Compromised via Private Key Exploitation
The compromise of hot wallet private keys allows direct asset exfiltration, posing an immediate and severe liquidity risk to centralized exchanges.
Nemo Protocol Developer Deployed Unaudited Code, Enabling $2.6m Exploit
An unaudited code deployment enabled a flash loan and state manipulation attack, compromising Nemo Protocol and jeopardizing user assets.
Venus Protocol Recovers $13.5 Million after Phishing Attack
A compromised user account, exploited via phishing, underscores the critical risk of off-chain vectors impacting on-chain asset security.
Munchables Developer Exploits Lock Contract, Drains $63 Million Ether
A compromised insider leveraged elevated contract privileges and storage manipulation to illicitly mint and withdraw substantial protocol assets.
CoinDCX Operational Hot Wallet Compromised, $44 Million Drained via Infrastructure Exploit
The exploitation of backend infrastructure vulnerabilities and hot wallet operational controls represents a critical failure in asset segmentation and access management, exposing substantial liquidity to unauthorized exfiltration.
European Union Mandates Comprehensive Digital Operational Resilience for Crypto Firms
CASPs must immediately integrate DORA's strict ICT risk management and mandatory resilience testing into their core operational architecture.
SwissBorg Suffers $41 Million Loss via Compromised Third-Party Partner API
A critical supply chain failure in a partner API allowed unauthorized asset transfer, exposing the systemic risk of third-party integration.
Mining Pool Hot Wallets Drained Exploiting Weak Cryptographic Key Generation
A critical failure in a 32-bit pseudo-random key generation algorithm enabled the brute-force compromise of over 5,000 high-value Bitcoin hot wallets.
Open-Source Library Flaw Exposes over 120,000 Bitcoin Private Keys to Theft
Predictable 32-bit entropy from the Mersenne Twister PRNG in a core Bitcoin library allowed attackers to brute-force private keys at scale.
