High-Profile Web3 Social Accounts Compromised, Leading to User Wallet Drains
Supply chain failure via compromised employee accounts weaponizes trusted social channels, tricking users into malicious token approvals.
Stablecoin Protocol Drained via Compromised Proxy Implementation Attack
A deployment-phase flaw allowed an attacker to seize proxy admin rights, enabling unauthorized token minting and a $1M liquidity drain.
SwissBorg Staking Program Compromised via Partner API Supply Chain Attack
External API supply chain compromise allowed unauthorized Solana stake authority manipulation, resulting in $41.5M asset loss.
NutzBoot Ethereum Wallet Handler Exposed by Remote Information Disclosure Flaw
A critical flaw in the NutzBoot Ethereum Wallet Handler permits remote information disclosure, immediately compromising confidential user wallet data.
Bitcoin Mining Pool Suffers Private Key Deduction via Weak Entropy Flaw
A weak pseudorandom number generator in a third-party tool allowed private key derivation, compromising a massive Bitcoin treasury.
State-Sponsored Actors Exploit Exchange Wallet Interface Flaw Stealing $1.5 Billion
A compromised third-party wallet interface allowed a malicious transaction to execute, bypassing cold storage controls and draining $1.5B in ETH.
Cross-Chain Bridge Drained by Compromised Private Key Access Control Flaw
A failure in off-chain key management allowed a threat actor to execute privileged contract functions, compromising $3.76M in cross-chain bridge assets.
Mobile Wallets Exposed to Zero-Click Attacks via Operating System Flaws
Zero-click mobile exploits bypass OS security, enabling silent, full-device compromise to exfiltrate wallet seed phrases and private keys.
macOS Users Targeted by DigitStealer Malware Stealing Wallet Credentials and Data
DigitStealer malware, disguised as a common application, executes a multi-stage attack to exfiltrate critical system data and compromise hardware wallet applications.
