Centralized Exchange Hot Wallet Compromised via Private Key Deduction Flaw
A critical wallet system vulnerability allowed private key inference from public transaction data, demonstrating catastrophic operational security failure.
Cross-Chain Bridge Drained by Compromised Private Key Access Control Flaw
A failure in off-chain key management allowed a threat actor to execute privileged contract functions, compromising $3.76M in cross-chain bridge assets.
Centralized Exchange Users Targeted by AI Deepfake Voice Phishing Attacks
AI-driven voice cloning is weaponizing social engineering, establishing a high-trust, high-urgency vector for critical credential theft.
New Phishing-as-a-Service Group Targets Users with Wallet Drainer Kits
The emergence of the Eleven Drainer PhaaS syndicate industrializes social engineering, weaponizing malicious smart contract scripts to bypass user-side wallet security.
User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
