UXLINK Exploiter Loses $48 Million to Sophisticated Phishing Attack
        
        
        
        
          
        
        
      
        
    
        
        A malicious `increaseAllowance` signature allowed a phishing group to drain $48 million from a prior UXLINK exploiter, underscoring persistent social engineering risks.
        
        Shibarium Bridge Suffers $2.3 Million Validator Key Compromise
        
        
        
        
          
        
        
      
        
    
        
        A flash loan attack exploited Shibarium's validator system, compromising signing keys and enabling unauthorized asset withdrawals, directly impacting user funds.
        
        WEMIX Blockchain Gaming Platform Suffers $6.1 Million Authentication Key Compromise
        
        
        
        
          
        
        
      
        
    
        
        Compromised authentication keys granted threat actors unauthorized access, enabling the exfiltration of millions in WEMIX tokens and exposing critical off-chain security vulnerabilities.
        
        UPCX Platform Suffers $70 Million Private Key Compromise and Contract Upgrade Exploit
        
        
        
        
          
        
        
      
        
    
        
        A compromised administrative private key enabled a malicious smart contract upgrade, allowing an attacker to drain $70 million from the UPCX payment platform.
        
        NPM Supply Chain Compromised, Crypto Wallets Targeted by Self-Replicating Malware
        
        
        
        
          
        
        
      
        
    
        
        A sophisticated supply chain attack on the NPM ecosystem injects wallet-swapping malware and a self-replicating worm, posing systemic risk to digital asset users.
        
        NPM Supply Chain Compromised by Self-Replicating Shai-Hulud Token-Stealing Worm
        
        
        
        
          
        
        
      
        
    
        
        A novel self-replicating worm is actively compromising NPM developer accounts, injecting malicious code into popular packages to steal cloud service tokens and expose private repositories, posing systemic risk to software supply chains.
