User Wallet Drained via Malicious Token Approval on Goldfinch Ecosystem
Unrevoked contract permissions remain a critical attack vector, enabling malicious actors to drain user-approved assets without direct private key compromise.
New EVM Chain Users Targeted by ERC-20 Log Spoofing Phishing Attack
The ERC-20 standard permits non-transferring contracts to emit fake logs, weaponizing block explorers for large-scale social engineering.
Malicious Signature Phishing Drains User Wallets across Web3 Ecosystem
The systemic risk is shifting from smart contract flaws to user-signed malicious approvals, enabling rapid, irreversible wallet-draining attacks.
New Delegation Flaw Exploited by Wallet Drainers to Steal User Assets
EIP-7702-style delegation is weaponized to bypass traditional `approve` checks, granting malicious contracts persistent, batch execution authority over user assets.
Web3 Users Compromised by AI-Aided Phishing Network Stealing Seed Phrases
The FreeDrain campaign leverages AI-generated content and search engine spamdexing to steal mnemonic phrases, bypassing traditional security controls at scale.
