Brazilian Crypto Investors Targeted by WhatsApp Social Engineering Malware
The Eternidade Stealer, a sophisticated banking trojan, weaponizes WhatsApp social engineering to steal user private keys and financial credentials.
Wallet Users Targeted by New Eleven Drainer Phishing-as-a-Service Syndicate
New PhaaS syndicate, Eleven Drainer, weaponizes social engineering and malicious signatures to bypass wallet security, enabling full asset sweeps.
Pi Network Deploys Core DeFi Primitives on Testnet for Mass User Onboarding
The Pi Testnet DEX and AMM deployment introduces a massive, non-crypto-native user base to liquidity provision mechanics, creating a critical onboarding funnel for a new DeFi vertical.
Pi Network Unveils Testnet DEX and AMM to Boost DeFi Ecosystem
Pi Network's Testnet integration of DEX and AMM provides a crucial sandbox for its vast user base to engage with DeFi primitives, signaling a strategic pivot towards utility-driven ecosystem expansion.
User Loses $119k WBTC to Phishing Scam Exploiting Approval Mechanism
A sophisticated phishing campaign leveraged social engineering and malicious `increaseApproval` transactions to drain user funds, highlighting critical authorization vulnerabilities.
RareGleam Launches WEB3-ON Platform, Partners XOCIETY for Japan Expansion
WEB3-ON streamlines Web3 onboarding and community engagement through a centralized media platform, addressing information fragmentation and user friction for mass adoption.
Crypto Whale Loses $6.8 Million to Sophisticated Phishing Scam
A deceptive signature request vulnerability allowed an attacker to drain $6.8 million in digital assets, underscoring critical user-side security gaps.
AI-Generated YouTube Scams Exploit Users with Malicious Trading Bots
Sophisticated AI-driven social engineering leverages fake trading bot smart contracts, enabling attackers to drain user funds via deceptive tutorials.
Crypto Developers Targeted by Phishing Malware Campaign
Attackers leverage social engineering to distribute macOS malware, compromising sensitive user data and risking asset theft.