Official PEPE Website Compromised Redirecting Users to Wallet Drainer Malware
Front-end compromise weaponized a trusted interface, injecting an invisible script to execute unauthorized token approvals and drain connected user wallets.
New Monad Users Targeted by Fabricated ERC20 Transfer Log Spoofing
ERC20 standard flexibility allows malicious contracts to emit fabricated transfer logs, creating a spoofing vector for urgent wallet-draining phishing attacks.
AI-Generated Wallet Drainer Infiltrates Open-Source Ecosystem via Malicious NPM Package
An AI-crafted supply chain attack exploited developer trust in the NPM registry to deploy stealthy wallet-draining malware, compromising end-user funds.
Solana Wallets Targeted by Malicious AI-Generated NPM Supply Chain Attack
Malicious NPM dependency executed a stealth wallet drainer script, leveraging AI-generated code to compromise developer systems and steal Solana assets.
Malicious NPM Packages Deploy Cloaking Wallet Drainer Supply Chain Attack
A trojanized JavaScript supply chain attack leverages advanced cloaking to redirect developers and users to a sophisticated crypto-draining phishing infrastructure.
Malicious NPM Packages Exploit Software Supply Chain to Steal User Crypto
A new npm supply chain attack leverages cloaking and fake CAPTCHAs for unauthenticated redirection, directly enabling user financial theft.
Open-Source Supply Chain Compromised to Inject Global Web3 Wallet Drainer Malware
A single phishing vector compromised critical JavaScript dependencies, weaponizing the software supply chain to silently hijack user crypto transactions.
Malicious NPM Packages Hijack Developer Dependencies to Steal Crypto
Software supply chain integrity is compromised as cloaked malware in open-source dependencies redirects users to wallet-draining phishing sites.
Decentralized Exchange Front-End Compromised via DNS Hijack Injecting Inferno Drainer
A DNS-level compromise injected the Inferno Drainer malware, exposing user wallets to asset-draining transaction approvals.
