Mobile Malware Uses OCR to Steal Wallet Seed Phrases from Screenshots
The SparkCat and SpyAgent malware strains weaponize Optical Character Recognition to exploit the human layer, reading and exfiltrating private keys stored as device images.
Brazilian Crypto Investors Targeted by WhatsApp Social Engineering Malware
The Eternidade Stealer, a sophisticated banking trojan, weaponizes WhatsApp social engineering to steal user private keys and financial credentials.
Web3 Users Targeted by Malicious NPM Package Supply Chain Attack
Malicious NPM dependencies leverage cloaking to redirect users to phishing sites, compromising front-end integrity and asset security.
Private Key Holders Targeted by Automated Malware and Physical Coercion
Automated CaaS malware now bypasses local security, weaponizing phishing and physical coercion to compromise private keys at scale.
Open-Source Trading System Leaks User Private Keys and Exchange API Credentials
The compromise of an open-source trading system's integrity has exposed private keys and exchange API credentials, enabling total asset loss.
Crypto Users Drained by Malicious Front-End Script Injection on Information Sites
The escalating shift from smart contract exploits to client-side supply chain attacks bypasses server-side security, weaponizing user trust.
Malicious Wallet Extension Steals Seed Phrases via Covert Sui Microtransactions
A malicious browser extension covertly exfiltrates user seed phrases by encoding them into negligible Sui microtransactions, enabling silent, total asset compromise.
EIP-7702 Exploit Weaponizes Wallet Upgrade Functionality against Users
The weaponization of EIP-7702's delegation logic by Phishing-as-a-Service syndicates bypasses traditional wallet security, accelerating user-level asset drain operations.
Malicious Chrome Extension Steals Seed Phrases via Covert Sui Transactions
A high-ranking malicious wallet extension weaponized the Sui blockchain to covertly exfiltrate user mnemonics, bypassing traditional network monitoring.
