Memecoin Launchpad Drained Exploiting Thin Liquidity Pool Manipulation
The exploitation of low-liquidity pools via self-trading and token inflation confirms that insufficient invariant checks enable catastrophic price oracle failure.
Aerodrome and Velodrome Users Drained via Centralized DNS Hijacking Attack
Centralized domain registrar vulnerability enabled DNS hijacking, weaponizing the front-end to steal user token approvals.
New Phishing-as-a-Service Group Targets Web3 Wallet Token Approvals
The emergence of Eleven Drainer professionalizes social engineering, weaponizing malicious `permit` and `approve` calls to systematically sweep user-approved assets.
Aerodrome Velodrome Users Drained by Centralized DNS Hijacking Attack
A centralized DNS registrar compromise allowed a front-end hijack, tricking users into signing malicious token approvals and draining wallets.
Aerodrome Velodrome DNS Hijacking Compromises User Token Approvals
Centralized DNS registrar vulnerability enabled front-end hijacking, exposing user wallets to malicious token approval transactions.
GANA Payment Protocol Drained via Critical Smart Contract Logic Flaw
The exploitation of a core interaction contract flaw allowed an unauthorized asset drain, confirming that unaudited code presents immediate, catastrophic risk.
Loopring ZK-Rollup Wallet Compromised via Official Guardian Keeper Flaw
The compromise of a single, centralized Official Keeper's 2FA bypassed the smart wallet's recovery logic, exposing user assets to unauthorized transfer.
Malicious NPM Packages Exploit Software Supply Chain to Steal User Crypto
A new npm supply chain attack leverages cloaking and fake CAPTCHAs for unauthenticated redirection, directly enabling user financial theft.
Crypto Users Drained by Malicious Front-End Script Injection on Information Sites
The escalating shift from smart contract exploits to client-side supply chain attacks bypasses server-side security, weaponizing user trust.