Bybit Ethereum Cold Wallet Compromised by Masked Transaction Exploit

A sophisticated masked transaction exploit manipulated smart contract logic, leading to a massive drain of Bybit's Ethereum cold wallet.
SwissBorg Partner API Exploited for $41 Million Solana Token Theft

An external partner API compromise facilitated unauthorized access to SwissBorg's earnings program, resulting in significant asset exfiltration.
Multi-Sig Wallet Drained by Sophisticated Phishing Attack via Fake Contract

Attackers leverage fake Etherscan-verified contracts and disguised approvals to compromise multi-signature wallets, leading to direct asset exfiltration.
Nemo Protocol Suffers $2.59 Million Exploit from Unaudited Code Deployment

A developer's unauthorized deployment of unaudited code introduced critical public functions, enabling direct manipulation of contract state and substantial asset exfiltration.
Shibarium Bridge Compromised by Flash Loan and Validator Key Leak

A flash loan attack leveraged compromised validator keys on the Shibarium bridge, enabling unauthorized asset siphoning and jeopardizing cross-chain integrity.
Nemo Protocol Suffers $2.6 Million Exploit from Unaudited Code

A publicly exposed flash loan function and state-modifying query vulnerability allowed unauthorized asset drainage, posing a critical risk to protocol integrity.
Nemo Protocol Suffers $2.59 Million Exploit from Rogue Developer Code

A critical vulnerability in unaudited smart contract code, maliciously deployed by an insider, enabled unauthorized state modifications and flash loan exploitation, leading to significant asset drain.
Nemo Protocol Developer Deployed Unaudited Code, Enabling $2.6m Exploit

An unaudited code deployment enabled a flash loan and state manipulation attack, compromising Nemo Protocol and jeopardizing user assets.
Multi-Signature Wallet Drained by Sophisticated Phishing Contract Exploit

A meticulously crafted phishing attack bypassed multi-signature security, enabling the unauthorized transfer of digital assets through disguised malicious approvals.
Nemo Protocol Suffers $2.6m Exploit from Unaudited Code Deployment

An internal developer bypassed audit controls, exposing critical smart contract functions to unauthorized state manipulation.
Npm Supply Chain Compromise Redirects Cryptocurrency Transactions

A compromised developer account facilitated the injection of malicious code into widely used npm packages, enabling the silent redirection of cryptocurrency during transactions.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit

A sophisticated flash loan and validator key compromise on Shibarium Bridge enabled a multi-million dollar asset drain, highlighting critical cross-chain security vulnerabilities.
Sophisticated Phishing Drains $3m from Multi-Signature Wallet via Malicious Approval

Malicious contract impersonation and Safe Multi Send abuse enabled a $3M phishing drain, highlighting critical authorization vector risks.
Multi-Sig Wallet Drained via Sophisticated Contract Impersonation Phishing

An advanced phishing vector exploited a multi-signature wallet through disguised malicious approvals, leading to a substantial capital loss.
Multi-Signature Wallet Drained via Sophisticated Phishing Approval Deception

Sophisticated phishing bypassed multi-sig security by disguising malicious approvals, leading to a $3M asset drain and highlighting advanced social engineering risks.
Shibarium Bridge Compromised through Validator Key Theft

A sophisticated flash loan attack leveraged compromised validator keys, enabling unauthorized control over the bridge and draining substantial digital assets.
Shibarium Bridge Compromised via Validator Key Exploitation and Flash Loan

A sophisticated flash loan attack on Shibarium's bridge exploited validator key control, enabling the illicit drainage of multi-million dollar assets.
NPM Supply Chain Compromise Threatens JavaScript Crypto Ecosystem

A pervasive supply chain attack on NPM accounts injects malicious code, covertly swapping cryptocurrency addresses during user-approved transactions.
Shibarium Bridge Compromised by Sophisticated Flash Loan Attack

A flash loan attack leveraging compromised validator keys enabled a $2.4 million asset drain, underscoring critical bridge security vulnerabilities.
Software Supply Chain Compromise Exposes Browser Wallet Transactions

A widespread software supply chain compromise injects crypto-clipper malware into web applications, enabling silent redirection of user funds during browser-based transactions.
Onyx Protocol NFT Liquidation Contract Exploited for Millions

A critical vulnerability in the NFT liquidation contract allowed asset draining, depegging stablecoins and jeopardizing user funds.
JavaScript Malware Compromises DeFi Wallet Dependencies

A supply chain attack injected crypto-stealing malware into widely used JavaScript packages, exposing DeFi's critical vulnerability to external software dependencies.
Multi-Sig Wallet Drained via Sophisticated Disguised Approval Phishing

A sophisticated phishing attack leveraging a fake contract and disguised approvals compromised a multi-signature wallet, resulting in over $3 million in direct asset loss.
Shibarium Bridge Flash Loan Attack Compromises Validator Keys

A flash loan exploit leveraged governance token control to compromise validator keys, enabling unauthorized transactions and draining $2.4 million in assets.
Multi-Sig Wallet Drained via Sophisticated Phishing Attack

A meticulously crafted phishing scheme exploited a multi-signature wallet, leveraging disguised approvals to siphon over $3 million in USDC from an unsuspecting investor.
SwissBorg Solana Earnings Program Compromised via Partner API Exploit

An exploited third-party API allowed unauthorized access to SwissBorg's Solana earnings program, leading to a significant asset drain.
Nemo Protocol Suffers Rogue Developer Code Deployment Exploit

An internal developer's unauthorized code deployment with critical flash loan and state modification vulnerabilities led to a significant $2.6 million protocol compromise.
Shibarium Bridge Suffers Flash Loan Validator Key Compromise

A flash loan attack manipulated Shibarium's validator consensus, enabling unauthorized asset siphoning and exposing critical governance vulnerabilities.
Shibarium Bridge Compromised by Flash Loan Validator Manipulation

A flash loan exploit leveraged temporary validator control, draining significant assets from the Shibarium-Ethereum bridge.