Lazarus Group Targets Venus Protocol, $13.5 Million Theft Recovered
A sophisticated phishing attack, attributed to an Advanced Persistent Threat group, attempted to drain $13.5 million from Venus Protocol, highlighting persistent social engineering risks.
Crypto Developers Targeted by Supply Chain Malware via Ethereum Smart Contracts
Exploiting open-source dependencies and blockchain for covert malware delivery represents an advanced supply chain vector, directly compromising developer environments and digital assets.
Bedrock uniBTC Suffers $2 Million Exploit via Minting Logic Flaw
A critical smart contract vulnerability allowed attackers to mint undervalued tokens, leading to a significant loss of protocol assets.
Moby Trade Suffers Private Key Compromise, $2.5 Million Drained
A compromised administrative private key enabled unauthorized contract upgrades, exposing user funds to direct exfiltration.
Monero Network Vulnerable to 51% Attacks from Accessible Mining Hardware
Monero's RandomX implementation, designed for accessibility, inadvertently exposes the network to potential 51% attacks, risking chain reorganizations and undermining transactional finality.
UPCX Platform Suffers $70 Million Private Key Compromise and Contract Upgrade Exploit
A compromised administrative private key enabled a malicious smart contract upgrade, allowing an attacker to drain $70 million from the UPCX payment platform.
Iran’s Nobitex Exchange Suffers $90 Million Cyberattack via Malware
Politically motivated breach of a major exchange's hot wallets highlights critical risks from compromised credentials and nation-state cyber warfare.
Shibarium Bridge Compromise Contained by Rapid Team Response and Token Freeze
A flash loan attack leveraging validator key compromise exposed critical bridge governance flaws, swiftly mitigated by a BONE token freeze and multisig intervention.
Web3 Wallet Transaction Simulation Spoofing Drains User Funds
Attackers manipulate Web3 wallet transaction previews via time-delay exploits, enabling full wallet drains after user approval, a critical flaw in user-facing security.
