Individual Bitcoin Investor Drained $91 Million via Social Engineering Attack
This high-value breach confirms that the human layer remains the critical attack surface, leveraging sophisticated impersonation to bypass hardware wallet security.
Web3 Users Targeted by Malicious NPM Package Supply Chain Attack
Malicious NPM dependencies leverage cloaking to redirect users to phishing sites, compromising front-end integrity and asset security.
Stablecoin Protocol Resupply Drained by ERC-4626 Price Manipulation Flaw
A donation attack exploited the ERC-4626 vault's empty state to inflate share price, bypassing solvency checks and draining collateral.
Balancer Protocol Drained Exploiting BatchSwap Composable Stable Pool Rounding Flaw
The subtle rounding error in V6 Composable Stable Pool logic was weaponized, enabling batchSwap manipulation to siphon $121 million in assets.
KyberSwap Elastic Concentrated Liquidity Drained Exploiting Cross-Tick Precision Error
A critical rounding flaw in the AMM's tick mechanism permitted flash loan-backed price manipulation, causing double liquidity counting and massive asset extraction.
Hyperliquid Liquidity Pool Suffers $4.9 Million Loss from Market Manipulation
Coordinated market spoofing on an illiquid asset leveraged high protocol risk, creating a $4.9M bad debt for the HLP vault.
FEG Bridge Drained One Million Dollars via Cross-Chain Verification Flaw
A critical logic error in the cross-chain relayer allowed an attacker to bypass deposit verification, compromising $1M across three chains.
Malicious NPM Packages Exploit Software Supply Chain to Steal User Crypto
A new npm supply chain attack leverages cloaking and fake CAPTCHAs for unauthenticated redirection, directly enabling user financial theft.
Open-Source AI Framework API Flaw Enables Global Cryptojacking Botnet
Unauthenticated Remote Code Execution in the Ray API is being weaponized to steal premium cloud compute for a self-propagating, resource-draining cryptojacking operation.
