Stablecoin Protocol USPD Drained via Stealth Proxy Initialization Attack
A novel Clandestine Proxy In the Middle attack compromised USPD's deployment, enabling the stealthy minting of 98M tokens and a $1M collateral drain.
North Korean Hackers Compromise Web3 Developer Supply Chain via Malicious NPM Packages
The compromise of 197 open-source NPM dependencies introduces systemic risk, enabling remote code execution and project-level key exfiltration during build processes.
Balancer V2 Stable Pools Drained Exploiting Compounded Precision Rounding Flaw
A catastrophic arithmetic precision flaw in ComposableStablePools allowed batch-swap manipulation, enabling the systematic draining of $128M in liquidity.
Balancer V2 Stable Pools Drained via Compounded Precision Rounding Flaw
Precision loss in Balancer's core invariant math was weaponized via atomic batch swaps, compromising pool integrity and draining $128M.
Smartphone Chip Vulnerability Allows Private Key Compromise via Electromagnetic Attack
A critical hardware flaw in the MediaTek 7300 chip enables an electromagnetic pulse attack to bypass boot security and steal private keys.
Legacy Yearn Pool Drained Exploiting Infinite Token Minting Flaw
A logic flaw in the legacy stableswap mint function enabled infinite token issuance, creating a systemic risk for all integrated liquidity pools.
Yearn Finance yETH Pool Drained Exploiting Custom Stableswap Minting Flaw
A critical logic flaw in a custom stableswap implementation enabled an attacker to mint near-infinite yETH, creating an immediate, catastrophic liquidity drain.
High-Profile Web3 Social Accounts Compromised, Leading to User Wallet Drains
Supply chain failure via compromised employee accounts weaponizes trusted social channels, tricking users into malicious token approvals.
Centralized Exchange Hot Wallet Compromised Stealing Thirty Million Solana Assets
A compromised hot wallet private key allowed unauthorized withdrawals, immediately jeopardizing user funds held in operational custody.
