Moonwell Lending Protocol Drained by Stale Price Oracle Manipulation Attack
Protocol integration of a deprecated price feed enabled an attacker to collateralize virtually worthless tokens for $1.1 million in illicit loans.
Front-End Framework Vulnerability Exposes Decentralized Finance User Wallets
Critical remote code execution flaw in widely adopted web frameworks creates a new, pervasive attack surface for DeFi user asset compromise.
Official PEPE Website Compromised Redirecting Users to Wallet Drainer Malware
Front-end compromise weaponized a trusted interface, injecting an invisible script to execute unauthorized token approvals and drain connected user wallets.
International Law Enforcement Seizes Major Cryptocurrency Mixing Service Infrastructure
The takedown of a long-running mixer severely compromises the anonymity of past transactions, exposing criminal actors and their asset flows.
Yearn Legacy yETH Pool Drained by Infinite Token Minting Flaw
A stale storage cache in a legacy stableswap contract enabled an infinite minting attack, leading to $9M in asset loss and systemic LST imbalance.
Balancer Protocol Drained Exploiting Rounding Logic Flaw and Batch Swaps
A sophisticated BatchSwap and rounding error exploit in Stable Pools allowed for asset draining, underscoring systemic risk in complex DeFi logic.
Upbit Hot Wallet Drained via Internal System Signature Generation Flaw
The exchange's internal wallet software generated predictable signature data, enabling the Lazarus Group to reconstruct private keys and drain $30M in Solana assets.
Yearn yETH Pool Drained via Unreset Cached Storage Logic Flaw
A failure to clear cached virtual balances after a full pool withdrawal enabled an attacker to mint infinite LP tokens, compromising $9 million in liquid staking assets .
Gala Games Protocol Exploited through Critical Access Control Flaw
A critical access control flaw in a privileged address enabled the unauthorized minting of $216 million in assets, triggering immediate market instability.
