<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:breach="https://breachnotes.vulnetix.com/xmlns/breach/1.0"><channel><title>Cryptocurrency</title><link>https://breachnotes.vulnetix.com/cryptocurrency/</link><description>Cryptocurrency, DeFi, and Web3 security incidents including exchange hacks, bridge exploits, and smart contract vulnerabilities</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>Breach Notes Project</managingEditor><lastBuildDate>Sun, 12 Apr 2026 12:18:39 +0000</lastBuildDate><atom:link href="https://breachnotes.vulnetix.com/cryptocurrency/index.xml" rel="self" type="application/rss+xml"/><item><title>SEC Form 8-K</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-04_bitcoin-depot-hack/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-04_bitcoin-depot-hack/</guid><description>Bitcoin ATM operator Bitcoin Depot has disclosed a March 23 hack in which attackers stole 50.903 BTC (~$3.67 million) from company wallets. According to the company's disclosure with the SEC, the exploiters gained access to the company's IT systems and wallet credentials, allowing them to steal the …</description><content:encoded><![CDATA[<p>Bitcoin ATM operator Bitcoin Depot has disclosed a March 23 hack in which attackers stole 50.903 BTC (~$3.67 million) from company wallets. According to the company&rsquo;s disclosure with the SEC, the exploiters gained access to the company&rsquo;s IT systems and wallet credentials, allowing them to steal the assets.Bitcoin Depot is the largest operator of crypto ATMs globally and in the United States, with approximately 8,700 kiosks in the US and 9,200 worldwide.</p>
<p>Total loss estimated at $3,665,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.sec.gov/Archives/edgar/data/1901799/000119312526147772/btm-20260406.htm</breach:sourceUrl><breach:dateOfBreach>2026-04-06</breach:dateOfBreach><breach:dateOfDisclosure>2026-04-06</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Bitcoin Depot</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>3665000</breach:financialLossUsd></item><item><title>"Drift says $280M exploit tied to 'sophisticated' admin takeover; ZachXBT criticizes Circle over USDC handling"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-04_drift-exploit/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-04_drift-exploit/</guid><description>The Solana-based Drift defi perpetual futures exchange was exploited for $285 million. The project alerted the community on social media, writing: "Drift Protocol is experiencing an active attack. ... This is not an April Fools joke."The project later described the exploit as "a novel attack …</description><content:encoded><![CDATA[<p>The Solana-based Drift defi perpetual futures exchange was exploited for $285 million. The project alerted the community on social media, writing: &ldquo;Drift Protocol is experiencing an active attack. &hellip; This is not an April Fools joke.&ldquo;The project later described the exploit as &ldquo;a novel attack involving durable nonces, resulting in a rapid takeover of Drift&rsquo;s Security Council administrative powers.&rdquo; Once the attacker had access to admin capabilities, they quickly eliminated risk management limits on the protocol and drained huge quantities of tokens, which they swapped to USDC and then ETH. The attack was attributed to extremely sophisticated social engineering, likely by North Korean hackers.Some have criticized USDC&rsquo;s issuer, Circle, for not freezing the stolen funds during the six hours they were held in USDC. Unlike ETH, USDC is controlled by a centralized company that can, and regularly does, freeze assets determined to have been stolen or connected to illicit activity.The theft is among the largest in defi history.</p>
<p>Total loss estimated at $285,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/396183/drift-280m-exploit-zachxbt-circle</breach:sourceUrl><breach:dateOfBreach>2026-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2026-04-01</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>Drift</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>285000000</breach:financialLossUsd></item><item><title>"On the Future of Balancer: Shutting Down Balancer Labs, Supporting the Path Forward"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-03_balancer-labs-shuts-down/</link><pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-03_balancer-labs-shuts-down/</guid><description>After a November 2025 exploit in which $110 million was drained from the Balancer defi protocol, the company behind the project has announced it will shut down. Besides the massive loss, the hack also caused users to flee the protocol, and Balancer's total value locked quickly plummeted from around …</description><content:encoded><![CDATA[After a November 2025 exploit in which $110 million was drained from the Balancer defi protocol, the company behind the project has announced it will shut down. Besides the massive loss, the hack also caused users to flee the protocol, and Balancer&rsquo;s total value locked quickly plummeted from around $775 million to around $300 million. It has continued to decline since, now hovering around $150 million.Balancer co-founder Fernando Martinelli has said he strongly considered shutting down the protocol entirely, but ultimately decided to continue the project as it generates a relatively small amount of revenue. Instead, the project will move to being operated by a DAO and operating company, which Martinelli hopes will allow them to dodge &ldquo;real and ongoing legal exposure&rdquo; and &ldquo;the liability of past security incidents&rdquo;.Although another Balancer co-founder has optimistically presented this as &ldquo;the start of a better chapter&rdquo; for Balancer, it remains to be seen whether a skeleton crew will be able to revive the project.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://forum.balancer.fi/t/on-the-future-of-balancer-shutting-down-balancer-labs-supporting-the-path-forward/7002/4</breach:sourceUrl><breach:dateOfBreach>2026-03-24</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-24</breach:dateOfDisclosure><breach:initialAttackVector>Protocol collapse / insolvency</breach:initialAttackVector><breach:vendorProduct>Balancer Labs</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Venus Protocol left with roughly $2M in bad debt after exploit manipulates Thena's THE token price"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-03_venus-protocol-bad-debt/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-03_venus-protocol-bad-debt/</guid><description>The BNB Chain's Venus Protocol lending protocol accumulated $2.15 million in bad debt after an exploiter manipulated the price of the Thena protocol's THE token. THE had very low liquidity, and the exploiter took advantage of it to manipulate the THE price oracle by borrowing against THE, using the …</description><content:encoded><![CDATA[<p>The BNB Chain&rsquo;s Venus Protocol lending protocol accumulated $2.15 million in bad debt after an exploiter manipulated the price of the Thena protocol&rsquo;s THE token. THE had very low liquidity, and the exploiter took advantage of it to manipulate the THE price oracle by borrowing against THE, using the borrowed funds to buy more THE, and repeating — causing the price oracle to reflect higher and higher prices. The attacker was able to avoid a supply cap on Venus by &ldquo;donating&rdquo; the funds rather than depositing them in the standard way.While the exploit left the Venus Protocol with over $2 million in bad debt, it&rsquo;s not clear if the attacker even made money from the exploit. The exploiter&rsquo;s position was ultimately liquidated, collapsing the increase in THE price. However, it&rsquo;s possible the exploiter took advantage of the price discrepancy elsewhere to profit.The Venus Protocol has had a number of issues in the past — notably in June 2023, when the team developing the BNB Chain had to intervene when the a thief borrowed $150 million on Venus against stolen tokens and then faced liquidation.</p>
<p>Total loss estimated at $2,150,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/393622/venus-protocol-left-with-roughly-2m-in-bad-debt-after-exploit-manipulates-thenas-the-token-price</breach:sourceUrl><breach:dateOfBreach>2026-03-17</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-17</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Venus Protocol bad debt</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>2150000</breach:financialLossUsd></item><item><title>Tweet by Solv Protocol</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-03_solv-protocol-exploit/</link><pubDate>Thu, 05 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-03_solv-protocol-exploit/</guid><description>The Solv Protocol bitcoin defi lending and staking platform disclosed an exploit that they said affected fewer than ten users, but nevertheless netted the attacker 38 SolvBTC (a wrapped bitcoin token priced at $2.7 million). Although Solv has not disclosed specifics of the attack, some researchers …</description><content:encoded><![CDATA[<p>The Solv Protocol bitcoin defi lending and staking platform disclosed an exploit that they said affected fewer than ten users, but nevertheless netted the attacker 38 SolvBTC (a wrapped bitcoin token priced at $2.7 million). Although Solv has not disclosed specifics of the attack, some researchers have suggested it was a bug in the protocol&rsquo;s burn and mint functionality.</p>
<p>Total loss estimated at $2,700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/SolvProtocol/status/2029612210490933697</breach:sourceUrl><breach:dateOfBreach>2026-03-05</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-05</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Solv Protocol</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>2700000</breach:financialLossUsd></item><item><title>Tweet by Step Finance</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-02_step-finance-shuts-down/</link><pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-02_step-finance-shuts-down/</guid><description>Step Finance announced that, following a $30 million theft in late January, the project would be shutting down. Along with it, they will shut down SolanaFloor — a Solana-focused media project — and Remora Markets — a Solana-based tokenized stocks platform.According to Step Finance, "we explored …</description><content:encoded><![CDATA[Step Finance announced that, following a $30 million theft in late January, the project would be shutting down. Along with it, they will shut down SolanaFloor — a Solana-focused media project — and Remora Markets — a Solana-based tokenized stocks platform.According to Step Finance, &ldquo;we explored every possible path forward, including financing and acquisition opportunities. Unfortunately, we were unable to secure a viable outcome and have made the difficult decision to end all operations effective immediately.&ldquo;In reply to Step Finance&rsquo;s announcement, crypto investor Mike Dudas claimed that the project had contacted him about bridge financing, but that Step had never responded to his request for more information about the hack. &ldquo;i responded: &lsquo;would need to see the security post mortem before i could consider investing here&rsquo; &lt;crickets&gt;&rdquo;]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/StepFinance_/status/2025986934112145849</breach:sourceUrl><breach:dateOfBreach>2026-02-23</breach:dateOfBreach><breach:dateOfDisclosure>2026-02-23</breach:dateOfDisclosure><breach:initialAttackVector>Protocol collapse / insolvency</breach:initialAttackVector><breach:vendorProduct>Step Finance</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"IoTeX hit by private key exploit draining around $2 million from bridge contracts, per co-founder"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-02_iotex-bridge-exploit/</link><pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-02_iotex-bridge-exploit/</guid><description>IoTeX, a platform to connect IoT devices to blockchain networks, lost around $2 million after a private key compromise enabled an attacker to drain funds from the project's token safe. Initial loss estimates were as high as $8.8 million, although IoTeX CEO Raullen Chai stated that the actual loss …</description><content:encoded><![CDATA[<p>IoTeX, a platform to connect IoT devices to blockchain networks, lost around $2 million after a private key compromise enabled an attacker to drain funds from the project&rsquo;s token safe. Initial loss estimates were as high as $8.8 million, although IoTeX CEO Raullen Chai stated that the actual loss was closer to $2 million.Blockchain security researcher Specter has suggested there may be links between this attack and a $50 million theft from the Infini &ldquo;stablecoin neobank&rdquo; a year ago.</p>
<p>Total loss estimated at $2,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/390698/iotex-hit-by-private-key-exploit-draining-up-to-8-8-million-from-bridge-contracts</breach:sourceUrl><breach:dateOfBreach>2026-02-21</breach:dateOfBreach><breach:dateOfDisclosure>2026-02-21</breach:dateOfDisclosure><breach:initialAttackVector>Private key compromise</breach:initialAttackVector><breach:vendorProduct>IoTeX bridge</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>2000000</breach:financialLossUsd></item><item><title>"Prosecutors recover $22 million worth of lost Bitcoin"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-02_phishing-attack-on-south-korean-prosecutors/</link><pubDate>Thu, 19 Feb 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-02_phishing-attack-on-south-korean-prosecutors/</guid><description>Staff members working for South Korean prosecutors, for some reason, decided to use a "wallet checking tool" during an August 2025 audit of seized crypto assets. The tool they selected turned out to be a phishing tool, and five wallets were drained of 320 BTC.On February 19, the office announced …</description><content:encoded><![CDATA[<p>Staff members working for South Korean prosecutors, for some reason, decided to use a &ldquo;wallet checking tool&rdquo; during an August 2025 audit of seized crypto assets. The tool they selected turned out to be a phishing tool, and five wallets were drained of 320 BTC.On February 19, the office announced they had recovered the stolen assets and identified the thief.</p>
<p>Total loss estimated at $22,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.dlnews.com/articles/people-culture/prosecutors-find-22-million-worth-of-lost-bitcoin/</breach:sourceUrl><breach:dateOfBreach>2026-02-19</breach:dateOfBreach><breach:dateOfDisclosure>2026-02-19</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>Phishing attack on South Korean prosecutors</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>22000000</breach:financialLossUsd><breach:financialRecoveredUsd>22000000</breach:financialRecoveredUsd></item><item><title>"South Korean crypto firm accidentally sends $44 billion in bitcoins to users"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-02_bithumb-giveaway-error/</link><pubDate>Sat, 07 Feb 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-02_bithumb-giveaway-error/</guid><description>The South Korean cryptocurrency exchange Bithumb disclosed that it had accidentally given its customers more than 620,000 BTC (~$44 billion) in a promotional event gone wrong. Intending to reward each customer with at least ₩2,000 (~$1.40), the exchange accidentally rewarded each customer at least …</description><content:encoded><![CDATA[<p>The South Korean cryptocurrency exchange Bithumb disclosed that it had accidentally given its customers more than 620,000 BTC (<del>$44 billion) in a promotional event gone wrong. Intending to reward each customer with at least ₩2,000 (</del>$1.40), the exchange accidentally rewarded each customer at least 2,000 BTC (almost $140 million).The exchange announced that they had recovered 99.7% of the erroneously awarded tokens, leaving around 1,860 BTC (~$130 million) unaccounted for.The incident has drawn further scrutiny from Korean regulators, who said that the error &ldquo;has exposed the vulnerabilities and risks of virtual assets.&rdquo; Regulatory agencies in the country had already been cracking down on crypto firms following a $30 million hack of the Upbit crypto exchange in November 2025.</p>
<p>Total loss estimated at $132,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.reuters.com/world/asia-pacific/crypto-firm-accidentally-sends-44-billion-bitcoins-users-2026-02-07/</breach:sourceUrl><breach:dateOfBreach>2026-02-07</breach:dateOfBreach><breach:dateOfDisclosure>2026-02-07</breach:dateOfDisclosure><breach:vendorProduct>Bithumb giveaway error</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>132000000</breach:financialLossUsd><breach:financialRecoveredUsd>43868000000</breach:financialRecoveredUsd></item><item><title>"CrossCurve Threatens Legal Action After $3M Cross-Chain Bridge Exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-02_crosscurve-users-exploited-for-around-3-million/</link><pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-02_crosscurve-users-exploited-for-around-3-million/</guid><description>Hackers exploited a bug in smart contracts deployed by the defi protocol CrossCurve to steal an estimated $3 million across multiple blockchains. The thief was able to spoof cross-chain messages, causing the CrossCurve bridge to release assets not belonging to them.CrossCurve took a conciliatory …</description><content:encoded><![CDATA[<p>Hackers exploited a bug in smart contracts deployed by the defi protocol CrossCurve to steal an estimated $3 million across multiple blockchains. The thief was able to spoof cross-chain messages, causing the CrossCurve bridge to release assets not belonging to them.CrossCurve took a conciliatory tone in on-chain messages sent to the thief, writing, &ldquo;These tokens were wrongfully taken from users due to a smart contract exploit. We do not believe this was intentional on your part, and there is no indication of malicious intent.&rdquo; (Who among us hasn&rsquo;t accidentally stolen millions of dollars?) However, they warned, they planned to escalate to working with law enforcement and blockchain security firms to investigate and prosecute the theft if the funds were not returned within 72 hours.</p>
<p>Total loss estimated at $3,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/356599/crosscurve-legal-action-3m-cross-chain-bridge-exploit</breach:sourceUrl><breach:dateOfBreach>2026-02-01</breach:dateOfBreach><breach:dateOfDisclosure>2026-02-01</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract vulnerability exploit</breach:initialAttackVector><breach:vendorProduct>CrossCurve users</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>3000000</breach:financialLossUsd></item><item><title>Tweet by CertiK</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-01_step-finance-theft/</link><pubDate>Sat, 31 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-01_step-finance-theft/</guid><description>The Solana-based defi portfolio tracker Step Finance lost 261,854 SOL (~$28.7 million) when a thief gained access to treasury and fee wallets. It's not yet clear how the attacker was able to steal the funds, although Step Finance posted to Twitter that the theft occurred via a "well known attack …</description><content:encoded><![CDATA[<p>The Solana-based defi portfolio tracker Step Finance lost 261,854 SOL (~$28.7 million) when a thief gained access to treasury and fee wallets. It&rsquo;s not yet clear how the attacker was able to steal the funds, although Step Finance posted to Twitter that the theft occurred via a &ldquo;well known attack vector&rdquo;. Step wrote that they were working with cybersecurity firms and law enforcement to address the incident.</p>
<p>Total loss estimated at $28,700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CertiKAlert/status/2017610781660217643</breach:sourceUrl><breach:dateOfBreach>2026-01-31</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-31</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Step Finance theft</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>28700000</breach:financialLossUsd></item><item><title>"SwapNet Incident Post Mortem"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-01_matcha-meta-exploit/</link><pubDate>Sun, 25 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-01_matcha-meta-exploit/</guid><description>Some users of Matcha Meta, a decentralized exchange aggregator on the Base blockchain, suffered losses after a thief exploited a vulnerability in its SwapNet integration. SwapNet is another DEX aggregator that integrates with Matcha Meta, and Matcha blamed a vulnerability in their smart contracts …</description><content:encoded>&lt;p>Some users of Matcha Meta, a decentralized exchange aggregator on the Base blockchain, suffered losses after a thief exploited a vulnerability in its SwapNet integration. SwapNet is another DEX aggregator that integrates with Matcha Meta, and Matcha blamed a vulnerability in their smart contracts that enabled a thief to steal assets transferred via the integration.Most of the lost funds came from a single user, who lost $13.34 million in assets. Other users lost a combined $90,000.&lt;/p>
&lt;p>Total loss estimated at $13,430,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://meta.matcha.xyz/SwapNet-Incident-Post-Mortem</breach:sourceUrl><breach:dateOfBreach>2026-01-25</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-25</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Matcha Meta</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>13430000</breach:financialLossUsd></item><item><title>Tweet thread by Aperture Finance</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-01_aperture-finance-exploit/</link><pubDate>Sun, 25 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-01_aperture-finance-exploit/</guid><description>An attacker exploited a bug in an Aperture Finance smart contract to steal at least $3.4 million from users who had enabled "instant liquidity management" features. Aperture Finance is a defi platform that aims to allow users to trade by telling large language models their "intents".Aperture has …</description><content:encoded><![CDATA[<p>An attacker exploited a bug in an Aperture Finance smart contract to steal at least $3.4 million from users who had enabled &ldquo;instant liquidity management&rdquo; features. Aperture Finance is a defi platform that aims to allow users to trade by telling large language models their &ldquo;intents&rdquo;.Aperture has said they disabled portions of their web app impacted by the bug, and are working to try to trace and recover stolen funds.</p>
<p>Total loss estimated at $3,400,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/ApertureFinance/status/2015938720453820752</breach:sourceUrl><breach:dateOfBreach>2026-01-25</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-25</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Aperture Finance</breach:vendorProduct><breach:blockchain>ethereum, polygon, bsc, avalanche</breach:blockchain><breach:financialLossUsd>3400000</breach:financialLossUsd></item><item><title>Tweet by Saga</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-01_saga-exploit/</link><pubDate>Wed, 21 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-01_saga-exploit/</guid><description>The Saga project halted its blockchain after acknowledging that $7 million had been stolen. An attacker was evidently able to mint a large quantity of Saga Dollar tokens, though it's not yet clear whether it was because of a smart contract vulnerability, private key compromise, or some other issue. …</description><content:encoded><![CDATA[<p>The Saga project halted its blockchain after acknowledging that $7 million had been stolen. An attacker was evidently able to mint a large quantity of Saga Dollar tokens, though it&rsquo;s not yet clear whether it was because of a smart contract vulnerability, private key compromise, or some other issue. The attacker was quick to swap most of the assets to ETH to thwart asset freezes or blockchain halts.The Saga Dollar token lost its peg and fell to around $0.75 after the attack.</p>
<p>Total loss estimated at $7,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/Sagaxyz__/status/2014013472342761896</breach:sourceUrl><breach:dateOfBreach>2026-01-21</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-21</breach:dateOfDisclosure><breach:initialAttackVector>Private key compromise</breach:initialAttackVector><breach:vendorProduct>Saga</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>7000000</breach:financialLossUsd></item><item><title>Tweet by RuneCrypto_</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-01_nyc-token-crash/</link><pubDate>Mon, 12 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-01_nyc-token-crash/</guid><description>Shortly after losing his campaign for re-election as mayor of New York City, Eric Adams announced he would be launching "NYC Token". He's pitched the project as a fundraising tool to fight "antisemitism" and "anti-Americanism", and as a project to "teach our children how to embrace the blockchain …</description><content:encoded><![CDATA[<p>Shortly after losing his campaign for re-election as mayor of New York City, Eric Adams announced he would be launching &ldquo;NYC Token&rdquo;. He&rsquo;s pitched the project as a fundraising tool to fight &ldquo;antisemitism&rdquo; and &ldquo;anti-Americanism&rdquo;, and as a project to &ldquo;teach our children how to embrace the blockchain technology.&ldquo;He launched the project on January 12, and buyers piled in in hopes of being early to a high-profile crypto token endorsed by a public figure. However, within hours, the team began pulling liquidity as the price peaked, extracting around $2.5 million. As the price began to fall, the team added back around $1.5 million, leaving around $1 million unaccounted for.Additionally, on-chain researchers observed at least one wallet that spent almost $750,000 to purchase around 1.5 million $NYC around 10 minutes before the token was publicly announced, leading to speculation around insider trading. However, because of the token price crash after the team began pulling liquidity, the apparent insider ultimately lost around $500,000.People were quick to accuse Adams, or his unidentified crypto team, of rug-pulling buyers. Adams and the project&rsquo;s social media account have claimed that the team was simply moving or &ldquo;rebalanc[ing]&rdquo; liquidity, though they have not yet offered any explanation as to where the missing $1 million went.</p>
<p>Total loss estimated at $1,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/RuneCrypto_/status/2010848612427718893</breach:sourceUrl><breach:dateOfBreach>2026-01-12</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-12</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>NYC Token crash</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>1000000</breach:financialLossUsd><breach:affectedCount>500000</breach:affectedCount></item><item><title>Tweet by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-01_trezor-support-scam/</link><pubDate>Sat, 10 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-01_trezor-support-scam/</guid><description>A crypto holder has lost $282 million in bitcoin and litecoin after a scammer impersonating a customer support employee for the Trezor hardware wallet manufacturer successfully convinced them into revealing their seed phrase. After gaining access to the assets, they quickly swapped them to the …</description><content:encoded><![CDATA[<p>A crypto holder has lost $282 million in bitcoin and litecoin after a scammer impersonating a customer support employee for the Trezor hardware wallet manufacturer successfully convinced them into revealing their seed phrase. After gaining access to the assets, they quickly swapped them to the Monero privacycoin. The volume of assets was so large that the Monero price spiked as the scammer laundered the finds. The scammer also swapped assets using the THORChain project, which boasted on social media about the &ldquo;World record speedrun. ⚡️&rdquo; (presumably without realizing they were bragging about a thief using their project to launder money).Around $700,000 of the stolen assets were frozen thanks to intervention by a security firm called ZeroShadow, although this represents only 0.2% of the total loss.</p>
<p>Total loss estimated at $281,300,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/zachxbt/status/2012212936735912351</breach:sourceUrl><breach:dateOfBreach>2026-01-10</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-10</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>Trezor support</breach:vendorProduct><breach:blockchain>bitcoin, monero, litecoin</breach:blockchain><breach:financialLossUsd>281300000</breach:financialLossUsd><breach:financialRecoveredUsd>700000</breach:financialRecoveredUsd></item><item><title>Tweet by Truebit</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2026-01_truebit-exploit/</link><pubDate>Thu, 08 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2026-01_truebit-exploit/</guid><description>A bug in a smart contract belonging to the Ethereum-based Truebit project allowed an attacker to steal 8,535 ETH (~$26.4 million). The thief targeted one of the project's older contracts — deployed in 2021 — which contained a bug in which the price calculation to mint sufficiently large quantities …</description><content:encoded><![CDATA[<p>A bug in a smart contract belonging to the Ethereum-based Truebit project allowed an attacker to steal 8,535 ETH (~$26.4 million). The thief targeted one of the project&rsquo;s older contracts — deployed in 2021 — which contained a bug in which the price calculation to mint sufficiently large quantities of the protocol&rsquo;s TRU token would overflow, erroneously allowing people to mint large amounts of TRU for next to nothing. The exploiter took advantage of this by minting TRU and swapping it for ETH, ultimately causing the TRU token price to crash 99.9%. Another subsequent attack saw around $300,000 more drained from the project.Truebit acknowledged the hack and urged users not to interact with the vulnerable smart contract.</p>
<p>Total loss estimated at $26,600,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/Truebitprotocol/status/2009328032813850839</breach:sourceUrl><breach:dateOfBreach>2026-01-08</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-08</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Truebit</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>26600000</breach:financialLossUsd></item><item><title>"Flow blockchain probes security incident as FLOW token plunges over 40%"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-12_flow-infinite-mint-exploit/</link><pubDate>Sat, 27 Dec 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-12_flow-infinite-mint-exploit/</guid><description>The Flow blockchain suffered an exploit in which an attacker was able to mint a large number of wrapped FLOW tokens, which they then swapped to tokens on other blockchains. Ultimately around $3.9 million was stolen, and the FLOW token dramatically plunged in price.Some crypto exchanges, such as …</description><content:encoded><![CDATA[<p>The Flow blockchain suffered an exploit in which an attacker was able to mint a large number of wrapped FLOW tokens, which they then swapped to tokens on other blockchains. Ultimately around $3.9 million was stolen, and the FLOW token dramatically plunged in price.Some crypto exchanges, such as Upbit and Bithumb, halted withdrawals and deposits for FLOW after the exploit was discovered. Flow later confirmed the exploit, and said that validators &ldquo;executed a coordinated halt&rdquo; of the network to shut down the attack.</p>
<p>Total loss estimated at $3,900,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/383796/flow-blockchain-probes-security-incident-as-flow-token-plunges-over-40</breach:sourceUrl><breach:dateOfBreach>2025-12-27</breach:dateOfBreach><breach:dateOfDisclosure>2025-12-27</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Flow infinite mint</breach:vendorProduct><breach:blockchain>flow</breach:blockchain><breach:financialLossUsd>3900000</breach:financialLossUsd></item><item><title>Tweet by PeckShield</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-12_yearn-finance-exploit-4/</link><pubDate>Tue, 16 Dec 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-12_yearn-finance-exploit-4/</guid><description>Only weeks after losing $6.6 million to an infinite mint exploit, a Yearn Finance smart contract has again been exploited, allowing an attacker to make off with around 103 ETH (~$300,000). The affected contract is a legacy contract that was part of the Yearn v1 project (once known as iearn). The …</description><content:encoded><![CDATA[<p>Only weeks after losing $6.6 million to an infinite mint exploit, a Yearn Finance smart contract has again been exploited, allowing an attacker to make off with around 103 ETH (~$300,000). The affected contract is a legacy contract that was part of the Yearn v1 project (once known as iearn). The attacker used a flash loan to manipulate the price of tokens in the vault, allowing them to withdraw the iearn assets, which they then swapped for ETH.This is Yearn&rsquo;s fourth hack, following the $6.6 million theft in November, an $11 million exploit in 2023, and an $11 million exploit in 2021. Yearn also lost around $1.4 million in 2023 in connection to the Euler Finance attack.</p>
<p>Total loss estimated at $304,400.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/PeckShieldAlert/status/2001080131360842011</breach:sourceUrl><breach:dateOfBreach>2025-12-16</breach:dateOfBreach><breach:dateOfDisclosure>2025-12-16</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Yearn Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>304400</breach:financialLossUsd></item><item><title>Tweet by Aevo (fka Ribbon Finance)</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-12_ribbon-finance-exploit/</link><pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-12_ribbon-finance-exploit/</guid><description>Ribbon Finance, which has partially rebranded to Aevo, has lost $2.7 million after attackers exploited a vulnerability in the smart contract for legacy Ribbon vaults that enabled them to manipulate oracle prices and withdraw a large amount of ETH and USDC.Ribbon has announced it will cover $400,000 …</description><content:encoded><![CDATA[<p>Ribbon Finance, which has partially rebranded to Aevo, has lost $2.7 million after attackers exploited a vulnerability in the smart contract for legacy Ribbon vaults that enabled them to manipulate oracle prices and withdraw a large amount of ETH and USDC.Ribbon has announced it will cover $400,000 of the lost funds with its own assets. However, Ribbon is also offering users a lower-than-expected haircut on their assets by assuming that some of the largest affected accounts will not withdraw their assets, having been dormant for several years. While this plan may benefit active users, it seems like it could get very messy if those dormant users do wish to withdraw their assets and discover they&rsquo;ve been used to pay others.</p>
<p>Total loss estimated at $2,700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/ribbonfinance/status/1999815546007584817</breach:sourceUrl><breach:dateOfBreach>2025-12-12</breach:dateOfBreach><breach:dateOfDisclosure>2025-12-12</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Ribbon Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>2700000</breach:financialLossUsd></item><item><title>"Binance post confirming insider trading sends 'year of the yellow fruit' meme token even higher"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-12_binance-employee-suspended/</link><pubDate>Mon, 08 Dec 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-12_binance-employee-suspended/</guid><description>Binance has announced that the company has suspended an employee who used the platform's official Twitter accounts to promote a memecoin they had launched. The token, called "year of the yellow fruit", pumped in price after official Binance accounts coaxed followers to "harvest abundantly".Binance …</description><content:encoded><![CDATA[Binance has announced that the company has suspended an employee who used the platform&rsquo;s official Twitter accounts to promote a memecoin they had launched. The token, called &ldquo;year of the yellow fruit&rdquo;, pumped in price after official Binance accounts coaxed followers to &ldquo;harvest abundantly&rdquo;.Binance publicly acknowledged that an employee had been suspended for misconduct over the incident. &ldquo;These actions constitute abuse of their position for personal gain and violate our policies and code of professional conduct,&rdquo; Binance tweeted from its BinanceFutures account. After this announcement, the memecoin token price spiked even further.Earlier this year, Binance fired another employee after discovering they had used inside information to profit from a token sale event.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/381752/binance-confirm-insider-trading-year-yellow-fruit-meme-token-higher</breach:sourceUrl><breach:dateOfBreach>2025-12-08</breach:dateOfBreach><breach:dateOfDisclosure>2025-12-08</breach:dateOfDisclosure><breach:vendorProduct>Binance employee suspended</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain></item><item><title>"Fusaka Mainnet Prysm Incident"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-12_prysm-consensus-client-bug/</link><pubDate>Thu, 04 Dec 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-12_prysm-consensus-client-bug/</guid><description>Ethereum validators running the Prysm consensus client lost around 382 ETH ($1.18 million) after a bug resulted in delays that caused validators to miss blocks and attestations. Though the bug had been introduced around a month prior, it did not affect validators until Ethereum completed its …</description><content:encoded><![CDATA[<p>Ethereum validators running the Prysm consensus client lost around 382 ETH ($1.18 million) after a bug resulted in delays that caused validators to miss blocks and attestations. Though the bug had been introduced around a month prior, it did not affect validators until Ethereum completed its &ldquo;Fusaka&rdquo; network update on December 3. Around 19% of Ethereum validators use the Prysm consensus client, which is developed by Offchain Labs.</p>
<p>Total loss estimated at $1,180,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://prysm.offchainlabs.com/docs/misc/mainnet-postmortems/#fusaka-mainnet-prysm-incident</breach:sourceUrl><breach:dateOfBreach>2025-12-04</breach:dateOfBreach><breach:dateOfDisclosure>2025-12-04</breach:dateOfDisclosure><breach:initialAttackVector>Software bug / unintentional loss</breach:initialAttackVector><breach:vendorProduct>Prysm consensus client bug</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1180000</breach:financialLossUsd></item><item><title>"yETH Pool Exploit: Technical Incident Report and Math Reconstruction"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_yearn-finance-hack-3/</link><pubDate>Sun, 30 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_yearn-finance-hack-3/</guid><description>Yearn Finance, a defi yield protocol, has suffered another hack. The exploiter took advantage of bugs in the project's smart contract to drain assets from several of its pools by minting a huge number of yETH tokens and then withdrawing the corresponding asset in the pools.$2.4 million of the stolen …</description><content:encoded><![CDATA[<p>Yearn Finance, a defi yield protocol, has suffered another hack. The exploiter took advantage of bugs in the project&rsquo;s smart contract to drain assets from several of its pools by minting a huge number of yETH tokens and then withdrawing the corresponding asset in the pools.$2.4 million of the stolen assets, which were denominated in pxETH, a liquid staking token issued by Redacted Cartel, were recovered after the issuer burned the stolen tokens and reissued them to the team&rsquo;s wallet — essentially, removing the tokens from the hacker&rsquo;s wallet. However, the hacker routed the remaining funds through the Tornado Cash cryptocurrency mixer, which makes recovery substantially more challenging.This is the third time Yearn Finance has been hacked, following an $11 million exploit in 2023 and another $11 million exploit in 2021. Yearn also suffered around $1.4 million in losses in 2023 in connection to the Euler Finance attack.</p>
<p>Total loss estimated at $6,600,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://github.com/banteg/yeth-exploit/blob/main/report.pdf</breach:sourceUrl><breach:dateOfBreach>2025-11-30</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-30</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Yearn Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>6600000</breach:financialLossUsd><breach:financialRecoveredUsd>2400000</breach:financialRecoveredUsd></item><item><title>"Upbit Reveals 5.9B-Won Corporate Loss in Latest Hack, Fully Reimburses Users"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_upbit-hack/</link><pubDate>Thu, 27 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_upbit-hack/</guid><description>The Korean cryptocurrency exchange Upbit suffered a loss of around $30 million in various Solana-based assets due to a hack. Some entities have suggested that Lazarus, a North Korean state-sponsored cybercrime group, was behind the hack.Upbit reimbursed users who had lost funds from company …</description><content:encoded>&lt;p>The Korean cryptocurrency exchange Upbit suffered a loss of around $30 million in various Solana-based assets due to a hack. Some entities have suggested that Lazarus, a North Korean state-sponsored cybercrime group, was behind the hack.Upbit reimbursed users who had lost funds from company reserves. The exchange was able to freeze around $1.77 million of the stolen assets.This theft occurred exactly six years after Upbit suffered a theft of 342,000 ETH (priced at around $50 million at the time).&lt;/p>
&lt;p>Total loss estimated at $28,430,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/markets/2025/11/28/upbit-reveals-5-9b-won-corporate-loss-in-latest-hack-fully-reimburses-users</breach:sourceUrl><breach:dateOfBreach>2025-11-27</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-27</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>Upbit</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>28430000</breach:financialLossUsd><breach:financialRecoveredUsd>1770000</breach:financialRecoveredUsd></item><item><title>"Top DEXs Aerodrome, Velodrome hit with front-end compromise, urge users to avoid main domains"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_aerodrome-and-velodrome-suffer-website-takeovers/</link><pubDate>Sat, 22 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_aerodrome-and-velodrome-suffer-website-takeovers/</guid><description>Attackers redirected users intending to visit the websites for the decentralized exchanges Aerodrome and Velodrome to their own fraudulent versions using DNS hijacking, after taking control of the websites' domains. The platforms urged users not to visit the websites as they worked to regain …</description><content:encoded>Attackers redirected users intending to visit the websites for the decentralized exchanges Aerodrome and Velodrome to their own fraudulent versions using DNS hijacking, after taking control of the websites&amp;rsquo; domains. The platforms urged users not to visit the websites as they worked to regain control.This is the second time such an attack has happened to these same platforms, with another DNS hijacking incident occurring almost exactly two years ago. In that instance, users lost around $100,000 when submitting transactions via the scam websites.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/380037/top-dexs-aerodrome-velodrome-hit-with-front-end-compromise-urge-users-to-avoid-main-domains</breach:sourceUrl><breach:dateOfBreach>2025-11-22</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-22</breach:dateOfDisclosure><breach:initialAttackVector>DNS hijacking / domain takeover (front-end compromise)</breach:initialAttackVector><breach:vendorProduct>Aerodrome and Velodrome</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>Tweet thread by Homer J</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_cardano-founder-calls-the-fbi-after-chainsplit/</link><pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_cardano-founder-calls-the-fbi-after-chainsplit/</guid><description>On November 21, the Cardano blockchain suffered a major chainsplit after someone created a transaction that exploited an old bug in Cardano node software, causing the chain to split. The person who submitted the transaction fessed up on Twitter, writing, "It started off as a 'let's see if I can …</description><content:encoded><![CDATA[On November 21, the Cardano blockchain suffered a major chainsplit after someone created a transaction that exploited an old bug in Cardano node software, causing the chain to split. The person who submitted the transaction fessed up on Twitter, writing, &ldquo;It started off as a &rsquo;let&rsquo;s see if I can reproduce the bad transaction&rsquo; personal challenge and then I was dumb enough to rely on AI&rsquo;s instructions on how to block all traffic in/out of my Linux server without properly testing it on testnet first, and then watched in horror as the last block time on explorers froze.&ldquo;Charles Hoskinson, the founder of Cardano, responded with a tweet boasting about how quickly the chain recovered from the catastrophic split, then accused the person of acting maliciously. &ldquo;It was absolutely personal&rdquo;, Hoskinson wrote, adding that the person&rsquo;s public version of events was merely him &ldquo;trying to walk it back because he knows the FBI is already involved&rdquo;. Hoskinson added, &ldquo;There was a premeditated attack from a disgruntled [single pool operator] who spent months in the Fake Fred discord actively looking at ways to harm the brand and reputation of IOG. He targeted my personal pool and it resulted in disruption of the entire cardano network.&ldquo;Hoskinson&rsquo;s decision to involve the FBI horrified some onlookers, including one other engineer at the company who publicly quit after the incident. They wrote, &ldquo;I&rsquo;ve fucked up pen testing in a major way once. I&rsquo;ve seen my colleagues do the same. I didn&rsquo;t realize there was a risk of getting raided by the authorities because of that + saying mean things on the Internet.&rdquo;]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/KpunToN00b/status/1991937269910139194</breach:sourceUrl><breach:dateOfBreach>2025-11-21</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-21</breach:dateOfDisclosure><breach:initialAttackVector>AI-assisted attack or AI-generated exploit</breach:initialAttackVector><breach:vendorProduct>Cardano</breach:vendorProduct><breach:blockchain>cardano</breach:blockchain></item><item><title>Telegram post by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_gana-payment-hacked-for-3-1-million/</link><pubDate>Thu, 20 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_gana-payment-hacked-for-3-1-million/</guid><description>An attacker stole approximately $3.1 million from the BNB chain-based GANA Payment project. The thief laundered about $1 million of the stolen funds through Tornado Cash shortly after. The attacker was able transfer ownership of the GANA contract to themselves, possibly after a private key leak.The …</description><content:encoded><![CDATA[<p>An attacker stole approximately $3.1 million from the BNB chain-based GANA Payment project. The thief laundered about $1 million of the stolen funds through Tornado Cash shortly after. The attacker was able transfer ownership of the GANA contract to themselves, possibly after a private key leak.The theft was first observed by crypto sleuth zachxbt. Not long after, the project acknowledged on its Twitter account that &ldquo;GANA&rsquo;s interaction contract has been targeted by an external attack, resulting in unauthorized asset theft.&rdquo;</p>
<p>Total loss estimated at $3,100,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://t.me/investigations/289</breach:sourceUrl><breach:dateOfBreach>2025-11-20</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-20</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>GANA Payment</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>3100000</breach:financialLossUsd></item><item><title>"'Fat-Finger' Fail? Cardano Whale Torches $6M After Hitting Illiquid USDA Pool"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_cardano-holder-loses-6-million-to-slippage/</link><pubDate>Sun, 16 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_cardano-holder-loses-6-million-to-slippage/</guid><description>A holder of around 14.4 million ADA (~$6.9 million), the token for the Cardano network, made an expensive error when attempting to swap the tokens for a stablecoin. Because the stablecoin they were looking to buy is lightly used and has only around $10.6 million tokens in circulation, an attempt to …</description><content:encoded><![CDATA[<p>A holder of around 14.4 million ADA (~$6.9 million), the token for the Cardano network, made an expensive error when attempting to swap the tokens for a stablecoin. Because the stablecoin they were looking to buy is lightly used and has only around $10.6 million tokens in circulation, an attempt to purchase millions of the tokens on the market caused the dollar-pegged stablecoin&rsquo;s price to spike to around $1.26. The resulting slippage meant that the trader spent their roughly $6.9 million in tokens to receive a little less than $850,000 in the USDA stablecoin, meaning the trader essentially threw away $6 million.Observers have questioned what happened. It&rsquo;s possible that the holder, who had not been active on-chain since 2020, was simply unaware of the slippage risk. It&rsquo;s also possible that it was a &ldquo;fat-finger&rdquo; trade — that the trader accidentally selected the wrong stablecoin from a list of similarly named options, some of which could have more easily absorbed a trade of that size.</p>
<p>Total loss estimated at $6,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/markets/2025/11/17/fat-finger-fail-cardano-whale-torches-usd6m-after-hitting-illiquid-usda-pool</breach:sourceUrl><breach:dateOfBreach>2025-11-16</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-16</breach:dateOfDisclosure><breach:initialAttackVector>User error / fat-finger trade</breach:initialAttackVector><breach:vendorProduct>Cardano holder</breach:vendorProduct><breach:blockchain>cardano</breach:blockchain><breach:financialLossUsd>6000000</breach:financialLossUsd></item><item><title>Tweet thread by Elixir</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_elixir-shuts-down-deusd/</link><pubDate>Thu, 06 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_elixir-shuts-down-deusd/</guid><description>After the defi yield platform Stream Finance announced a $93 million loss, Elixir announced it would be discontinuing its deUSD synthetic stablecoin. Stream Finance owes $68 million to Elixir, and holds around $75 million deUSD.Elixir has announced that they plan to allow deUSD holders to redeem …</description><content:encoded>After the defi yield platform Stream Finance announced a $93 million loss, Elixir announced it would be discontinuing its deUSD synthetic stablecoin. Stream Finance owes $68 million to Elixir, and holds around $75 million deUSD.Elixir has announced that they plan to allow deUSD holders to redeem their tokens for USDC through a process that will also eliminate the risk of Stream Finance cashing out their deUSD without repaying their loan. According to Elixir, &amp;ldquo;Stream comprised of 99%+ of the lending positions (and has decided to not repay or close positions)&amp;rdquo;.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/elixir/status/1986443495351927257</breach:sourceUrl><breach:dateOfBreach>2025-11-06</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-06</breach:dateOfDisclosure><breach:initialAttackVector>Protocol collapse / insolvency</breach:initialAttackVector><breach:vendorProduct>Elixir</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>wrsETH Oracle Malfunction 11/4/25</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_moonwell-oracle-malfunction/</link><pubDate>Tue, 04 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_moonwell-oracle-malfunction/</guid><description>The Moonwell lending protocol, built on the Base Ethereum L2, wound up with $3.7 million in bad debt after an attacker took advantage of an oracle malfunction that caused the price of wrsETH to be massively inflated. The Chainlink oracle used by the project erroneously reported that a single wrsETH …</description><content:encoded><![CDATA[<p>The Moonwell lending protocol, built on the Base Ethereum L2, wound up with $3.7 million in bad debt after an attacker took advantage of an oracle malfunction that caused the price of wrsETH to be massively inflated. The Chainlink oracle used by the project erroneously reported that a single wrsETH token (Kelp DAO&rsquo;s wrapped restaked ETH) was priced at around 1.65 million ETH (<del>$5.8 billion). Within 30 seconds of the oracle reporting bad data, an attacker took advantage of the error to borrow huge amounts of tokens, which they then swapped to other tokens to cash out.Ultimately the attacker profited around 295 ETH (</del>$1 million), but the protocol was saddled with significantly more bad debt that the team will now have to grapple with.</p>
<p>Total loss estimated at $3,680,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://forum.moonwell.fi/t/wrseth-oracle-malfunction-11-4-25/2017</breach:sourceUrl><breach:dateOfBreach>2025-11-04</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-04</breach:dateOfDisclosure><breach:initialAttackVector>Oracle price manipulation</breach:initialAttackVector><breach:vendorProduct>Moonwell oracle malfunction</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>3680000</breach:financialLossUsd></item><item><title>"Balancer Hit by Apparent Exploit as $110M in Crypto Moves to New Wallets"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-11_balancer-exploit-2/</link><pubDate>Mon, 03 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-11_balancer-exploit-2/</guid><description>The defi protocol Balancer suffered a major exploit that drained over $110 million across several blockchains, including Ethereum, Polygon, Base, and Sonic. Attackers exploited faulty access control in the manageUserBalance function of Balancer's v2 smart contract, enabling unauthorized internal …</description><content:encoded><![CDATA[<p>The defi protocol Balancer suffered a major exploit that drained over $110 million across several blockchains, including Ethereum, Polygon, Base, and Sonic. Attackers exploited faulty access control in the manageUserBalance function of Balancer&rsquo;s v2 smart contract, enabling unauthorized internal withdrawals. The stolen tokens included 6,850 osETH, 6,590 wETH, and 4,260 wstETH, later consolidated into new wallets likely for laundering.The exploit also impacted forked protocols like Beets Finance, which lost around $3 million. Balancer&rsquo;s BAL token dropped over 10% following the theft.This was Balancer&rsquo;s third major security incident since 2020, despite prior audits by OpenZeppelin and Trail of Bits.</p>
<p>Total loss estimated at $110,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/markets/2025/11/03/balancer-hit-by-apparent-exploit-as-usd70m-in-crypto-moves-to-new-wallets</breach:sourceUrl><breach:dateOfBreach>2025-11-03</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-03</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract access control vulnerability</breach:initialAttackVector><breach:vendorProduct>Balancer</breach:vendorProduct><breach:blockchain>ethereum, polygon</breach:blockchain><breach:financialLossUsd>110000000</breach:financialLossUsd></item><item><title>"DeFi karma: Garden hacked for $11M after bridging Lazarus’ loot
"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-10_garden-hacked-for-11-million/</link><pubDate>Thu, 30 Oct 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-10_garden-hacked-for-11-million/</guid><description>The Garden bitcoin bridge suffered a roughly $11 million loss after one of its solvers was compromised. These solvers essentially act as market makers for the protocol. Some blockchain sleuths have questioned whether the affected solver, which Garden described as a separate entity, may actually be …</description><content:encoded><![CDATA[<p>The Garden bitcoin bridge suffered a roughly $11 million loss after one of its solvers was compromised. These solvers essentially act as market makers for the protocol. Some blockchain sleuths have questioned whether the affected solver, which Garden described as a separate entity, may actually be operated by the same team as Garden.There wasn&rsquo;t much sympathy to be had for Garden after this exploit. The protocol had recently announced hitting a milestone of bridging more than $2 billion in assets, but the celebration was criticized after zachxbt pointed out that a substantial portion of the bridged funds were proceeds of crimes being laundered to evade detection and recovery.</p>
<p>Total loss estimated at $11,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://protos.com/defi-karma-garden-hacked-for-11m-after-bridging-lazarus-loot/</breach:sourceUrl><breach:dateOfBreach>2025-10-30</breach:dateOfBreach><breach:dateOfDisclosure>2025-10-30</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>Garden</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>11000000</breach:financialLossUsd></item><item><title>Tweet by Whale Alert</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-10_paxos-accidental-mint/</link><pubDate>Wed, 15 Oct 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-10_paxos-accidental-mint/</guid><description>Paxos, the issuer of PayPal's PYUSD stablecoin, accidentally minted 300 trillion of the supposedly dollar-pegged token. For context, this is approximately 2.5x the global GDP, and around 125x the total number of US dollars actually in circulation.Paxos later announced that the mint was an "internal …</description><content:encoded><![CDATA[Paxos, the issuer of PayPal&rsquo;s PYUSD stablecoin, accidentally minted 300 trillion of the supposedly dollar-pegged token. For context, this is approximately 2.5x the global GDP, and around 125x the total number of US dollars actually in circulation.Paxos later announced that the mint was an &ldquo;internal technical error&rdquo;, and that they had burned the excess tokens.While PayPal promises its customers that &ldquo;Reserves are held 100% in US dollar deposits, US treasuries and cash equivalents – meaning that customer funds are available for 1:1 redemption with Paxos,&rdquo; there clearly isn&rsquo;t much in the way of safeguards to ensure that is always the case. As with most stablecoin issuers, Paxos merely issues self-reported and unreviewed portfolio reports, and monthly third-party attestations (not audits) of reserves.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/whale_alert/status/1978539763301744815</breach:sourceUrl><breach:dateOfBreach>2025-10-15</breach:dateOfBreach><breach:dateOfDisclosure>2025-10-15</breach:dateOfDisclosure><breach:initialAttackVector>Software bug / unintentional loss</breach:initialAttackVector><breach:vendorProduct>Paxos accidental mint</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Hyperliquid User Loses $21 Million Due to Private Key Compromise, Experts Say"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-10_0x0cdc-theft/</link><pubDate>Fri, 10 Oct 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-10_0x0cdc-theft/</guid><description>An attacker apparently obtained access to a victim's private key, enabling them to drain $21 million in various crypto assets. The attacker quickly bridged the stolen funds to ETH, then bounced through various addresses in hopes of disguising their origin and making the funds more challenging to …</description><content:encoded><![CDATA[<p>An attacker apparently obtained access to a victim&rsquo;s private key, enabling them to drain $21 million in various crypto assets. The attacker quickly bridged the stolen funds to ETH, then bounced through various addresses in hopes of disguising their origin and making the funds more challenging to recover.Some originally feared that the theft was enabled by an exploit on Hyperliquid itself, shortly after another Hyperliquid-based project was compromised, but the theft appears to have been a key leak rather than an exploit on the protocol.</p>
<p>Total loss estimated at $21,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/343849/hyperliquid-user-loses-21-million-private-key-compromise</breach:sourceUrl><breach:dateOfBreach>2025-10-10</breach:dateOfBreach><breach:dateOfDisclosure>2025-10-10</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>0x0cdC theft</breach:vendorProduct><breach:blockchain>hyperliquid</breach:blockchain><breach:financialLossUsd>21000000</breach:financialLossUsd></item><item><title>"Abracadabra loses $1.8 million in protocol's third major DeFi hack since 2024"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-10_abracadabra-exploit-3/</link><pubDate>Sat, 04 Oct 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-10_abracadabra-exploit-3/</guid><description>In their third major hack in two years, the Abracadabra defi lending project lost $1.8 million of their Magic Internet Money stablecoin. An attacker took advantage of a bug in the project smart contracts to borrow more than their provided collateral would normally allow. The attack was funded via …</description><content:encoded><![CDATA[<p>In their third major hack in two years, the Abracadabra defi lending project lost $1.8 million of their Magic Internet Money stablecoin. An attacker took advantage of a bug in the project smart contracts to borrow more than their provided collateral would normally allow. The attack was funded via Tornado Cash, and the exploiter then swapped the stolen tokens for ETH and laundered them back through Tornado.The project disclosed the theft, describing the exploit as affecting &ldquo;some deprecated contracts&rdquo;. They downplayed the theft, saying they&rsquo;d bought back the stolen assets using treasury funds.Abracadabra previously suffered a $13 million theft in March 2025, and a $6.5 million theft in January 2024.</p>
<p>Total loss estimated at $1,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/373453/abracadabra-loses-1-8-million-in-protocols-third-major-defi-hack-since-2024</breach:sourceUrl><breach:dateOfBreach>2025-10-04</breach:dateOfBreach><breach:dateOfDisclosure>2025-10-04</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Abracadabra</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1800000</breach:financialLossUsd></item><item><title>"Hyperliquid-based Hyperdrive loses $782,000 after smart contract exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_hyperdrive-exploit/</link><pubDate>Sat, 27 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_hyperdrive-exploit/</guid><description>Exploiters drained $782,000 in crypto assets from two markets on the Hyperdrive lending protocol, which is built on the Hyperliquid layer-1 blockchain. The attacker apparently took advantage of a security flaw in one of the project's smart contracts to drain the funds.Hyperdrive paused all markets …</description><content:encoded><![CDATA[<p>Exploiters drained $782,000 in crypto assets from two markets on the Hyperdrive lending protocol, which is built on the Hyperliquid layer-1 blockchain. The attacker apparently took advantage of a security flaw in one of the project&rsquo;s smart contracts to drain the funds.Hyperdrive paused all markets while investigating the vulnerability, and patched the bug. They also compensated those who had lost money in the exploit.</p>
<p>Total loss estimated at $782,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/372662/hyperliquid-based-hyperdrive-loses-782000-after-smart-contract-exploit</breach:sourceUrl><breach:dateOfBreach>2025-09-27</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-27</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Hyperdrive</breach:vendorProduct><breach:blockchain>hyperliquid</breach:blockchain><breach:financialLossUsd>782000</breach:financialLossUsd></item><item><title>"$3.6M Drained From Hyperliquid DeFi Platform Hypervault in ‘Abnormal Withdrawal’"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_hypervault-rug-pull/</link><pubDate>Fri, 26 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_hypervault-rug-pull/</guid><description>Only days after the Hypervault yield farming platform announced on Twitter that they'd surpassed $5 million in total value locked, the platform suddenly shut down its website and social media accounts. Simultaneously, the crypto security firm PeckShield observed an "abnormal withdrawal" of a large …</description><content:encoded><![CDATA[<p>Only days after the Hypervault yield farming platform announced on Twitter that they&rsquo;d surpassed $5 million in total value locked, the platform suddenly shut down its website and social media accounts. Simultaneously, the crypto security firm PeckShield observed an &ldquo;abnormal withdrawal&rdquo; of a large quantity of various crypto assets priced at around $3.6 million, which were swapped to 752 ETH (~$3.1 million) and laundered through Tornado Cash.The project had attracted customers by advertising yields of 76–95%.</p>
<p>Total loss estimated at $3,600,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/341539/3-6m-drained-from-hyperliquid-defi-platform-hypervault-in-abnormal-withdrawal</breach:sourceUrl><breach:dateOfBreach>2025-09-26</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-26</breach:dateOfDisclosure><breach:vendorProduct>Hypervault</breach:vendorProduct><breach:blockchain>hyperliquid</breach:blockchain><breach:financialLossUsd>3600000</breach:financialLossUsd></item><item><title>Tweet by Meta Alchemist</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_seedify-bridge-exploit/</link><pubDate>Tue, 23 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_seedify-bridge-exploit/</guid><description>An attacker exploited bridges for SFUND, the token issued by the Seedify launchpad and incubator. It appears the exploiter has profited around $1.7 million from the theft. Seedify issued a statement announcing the theft, and said the bridge contracts that were exploited had been deployed for three …</description><content:encoded><![CDATA[<p>An attacker exploited bridges for SFUND, the token issued by the Seedify launchpad and incubator. It appears the exploiter has profited around $1.7 million from the theft. Seedify issued a statement announcing the theft, and said the bridge contracts that were exploited had been deployed for three years. The SFUND token crashed in price by around 80% before recovering somewhat.Seedify has been a launchpad for blockchain games, NFT projects, and other web3 products. The team recently has embraced &ldquo;vibe coding&rdquo; — a practice in which people rely heavily on AI to generate code.</p>
<p>Total loss estimated at $1,700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/meta_alchemist/status/1970470733017968841</breach:sourceUrl><breach:dateOfBreach>2025-09-23</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-23</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Seedify bridge</breach:vendorProduct><breach:blockchain>bsc, polygon, ethereum</breach:blockchain><breach:financialLossUsd>1700000</breach:financialLossUsd></item><item><title>Tweet by Yala</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_yala-stablecoin-depegs/</link><pubDate>Sun, 14 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_yala-stablecoin-depegs/</guid><description>The YU bitcoin-backed stablecoin lost its intended dollar peg after what they described as "an attempted attack", later writing that there was an "unauthorized transfer of funds". Although they initially wrote that "All funds are safe", they later stated that they "identified the stolen assets …</description><content:encoded><![CDATA[<p>The YU bitcoin-backed stablecoin lost its intended dollar peg after what they described as &ldquo;an attempted attack&rdquo;, later writing that there was an &ldquo;unauthorized transfer of funds&rdquo;. Although they initially wrote that &ldquo;All funds are safe&rdquo;, they later stated that they &ldquo;identified the stolen assets on-chain and are actively working with law enforcement to pursue recovery.&rdquo; Research firm Lookonchain observed a large mint of the YU token that may have been related — if so, the attacker successfully stole at least 1,501 ETH ($6.75 million), and holds a substantial quantity of YU they still haven&rsquo;t sold.Despite the project&rsquo;s attempted reassurances, the YU stablecoin lost its $1 peg, plummeting as low as around $0.20. As of writing, about a day later, the stablecoin is still well below its peg, at around $0.94.</p>
<p>Total loss estimated at $7,600,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/yalaorg/status/1967071910845649348</breach:sourceUrl><breach:dateOfBreach>2025-09-14</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-14</breach:dateOfDisclosure><breach:vendorProduct>Yala stablecoin depegs</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>7600000</breach:financialLossUsd></item><item><title>"SwissBorg hacked for $41M SOL after third-party API compromise"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_swissborg-exploit/</link><pubDate>Tue, 09 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_swissborg-exploit/</guid><description>Thieves stole 192,600 SOL (~$41.5 million) from a wallet belonging to the Swiss cryptocurrency exchange SwissBorg. The attack is being blamed on a vulnerability in the API of Kiln, a staking partner used for SwissBorg's "Earn" program.SwissBorg announced that they would be reimbursing impacted …</description><content:encoded><![CDATA[<p>Thieves stole 192,600 SOL (~$41.5 million) from a wallet belonging to the Swiss cryptocurrency exchange SwissBorg. The attack is being blamed on a vulnerability in the API of Kiln, a staking partner used for SwissBorg&rsquo;s &ldquo;Earn&rdquo; program.SwissBorg announced that they would be reimbursing impacted customers using treasury funds, and working with security firms and law enforcement to try to recover the stolen assets.</p>
<p>Total loss estimated at $41,500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/swissborg-hacked-41m-sol-api-compromise</breach:sourceUrl><breach:dateOfBreach>2025-09-09</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-09</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>SwissBorg</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>41500000</breach:financialLossUsd></item><item><title>"Sui-based Nemo Protocol exploited for $2.4 million"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_nemo-protocol-exploit/</link><pubDate>Sun, 07 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_nemo-protocol-exploit/</guid><description>The Nemo Protocol on the Sui blockchain suffered a $2.4 million exploit. The defi yield infrastructure protocol acknowledged the theft shortly after, explaining they had paused the protocol smart contracts as they investigated the theft. It appears the thief was able to manipulate a price oracle, …</description><content:encoded>&lt;p>The Nemo Protocol on the Sui blockchain suffered a $2.4 million exploit. The defi yield infrastructure protocol acknowledged the theft shortly after, explaining they had paused the protocol smart contracts as they investigated the theft. It appears the thief was able to manipulate a price oracle, siphoning $2.4 million in USDC from the project. They then bridged the funds from Arbitrum to Ethereum.&lt;/p>
&lt;p>Total loss estimated at $2,400,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/369766/sui-nemo-protocol-exploit</breach:sourceUrl><breach:dateOfBreach>2025-09-07</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-07</breach:dateOfDisclosure><breach:initialAttackVector>Oracle price manipulation</breach:initialAttackVector><breach:vendorProduct>Nemo Protocol</breach:vendorProduct><breach:blockchain>sui</breach:blockchain><breach:financialLossUsd>2400000</breach:financialLossUsd></item><item><title>"Decentralized exchange Bunni loses an estimated $8.4 million in smart contract exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_bunni-exploit/</link><pubDate>Tue, 02 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_bunni-exploit/</guid><description>The Bunni decentralized exchange was exploited for approximately $8.4 million across the Unichain Ethereum layer 2 network and the Ethereum mainnet. Bunni acknowledged the theft and paused the protocol shortly after the attack.

Total loss estimated at $8,400,000.</description><content:encoded>&lt;p>The Bunni decentralized exchange was exploited for approximately $8.4 million across the Unichain Ethereum layer 2 network and the Ethereum mainnet. Bunni acknowledged the theft and paused the protocol shortly after the attack.&lt;/p>
&lt;p>Total loss estimated at $8,400,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/368987/bunni-exploit</breach:sourceUrl><breach:dateOfBreach>2025-09-02</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-02</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Bunni</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>8400000</breach:financialLossUsd></item><item><title>"Venus Protocol pauses after user loses funds in suspected phishing attack"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-09_venus-protocol-user-exploited/</link><pubDate>Tue, 02 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-09_venus-protocol-user-exploited/</guid><description>A user of the Venus Protocol borrowing and lending platform was successfully phished by an attacker who gained access to their account and drained $13.5 million in stablecoins and wBETH. The user signed a malicious transaction, approving the attacker's address for token withdrawals.Venus paused the …</description><content:encoded><![CDATA[<p>A user of the Venus Protocol borrowing and lending platform was successfully phished by an attacker who gained access to their account and drained $13.5 million in stablecoins and wBETH. The user signed a malicious transaction, approving the attacker&rsquo;s address for token withdrawals.Venus paused the protocol as they investigated the theft. The project then proposed a vote to force liquidation of the attacker&rsquo;s wallet and recover the stolen funds.</p>
<p>Total loss estimated at $2,100,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/369040/venus-protocol-pauses-after-user-loses-27-million-in-suspected-phishing-attack</breach:sourceUrl><breach:dateOfBreach>2025-09-02</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-02</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Venus Protocol user</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>2100000</breach:financialLossUsd><breach:financialRecoveredUsd>11400000</breach:financialRecoveredUsd></item><item><title>"Closing up (the) Shop"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-08_reddit-shuts-down-nft-avatars/</link><pubDate>Thu, 28 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-08_reddit-shuts-down-nft-avatars/</guid><description>Three years after launching "Collectible Avatars", the NFT project they didn't want to call "NFTs" because they were already becoming kind of cringe, Reddit has decided to pull the plug. "Well, this is one of those posts. The kind that we hoped we would never have to write," they wrote.Reddit has …</description><content:encoded><![CDATA[Three years after launching &ldquo;Collectible Avatars&rdquo;, the NFT project they didn&rsquo;t want to call &ldquo;NFTs&rdquo; because they were already becoming kind of cringe, Reddit has decided to pull the plug. &ldquo;Well, this is one of those posts. The kind that we hoped we would never have to write,&rdquo; they wrote.Reddit has ended submissions for new avatars, and will shut down its avatar shop, collection display on profiles, and NFT wallet feature.The feature is apparently so unused that the shutdown announcement garnered zero comments in the r/CollectibleAvatars subreddit. Besides posts relating to the shutdown, the most recent post in the subreddit was a year old.This is the second blockchain-based feature Reddit has sunset, following the October 2023 decision to end their &ldquo;Community Points&rdquo; feature.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.reddit.com/r/CollectibleAvatars/comments/1n2lajo/closing_up_the_shop/</breach:sourceUrl><breach:dateOfBreach>2025-08-28</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-28</breach:dateOfDisclosure><breach:vendorProduct>Reddit</breach:vendorProduct><breach:blockchain>polygon</breach:blockchain></item><item><title>Tweet by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-08_bitcoiner-socially-engineered-out-of-91-million/</link><pubDate>Tue, 19 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-08_bitcoiner-socially-engineered-out-of-91-million/</guid><description>A bitcoin holder reportedly fell for a social engineering attack after receiving communications from scammers posing as customer support for a crypto exchange and hardware wallet provider, according to crypto sleuth zachxbt. The thieves stole 783 BTC (~$91 million), which they then transferred …</description><content:encoded>&lt;p>A bitcoin holder reportedly fell for a social engineering attack after receiving communications from scammers posing as customer support for a crypto exchange and hardware wallet provider, according to crypto sleuth zachxbt. The thieves stole 783 BTC (~$91 million), which they then transferred through the Wasabi mixer to complicate tracing.&lt;/p>
&lt;p>Total loss estimated at $91,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/zachxbt/status/1958583129356345414</breach:sourceUrl><breach:dateOfBreach>2025-08-19</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-19</breach:dateOfDisclosure><breach:initialAttackVector>Social engineering attack</breach:initialAttackVector><breach:vendorProduct>Bitcoiner socially engineered out of $91 million</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>91000000</breach:financialLossUsd></item><item><title>"Qubic Claims Majority Control of Monero Hashrate, Raising 51% Attack Fears"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-08_monero-51-attack/</link><pubDate>Tue, 12 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-08_monero-51-attack/</guid><description>Monero, a privacy-focused blockchain network, has been undergoing an attempted 51% attack — an existential threat to any blockchain. In the case of a successful 51% attack, where a single entity becomes responsible for 51% or more of a blockchain's mining power, the controlling entity could …</description><content:encoded>Monero, a privacy-focused blockchain network, has been undergoing an attempted 51% attack — an existential threat to any blockchain. In the case of a successful 51% attack, where a single entity becomes responsible for 51% or more of a blockchain&amp;rsquo;s mining power, the controlling entity could reorganize blocks, attempt to double-spend, or censor transactions.A company called Qubic has been waging the 51% attack by offering economic rewards for miners who join the Qubic mining pool. They claim to be &amp;ldquo;stress testing&amp;rdquo; Monero, though many in the Monero community have condemned Qubic for what they see as a malicious attack on the network or a marketing stunt.Though Qubic has claimed to have achieved 51% of the Monero hashrate, these claims have been disputed. However, they do appear to be very close if not there already, and there have been multiple chain reorganizations — including a 6-block reorganization — suggesting that Qubic has established significant control over Monero mining.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/business/2025/08/12/qubic-claims-majority-control-of-monero-hashrate-raising-51-attack-fears</breach:sourceUrl><breach:dateOfBreach>2025-08-12</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-12</breach:dateOfDisclosure><breach:initialAttackVector>51% attack / network takeover</breach:initialAttackVector><breach:vendorProduct>Monero 51% attack</breach:vendorProduct><breach:blockchain>monero</breach:blockchain></item><item><title>Tweet by BobBodily</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-08_odin-fun-exploit/</link><pubDate>Tue, 12 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-08_odin-fun-exploit/</guid><description>Odin.fun, a bitcoin-based memecoin launchpad sort of like the popular pump.fun, was exploited for 58.2 BTC (~$7 million). The attacker had apparently manipulated the price of various tokens, then withdrew bitcoin based on the inflated prices.A team member suggested they were unsure of the total …</description><content:encoded><![CDATA[<p>Odin.fun, a bitcoin-based memecoin launchpad sort of like the popular pump.fun, was exploited for 58.2 BTC (~$7 million). The attacker had apparently manipulated the price of various tokens, then withdrew bitcoin based on the inflated prices.A team member suggested they were unsure of the total amount stolen, &ldquo;but as of right now, our company treasury isn&rsquo;t big enough to cover the losses&rdquo;.</p>
<p>Total loss estimated at $7,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/BobBodily/status/1955477887701881007</breach:sourceUrl><breach:dateOfBreach>2025-08-12</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-12</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Odin.fun</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>7000000</breach:financialLossUsd></item><item><title>"Solana lender Credix pledges full reimbursement after $4.5 million DeFi exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-08_credix-exploit/</link><pubDate>Mon, 04 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-08_credix-exploit/</guid><description>The defi lending protocol Credix lost $4.5 million to an exploit after a hacker gained control of an admin wallet and used it to mint tokens and drain liquidity pools.Credix subsequently announced they had negotiated with the thief, who they said agreed to return the funds "in return for money fully …</description><content:encoded><![CDATA[<p>The defi lending protocol Credix lost $4.5 million to an exploit after a hacker gained control of an admin wallet and used it to mint tokens and drain liquidity pools.Credix subsequently announced they had negotiated with the thief, who they said agreed to return the funds &ldquo;in return for money fully paid by the credix treasury&rdquo;. They did not disclose how much they paid to the hacker.However, shortly after this announcement, the company deleted its social media accounts and disappeared, leading some to wonder if the &ldquo;hack&rdquo; may have in fact been a rug pull by insiders. The promised reimbursements have not yet materialized.</p>
<p>Total loss estimated at $4,500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/365458/solana-lender-credix-defi-exploit</breach:sourceUrl><breach:dateOfBreach>2025-08-04</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-04</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Credix</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>4500000</breach:financialLossUsd></item><item><title>Tweet by CyversAlerts</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-07_superrare-hack/</link><pubDate>Mon, 28 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-07_superrare-hack/</guid><description>A hacker stole RARE tokens priced at around $731,000 after exploiting a vulnerability in a staking contract for the SuperRare NFT platform. The attacker funded the exploiter wallet around six months ago with assets transferred via the Tornado Cash cryptocurrency mixer.

Total loss estimated at …</description><content:encoded>&lt;p>A hacker stole RARE tokens priced at around $731,000 after exploiting a vulnerability in a staking contract for the SuperRare NFT platform. The attacker funded the exploiter wallet around six months ago with assets transferred via the Tornado Cash cryptocurrency mixer.&lt;/p>
&lt;p>Total loss estimated at $731,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CyversAlerts/status/1949766758635610276</breach:sourceUrl><breach:dateOfBreach>2025-07-28</breach:dateOfBreach><breach:dateOfDisclosure>2025-07-28</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>SuperRare</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>731000</breach:financialLossUsd></item><item><title>Tweet thread by CertiK</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-07_arcadia-finance-exploit/</link><pubDate>Tue, 15 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-07_arcadia-finance-exploit/</guid><description>The Arcadia Finance defi margin protocol was exploited for $3.5 million after an attacker found a vulnerability in a project smart contract. The attacker quickly swapped the stolen tokens and bridged them from Base to the Ethereum mainnet. The attacker stole the funds in two separate transactions …</description><content:encoded>&lt;p>The Arcadia Finance defi margin protocol was exploited for $3.5 million after an attacker found a vulnerability in a project smart contract. The attacker quickly swapped the stolen tokens and bridged them from Base to the Ethereum mainnet. The attacker stole the funds in two separate transactions that were more than four hours apart.Arcadia is backed by Coinbase Ventures. The project acknowledged the hack, encouraging users to revoke permissions.&lt;/p>
&lt;p>Total loss estimated at $3,500,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CertiKAlert/status/1944982279882997819</breach:sourceUrl><breach:dateOfBreach>2025-07-15</breach:dateOfBreach><breach:dateOfDisclosure>2025-07-15</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Arcadia Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>3500000</breach:financialLossUsd></item><item><title>Tweet by Ramon | Kinto</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-07_kinto-token-crashes/</link><pubDate>Thu, 10 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-07_kinto-token-crashes/</guid><description>The price of Kinto's $K token suddenly crashed 90%, sparking accusations of a rug pull. A tranche of investor tokens had just been unlocked recently, leading some to speculate that investors dumped their tokens on retail buyers.However, Kinto blamed the token crash on the exploit that was recently …</description><content:encoded><![CDATA[The price of Kinto&rsquo;s $K token suddenly crashed 90%, sparking accusations of a rug pull. A tranche of investor tokens had just been unlocked recently, leading some to speculate that investors dumped their tokens on retail buyers.However, Kinto blamed the token crash on the exploit that was recently disclosed by VennBuild, claiming on Twitter that &ldquo;we got hacked by a state actor&rdquo;. Venn seemed to corroborate Kinto&rsquo;s explanation that the crash was related to the exploit, tweeting that although they had tried to warn all vulnerable projects before publicly disclosing the bug, &ldquo;Sadly the Kinto token was not found despite being vulnerable, and exploited without time to mitigate.&ldquo;Kinto has announced a plan to try to fundraise to cover a $1.4 million loss in liquidity, then create a new $K token based on a snapshot of previous token holdings.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/ramonrecuero/status/1943313315486404841</breach:sourceUrl><breach:dateOfBreach>2025-07-10</breach:dateOfBreach><breach:dateOfDisclosure>2025-07-10</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>Kinto token crashes</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>Tweet by PeckShield</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-07_gmx-hack/</link><pubDate>Wed, 09 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-07_gmx-hack/</guid><description>The decentralized perpetual exchange GMX has been exploited for $42 million. The exploit involved a vulnerability in one version of the exchange's price calculation smart contract. GMX paused some trading while they investigated the hack, and placed other temporary restrictions on the platform.GMX …</description><content:encoded><![CDATA[<p>The decentralized perpetual exchange GMX has been exploited for $42 million. The exploit involved a vulnerability in one version of the exchange&rsquo;s price calculation smart contract. GMX paused some trading while they investigated the hack, and placed other temporary restrictions on the platform.GMX offered a 10% &ldquo;bug bounty&rdquo; to the hacker if they returned the funds. The attacker later returned $40.5 million in stolen assets; unusually, this is more than the 90% return requested by GMX.</p>
<p>Total loss estimated at $42,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/peckshield/status/1942947860645134450</breach:sourceUrl><breach:dateOfBreach>2025-07-09</breach:dateOfBreach><breach:dateOfDisclosure>2025-07-09</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>GMX</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>42000000</breach:financialLossUsd><breach:financialRecoveredUsd>40500000</breach:financialRecoveredUsd></item><item><title>Tweet by Texture</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-07_texture-hack/</link><pubDate>Wed, 09 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-07_texture-hack/</guid><description>An attacker exploited the Solana-based lending protocol Texture, stealing $2.2 million in user funds from one of the project's vaults.Shortly after the attack, Texture sent a message to the thief: "We are offering a 10% bounty of any funds stolen, which are yours to keep if you return the remaining …</description><content:encoded><![CDATA[<p>An attacker exploited the Solana-based lending protocol Texture, stealing $2.2 million in user funds from one of the project&rsquo;s vaults.Shortly after the attack, Texture sent a message to the thief: &ldquo;We are offering a 10% bounty of any funds stolen, which are yours to keep if you return the remaining 90%. You made an opsec mistake, but it’s not too late to avoid escalating the situation.&ldquo;The threat and &ldquo;bounty&rdquo; offer apparently worked, and the hacker returned $1.98 million, keeping $220,000 as a so-called &ldquo;greyhat bounty&rdquo;. &ldquo;As the hacker has fulfilled their side of the agreement, we will not pursue the matter further,&rdquo; wrote Texture.</p>
<p>Total loss estimated at $2,200,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/texture_fi/status/1942972150631002245</breach:sourceUrl><breach:dateOfBreach>2025-07-09</breach:dateOfBreach><breach:dateOfDisclosure>2025-07-09</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Texture</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>2200000</breach:financialLossUsd><breach:financialRecoveredUsd>1980000</breach:financialRecoveredUsd></item><item><title>Tweet thread by deeberiroz</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-07_vennbuild-discloses-bug/</link><pubDate>Wed, 09 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-07_vennbuild-discloses-bug/</guid><description>On July 9, security researchers at VennBuild and other firms disclosed a "critical backdoor" affecting thousands of smart contracts, which one of the researchers said left "over $10,000,000 at risk for months". The researchers suggested that the backdoor was likely created by Lazarus, a North Korean …</description><content:encoded><![CDATA[On July 9, security researchers at VennBuild and other firms disclosed a &ldquo;critical backdoor&rdquo; affecting thousands of smart contracts, which one of the researchers said left &ldquo;over $10,000,000 at risk for months&rdquo;. The researchers suggested that the backdoor was likely created by Lazarus, a North Korean state-sponsored hacking group.According to the researchers, they found thousands of contracts affected by the exploit, and worked with multiple protocols to upgrade contracts or withdraw vulnerable funds. The researchers theorized that the attackers were &ldquo;likely a sophisticated group waiting for a bigger target, not small wins.&rdquo;]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/deeberiroz/status/1943041785476894996</breach:sourceUrl><breach:dateOfBreach>2025-07-09</breach:dateOfBreach><breach:dateOfDisclosure>2025-07-09</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>VennBuild discloses bug</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Meta Pool, a Liquid Staking Protocol, Suffers $27M Exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-06_meta-pool-exploit/</link><pubDate>Tue, 17 Jun 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-06_meta-pool-exploit/</guid><description>An attacker exploited a vulnerability in the staking contract for Meta Pool, which is a liquid staking project. This allowed them to mint 9,700 mpETH, the project's liquid staking token, which is notionally worth $27 million. However, very low liquidity for the token meant that the attacker was only …</description><content:encoded><![CDATA[<p>An attacker exploited a vulnerability in the staking contract for Meta Pool, which is a liquid staking project. This allowed them to mint 9,700 mpETH, the project&rsquo;s liquid staking token, which is notionally worth $27 million. However, very low liquidity for the token meant that the attacker was only able to swap 10 ETH (~$25,000) of tokens.Meta Pool acknowledged the theft in a post shortly after the exploit was noticed by a blockchain security firm, and announced that the team had paused the project&rsquo;s smart contract.</p>
<p>Total loss estimated at $25,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/business/2025/06/17/liquid-staking-protocol-meta-pool-suffers-usd27m-exploit</breach:sourceUrl><breach:dateOfBreach>2025-06-17</breach:dateOfBreach><breach:dateOfDisclosure>2025-06-17</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Meta Pool</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>25000</breach:financialLossUsd></item><item><title>"DeFi Platform Cork Protocol Suffers $12M Smart Contract Exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-05_cork-protocol-hack/</link><pubDate>Wed, 28 May 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-05_cork-protocol-hack/</guid><description>Cork Protocol, a defi project aimed at "tokenizing the risk of depeg events for stablecoins and liquid (re)staking tokens", suffered a $12 million loss after an attacker exploited a bug in how the project's smart contract calculated exchange rates. The attacker stole around 3,762 wrapped staked ETH …</description><content:encoded><![CDATA[<p>Cork Protocol, a defi project aimed at &ldquo;tokenizing the risk of depeg events for stablecoins and liquid (re)staking tokens&rdquo;, suffered a $12 million loss after an attacker exploited a bug in how the project&rsquo;s smart contract calculated exchange rates. The attacker stole around 3,762 wrapped staked ETH (wstETH), which they exchanged for ETH. The project announced that they were investigating the theft and had paused markets.Cork had been audited in whole or in part by four different security firms. The project&rsquo;s funders include Andreessen Horowitz, OrangeDAO, and Steakhouse Financial, and Cork is a part of Andreessen Horowitz&rsquo;s Crypto Startup Accelerator.</p>
<p>Total loss estimated at $12,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/business/2025/05/28/a16z-backed-cork-protocol-suffers-usd12m-smart-contract-exploit</breach:sourceUrl><breach:dateOfBreach>2025-05-28</breach:dateOfBreach><breach:dateOfDisclosure>2025-05-28</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Cork Protocol</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>12000000</breach:financialLossUsd></item><item><title>Tweet by Cetus</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-05_cetus-exploit/</link><pubDate>Thu, 22 May 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-05_cetus-exploit/</guid><description>An attacker stole $223 million from the Sui-based Cetus Protocol. The project announced shortly after that $163 million of the funds had been frozen, leaving around $60 million unaccounted for.This led some to question how decentralized the project truly is if the funds can be frozen in such a …</description><content:encoded>&lt;p>An attacker stole $223 million from the Sui-based Cetus Protocol. The project announced shortly after that $163 million of the funds had been frozen, leaving around $60 million unaccounted for.This led some to question how decentralized the project truly is if the funds can be frozen in such a way.Sui validators later voted to return the frozen assets to the Cetus project. Cetus also announced that users would be fully compensated, and that they would cover the $60 million gap with project treasury funds and a loan from the Sui Foundation.&lt;/p>
&lt;p>Total loss estimated at $60,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CetusProtocol/status/1925567348586815622</breach:sourceUrl><breach:dateOfBreach>2025-05-22</breach:dateOfBreach><breach:dateOfDisclosure>2025-05-22</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Cetus</breach:vendorProduct><breach:blockchain>sui</breach:blockchain><breach:financialLossUsd>60000000</breach:financialLossUsd><breach:financialRecoveredUsd>163000000</breach:financialRecoveredUsd></item><item><title>Tweet by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-04_330-million-in-bitcoin-apparently-stolen-laundering-spikes-monero-price-by-over-40/</link><pubDate>Sun, 27 Apr 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-04_330-million-in-bitcoin-apparently-stolen-laundering-spikes-monero-price-by-over-40/</guid><description>3,250 BTC (~$330 million) were apparently stolen from a bitcoin holder and then quickly moved through multiple exchanges and swapped for the Monero privacycoin. Such a massive swap into Monero was apparently enough to cause the Monero price to spike from around $230 to as high as around $330, before …</description><content:encoded>&lt;p>3,250 BTC (~$330 million) were apparently stolen from a bitcoin holder and then quickly moved through multiple exchanges and swapped for the Monero privacycoin. Such a massive swap into Monero was apparently enough to cause the Monero price to spike from around $230 to as high as around $330, before retracting somewhat.&lt;/p>
&lt;p>Total loss estimated at $330,700,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/zachxbt/status/1916756932763046273</breach:sourceUrl><breach:dateOfBreach>2025-04-27</breach:dateOfBreach><breach:dateOfDisclosure>2025-04-27</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>$330 million in Bitcoin apparently stolen; laundering spikes Monero</breach:vendorProduct><breach:blockchain>monero, bitcoin</breach:blockchain><breach:financialLossUsd>330700000</breach:financialLossUsd></item><item><title>"Solana DeFi protocol Loopscale hit with $5.8 million exploit two weeks after launch"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-04_loopscale-exploit/</link><pubDate>Sat, 26 Apr 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-04_loopscale-exploit/</guid><description>A new Solana-based defi protocol called Loopscale, backed by Coinbase Ventures and Solana Labs, suffered a $5.8 million exploit only two weeks after its launch. The stolen funds represented 12% of the protocol's TVL. The project blamed the exploit on a bug in the protocol's pricing calculations. …</description><content:encoded><![CDATA[<p>A new Solana-based defi protocol called Loopscale, backed by Coinbase Ventures and Solana Labs, suffered a $5.8 million exploit only two weeks after its launch. The stolen funds represented 12% of the protocol&rsquo;s TVL. The project blamed the exploit on a bug in the protocol&rsquo;s pricing calculations. Although the project had been audited in February by OShield, the audit evidently did not detect the flaw.</p>
<p>Total loss estimated at $5,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/352083/solana-defi-protocol-loopscale-hit-with-5-8-million-exploit-two-weeks-after-launch</breach:sourceUrl><breach:dateOfBreach>2025-04-26</breach:dateOfBreach><breach:dateOfDisclosure>2025-04-26</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Loopscale</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>5800000</breach:financialLossUsd></item><item><title>Tweet by Term Labs</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-04_term-finance-misconfiguration/</link><pubDate>Sat, 26 Apr 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-04_term-finance-misconfiguration/</guid><description>The Ethereum-based lending project Term Finance lost $1.6 million when an oracle misconfiguration resulted in unintended liquidations. The team later announced that they had "successfully negotiated [the] return" of 333 ETH (~$600,000) that had been lost, and that another roughly 223 ETH (~$400,000) …</description><content:encoded><![CDATA[<p>The Ethereum-based lending project Term Finance lost $1.6 million when an oracle misconfiguration resulted in unintended liquidations. The team later announced that they had &ldquo;successfully negotiated [the] return&rdquo; of 333 ETH (<del>$600,000) that had been lost, and that another roughly 223 ETH (</del>$400,000) had been &ldquo;captured internally&rdquo;, leaving the final loss at around 362 ETH (~$650,000).</p>
<p>Total loss estimated at $600,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/term_labs/status/1916558870497181805</breach:sourceUrl><breach:dateOfBreach>2025-04-26</breach:dateOfBreach><breach:dateOfDisclosure>2025-04-26</breach:dateOfDisclosure><breach:initialAttackVector>Software bug / unintentional loss</breach:initialAttackVector><breach:vendorProduct>Term Finance misconfiguration</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>600000</breach:financialLossUsd><breach:financialRecoveredUsd>1000000</breach:financialRecoveredUsd></item><item><title>"ZKsync discloses $5 million attack from compromised airdrop admin account, triggering 20% price drop"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-04_zksync-theft/</link><pubDate>Tue, 15 Apr 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-04_zksync-theft/</guid><description>An attacker compromised an admin account belonging to the ZKsync Ethereum layer-2 project, which is built by Matter Labs. By doing so, they were able to steal approximately $5 million worth of the ZK token, which the project said were "the remaining unclaimed tokens from the ZKsync airdrop".ZK Sync …</description><content:encoded><![CDATA[<p>An attacker compromised an admin account belonging to the ZKsync Ethereum layer-2 project, which is built by Matter Labs. By doing so, they were able to steal approximately $5 million worth of the ZK token, which the project said were &ldquo;the remaining unclaimed tokens from the ZKsync airdrop&rdquo;.ZK Sync offered a 10% &ldquo;bug bounty&rdquo; to the thief, who accepted and returned 90% of the stolen funds.</p>
<p>Total loss estimated at $500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/350839/zksync-discloses-5-million-attack-compromised-airdrop-contract-admin-account</breach:sourceUrl><breach:dateOfBreach>2025-04-15</breach:dateOfBreach><breach:dateOfDisclosure>2025-04-15</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>ZKsync theft</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>500000</breach:financialLossUsd><breach:financialRecoveredUsd>4500000</breach:financialRecoveredUsd></item><item><title>Tweet by KiloEx</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-04_kiloex-exploit/</link><pubDate>Mon, 14 Apr 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-04_kiloex-exploit/</guid><description>KiloEx, a decentralized perpetual futures exchange, was exploited for $7.5 million. An attacker executed an oracle manipulation attack on KiloEx's pricing smart contracts to steal funds across the Base Ethereum layer-2 chain, BNB Chain, and Taiko.KiloEx halted trading on the platform while …</description><content:encoded><![CDATA[<p>KiloEx, a decentralized perpetual futures exchange, was exploited for $7.5 million. An attacker executed an oracle manipulation attack on KiloEx&rsquo;s pricing smart contracts to steal funds across the Base Ethereum layer-2 chain, BNB Chain, and Taiko.KiloEx halted trading on the platform while investigating the exploit, and contacted the hacker to try to negotiate a 90% return of funds.KiloEx later announced that the recovery had been successful, and that they would pay out the 10% &ldquo;bounty&rdquo;.</p>
<p>Total loss estimated at $750,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/KiloEx_perp/status/1911899600849617330</breach:sourceUrl><breach:dateOfBreach>2025-04-14</breach:dateOfBreach><breach:dateOfDisclosure>2025-04-14</breach:dateOfDisclosure><breach:initialAttackVector>Oracle price manipulation</breach:initialAttackVector><breach:vendorProduct>KiloEx</breach:vendorProduct><breach:blockchain>ethereum, bsc</breach:blockchain><breach:financialLossUsd>750000</breach:financialLossUsd><breach:financialRecoveredUsd>6750000</breach:financialRecoveredUsd></item><item><title>On-chain messages</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-03_zklend-thief-gets-robbed/</link><pubDate>Mon, 31 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-03_zklend-thief-gets-robbed/</guid><description>The zkLend lending platform was hoping they could secure the return of stolen funds from the attacker who stole 3,667 ETH (~$9.5 million at the time) from the platform in mid-February. They offered a 10% "bounty" for the return of the funds, but received no reply — that is, until now.On March 31, …</description><content:encoded><![CDATA[The zkLend lending platform was hoping they could secure the return of stolen funds from the attacker who stole 3,667 ETH (~$9.5 million at the time) from the platform in mid-February. They offered a 10% &ldquo;bounty&rdquo; for the return of the funds, but received no reply — that is, until now.On March 31, the attacker sent an on-chain message to the platform, writing: &ldquo;Hello I tried to move funds to tornado but I used a phishing website and all the funds have been lost. I am devastated. I am terribly sorry for all the havoc and losses caused. All the 2930 eth have been taken by that site owners. I do not have coins. Please redirect your efforts towards those site owners to see if you can recover some of the money. I am sorry.&ldquo;The zkLend project instructed the thief to return any remaining funds to their wallets, though no such transfer has happened yet.There has been substantial conversation over whether the hacker had truly been in turn scammed out of the stolen funds, had made up a fake phishing site to try to obscure the path of stolen money, or perhaps whether the whole event had been an April Fools&rsquo; joke. However, zkLend noted on Twitter that the phishing website, which imitates the Tornado Cash platform, has been operational for five years and is likely not connected to the hacker.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://etherscan.io/idm?addresses=0xcf31e1b97790afd681723fa1398c5ead9f69b98c,0x645c77833833a6654f7edaa977ebeabc680a9109&amp;type=1</breach:sourceUrl><breach:dateOfBreach>2025-03-31</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-31</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>zkLend</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"ICERAID: Report Immigrants, Get Paid In Crypto"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-03_iceraid/</link><pubDate>Sun, 30 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-03_iceraid/</guid><description>A project called "ICERAID" has emerged, promising to reward "intelligence gathering" on "suspicious activities" by photographing supposedly criminal behavior by undocumented immigrants to law enforcement. The project has been advertised by right wing personalities including Laura Loomer and Matt …</description><content:encoded><![CDATA[A project called &ldquo;ICERAID&rdquo; has emerged, promising to reward &ldquo;intelligence gathering&rdquo; on &ldquo;suspicious activities&rdquo; by photographing supposedly criminal behavior by undocumented immigrants to law enforcement. The project has been advertised by right wing personalities including Laura Loomer and Matt Gaetz, the latter of whom promised ICERAID lets people &ldquo;ping the cops faster than you can say &lsquo;sanctuary city&rsquo;.&ldquo;An instructional video posted to social media by the platform encourages people to &ldquo;do [their] patriotic duty&rdquo; by going to a District Court in a blue state, then &ldquo;Secretly snap a photo of the judge. Don&rsquo;t let the bailiff see you.&rdquo; The video shows a person uploading a photograph of Judge James Boasberg, who is presiding over the Trump administration deportation flights case, and reporting him for &ldquo;terrorism&rdquo;.The project has been likened to Stasi programs in which citizens were paid to spy and report on their neighbors.The founder of ICERAID, Jason Meyers, claims that he had had conversations with the White House about the project, although the website for the tool states it is not affiliated with any government agency and is not a website of the US government. Meyers has faced several enforcement actions resulting in disciplinary penalties over his involvement in security sales, and in 2014 was permanently banned by FINRA from broker-dealer activities after misappropriating investor funds. Meanwhile, multiple users have complained about not receiving their promised ICERAID tokens, and the project reportedly changed its terms after the token presale to reduce the amount of money buyers would earn for participating.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.therage.co/iceraid/</breach:sourceUrl><breach:dateOfBreach>2025-03-30</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-30</breach:dateOfDisclosure><breach:vendorProduct>ICERAID</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>Telegram post</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-03_bc1qvl-theft/</link><pubDate>Fri, 28 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-03_bc1qvl-theft/</guid><description>A Coinbase customer reportedly lost 400 BTC (~$35 million) in a scam identified by blockchain sleuth zachxbt. While investigating the massive theft from the single customer, he also observed at least $11 million in thefts from various other Coinbase customers throughout March.zachxbt has previously …</description><content:encoded>&lt;p>A Coinbase customer reportedly lost 400 BTC (~$35 million) in a scam identified by blockchain sleuth zachxbt. While investigating the massive theft from the single customer, he also observed at least $11 million in thefts from various other Coinbase customers throughout March.zachxbt has previously accused Coinbase of not doing enough to protect customers from hundreds of millions of dollars in scams, and he noted that in these cases, Coinbase had not marked the thief wallets as malicious in various cryptocurrency compliance tools.&lt;/p>
&lt;p>Total loss estimated at $46,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://t.me/investigations/242</breach:sourceUrl><breach:dateOfBreach>2025-03-28</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-28</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>bc1qvl theft</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>46000000</breach:financialLossUsd></item><item><title>"Hyperliquid delists JELLYJELLY memecoin amid whale manipulation fiasco"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-03_hyperliquid-manipulation/</link><pubDate>Thu, 27 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-03_hyperliquid-manipulation/</guid><description>HyperLiquid's Hyperliquidity Provider market making vault suffered a $13.5 million loss after an alleged market manipulation incident involving a memecoin called JELLYJELLY. A trader holding nearly $5 million (notional) of the token used a combination of shorts and spot purchases to force …</description><content:encoded><![CDATA[<p>HyperLiquid&rsquo;s Hyperliquidity Provider market making vault suffered a $13.5 million loss after an alleged market manipulation incident involving a memecoin called JELLYJELLY. A trader holding nearly $5 million (notional) of the token used a combination of shorts and spot purchases to force HyperLiquid to take on the short position. By forcing the token price up with large spot purchases, HLP suffered an unrealized loss of $13.5 million.HyperLiquid validators voted to delist the JELLY token. They also evidently overrode the JELLY price provided by the market oracle in an attempt to reduce their losses, leading an unrelated crypto executive to question &ldquo;Is that even legal?&rdquo;</p>
<p>Total loss estimated at $13,500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/348314/hyperliquid-delists-jellyjelly-memecoin-amid-whale-manipulation-fiasco</breach:sourceUrl><breach:dateOfBreach>2025-03-27</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-27</breach:dateOfDisclosure><breach:vendorProduct>HyperLiquid manipulation</breach:vendorProduct><breach:blockchain>hyperliquid</breach:blockchain><breach:financialLossUsd>13500000</breach:financialLossUsd></item><item><title>"Hacker steals $13 million in Abracadabra's 'Magic Internet Money' seemingly using a flash loan attack"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-03_abracadabra-exploit-2/</link><pubDate>Tue, 25 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-03_abracadabra-exploit-2/</guid><description>An attacker using a flash loan attack stole $13 million in the Magic Internet Money token from the Abracadabra project. The attack was enabled by a bug in the platform's smart contracts, and the hacker ultimately made off with around 6,262 ETH.This is the second time Abracadabra has been exploited, …</description><content:encoded><![CDATA[<p>An attacker using a flash loan attack stole $13 million in the Magic Internet Money token from the Abracadabra project. The attack was enabled by a bug in the platform&rsquo;s smart contracts, and the hacker ultimately made off with around 6,262 ETH.This is the second time Abracadabra has been exploited, after suffering a $6.5 million theft in January 2024.</p>
<p>Total loss estimated at $13,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/348059/hacker-steals-13-million-in-abracadabras-magic-internet-money-seemingly-using-a-flash-loan-attack?utm_source=rss&amp;utm_medium=rss</breach:sourceUrl><breach:dateOfBreach>2025-03-25</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-25</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Abracadabra</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>13000000</breach:financialLossUsd></item><item><title>"Binance memecoin platform Four Meme exploited again — this time for $130K"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-03_four-meme-hack-2/</link><pubDate>Tue, 18 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-03_four-meme-hack-2/</guid><description>After suffering an $183,000 loss to an attack in February, the BNB-based Four.Meme memecoin launchpad has been hacked again, this time for around $130,000. Four.Meme aims to be BNB's version of pump.fun, the popular Solana-based memecoin platform.Four.Meme acknowledged the latest theft on Twitter, …</description><content:encoded><![CDATA[<p>After suffering an $183,000 loss to an attack in February, the BNB-based Four.Meme memecoin launchpad has been hacked again, this time for around $130,000. Four.Meme aims to be BNB&rsquo;s version of pump.fun, the popular Solana-based memecoin platform.Four.Meme acknowledged the latest theft on Twitter, writing that they intended to reimburse users who lost money.</p>
<p>Total loss estimated at $130,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://protos.com/binance-memecoin-platform-four-meme-exploited-again-this-time-for-130k/</breach:sourceUrl><breach:dateOfBreach>2025-03-18</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-18</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Four.Meme</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>130000</breach:financialLossUsd></item><item><title>Tweet by 1inch</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-03_1inch-loses-5-million-to-smart-contract-bug/</link><pubDate>Wed, 05 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-03_1inch-loses-5-million-to-smart-contract-bug/</guid><description>An attacker exploited a smart contract belonging to the 1inch DEX aggregator, stealing $5 million in the USDC stablecoin and wETH. According to the platform, the vulnerability existed in "smart contracts using the obsolete Fusion v1 implementation", and the stolen funds belonged to resolvers (that …</description><content:encoded><![CDATA[<p>An attacker exploited a smart contract belonging to the 1inch DEX aggregator, stealing $5 million in the USDC stablecoin and wETH. According to the platform, the vulnerability existed in &ldquo;smart contracts using the obsolete Fusion v1 implementation&rdquo;, and the stolen funds belonged to resolvers (that is, entities that fulfill 1inch orders) rather than users.</p>
<p>Total loss estimated at $5,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/1inch/status/1897695348232978770</breach:sourceUrl><breach:dateOfBreach>2025-03-05</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-05</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>1inch</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>5000000</breach:financialLossUsd></item><item><title>Complaint</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_mirashi-hack/</link><pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_mirashi-hack/</guid><description>A plaintiff named Mandar Mirashi has filed a lawsuit against an unknown defendant accused of stealing around $40 million in bitcoin through a sophisticated phishing attack and/or device compromise. After receiving suspicious emails from or appearing to be from Google, the Ledger hardware wallet …</description><content:encoded><![CDATA[<p>A plaintiff named Mandar Mirashi has filed a lawsuit against an unknown defendant accused of stealing around $40 million in bitcoin through a sophisticated phishing attack and/or device compromise. After receiving suspicious emails from or appearing to be from Google, the Ledger hardware wallet manufacturer, and Apple, and after observing an apparent device compromise allowing an attacker to delete his Reddit account without his involvement, Mirashi moved 300 BTC from a Ledger hardware wallet, believing it to be compromised. An attacker then attempted to steal the funds from the hot wallet where he&rsquo;d moved them, but Mirashi was able to intervene in time to cancel the transaction. Mirashi moved the funds back to the Ledger, only to discover the next day that around 522 BTC had been stolen from two of his Ledger wallets.</p>
<p>Total loss estimated at $40,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.courtlistener.com/docket/69728891/1/mirashi-v-john-doe/</breach:sourceUrl><breach:dateOfBreach>2025-02-27</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-27</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>Mirashi</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>40000000</breach:financialLossUsd></item><item><title>Tweet by Suji Yan</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_suji-yan-wallet-hack/</link><pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_suji-yan-wallet-hack/</guid><description>Suji Yan, the founder of the Mask Network, suffered the loss of more than $4 million in various cryptocurrency assets to an apparent wallet hack. According to Yan, the theft happened on his birthday while he was at a party. "[E]ither the private key was leaked same day as my birthday and hacker …</description><content:encoded><![CDATA[<p>Suji Yan, the founder of the Mask Network, suffered the loss of more than $4 million in various cryptocurrency assets to an apparent wallet hack. According to Yan, the theft happened on his birthday while he was at a party. &ldquo;[E]ither the private key was leaked same day as my birthday and hacker manual[ly transferred assets] out or it might be an offline attack. I was in a private gathering with dozen friends and my phone was away for some minutes when I using the restroom etc.&rdquo;</p>
<p>Total loss estimated at $4,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/suji_yan/status/1895103068808642811</breach:sourceUrl><breach:dateOfBreach>2025-02-27</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-27</breach:dateOfDisclosure><breach:initialAttackVector>Private key compromise</breach:initialAttackVector><breach:vendorProduct>Suji Yan wallet</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>4000000</breach:financialLossUsd></item><item><title>"0xInfini Incident Analysis"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_almost-50-million-stolen-from-infini-stablecoin-neobank/</link><pubDate>Mon, 24 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_almost-50-million-stolen-from-infini-stablecoin-neobank/</guid><description>Around $49.5 million in the USDC stablecoin was stolen from the Infini crypto-focused "stablecoin neobank", a fintech company that promises "financial freedom" by "democratizing banking" and "redefining the future of digital finance".Infini experienced a different form of "financial freedom" when …</description><content:encoded><![CDATA[<p>Around $49.5 million in the USDC stablecoin was stolen from the Infini crypto-focused &ldquo;stablecoin neobank&rdquo;, a fintech company that promises &ldquo;financial freedom&rdquo; by &ldquo;democratizing banking&rdquo; and &ldquo;redefining the future of digital finance&rdquo;.Infini experienced a different form of &ldquo;financial freedom&rdquo; when attackers liberated almost $50 million from the company after a thief with access to a wallet with admin rights drained tokens, then swapped them for the DAI stablecoin, which unlike USDC cannot be frozen by its issuer.The attack came only a day after a celebratory tweet from the company in which it had announced that they had achieved $50 million in total value locked, suggesting that the theft affected substantially all of the assets on the platform. Despite this, they have claimed that transactions on the platform are unaffected, and when someone asked how that was possible, they simply replied: &ldquo;We&rsquo;ve got solid runway to operate. No worries.&ldquo;Infini attempted to contact the thief via on-chain message, threatening that they had &ldquo;gathered critical IP and device information&rdquo; about them, and asking them to return 80% of the funds in exchange for a promise that Infini &ldquo;will cease further tracking or analysis, and you will not face accountability&rdquo;. However, Infini&rsquo;s 48-hour deadline has come and gone without any reply.</p>
<p>Total loss estimated at $49,500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.certik.com/resources/blog/0xinfini-incident-analysis</breach:sourceUrl><breach:dateOfBreach>2025-02-24</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-24</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Almost $50 million stolen from Infini "stablecoin neobank"</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>49500000</breach:financialLossUsd></item><item><title>Tweet by Ben Zhou</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_bybit-hack/</link><pubDate>Fri, 21 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_bybit-hack/</guid><description>In what is looking like largest ever theft from a cryptocurrency exchange, attackers took control of a hot wallet belonging to the Bybit cryptocurrency exchange and moved a massive amount of ETH-based tokens amounting to approximately $1.5 billion in notional value (though it should be noted that …</description><content:encoded><![CDATA[<p>In what is looking like largest ever theft from a cryptocurrency exchange, attackers took control of a hot wallet belonging to the Bybit cryptocurrency exchange and moved a massive amount of ETH-based tokens amounting to approximately $1.5 billion in notional value (though it should be noted that that quantity of stolen tokens could not be quickly cashed out for that many dollars without affecting the ETH price).Bybit CEO Ben Zhou confirmed the attack on Twitter, writing that an attacker used an advanced phishing technique to take control of the hot wallet. Zhou also promised &ldquo;Bybit is Solvent even if this hack loss is not recovered, all of clients assets are 1 to 1 backed, we can cover the loss.&rdquo;</p>
<p>Total loss estimated at $1,457,110,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/benbybit/status/1892963530422505586</breach:sourceUrl><breach:dateOfBreach>2025-02-21</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-21</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>Bybit</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1457110000</breach:financialLossUsd><breach:financialRecoveredUsd>42890000</breach:financialRecoveredUsd></item><item><title>Tweet by 0xCygaar</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_abstract-cardex-hack/</link><pubDate>Tue, 18 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_abstract-cardex-hack/</guid><description>Around $400,000 in ETH was stolen from around 9,000 wallets on the Abstract layer-2 network, which is built by the same company that makes the Pudgy Penguins NFTs. It appears that the affected wallets had all been used to play Cardex, a fantasy trading card game that had launched only a week …</description><content:encoded><![CDATA[<p>Around $400,000 in ETH was stolen from around 9,000 wallets on the Abstract layer-2 network, which is built by the same company that makes the Pudgy Penguins NFTs. It appears that the affected wallets had all been used to play Cardex, a fantasy trading card game that had launched only a week prior.Attackers compromised a private key belonging to the game&rsquo;s creators, which allowed them to drain wallets that still had an active session with the game.</p>
<p>Total loss estimated at $400,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/0xCygaar/status/1891948692204368122</breach:sourceUrl><breach:dateOfBreach>2025-02-18</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-18</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Abstract Cardex</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>400000</breach:financialLossUsd><breach:affectedCount>9000</breach:affectedCount></item><item><title>Tweet by Lookonchain</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_milei-memecoin-promotion/</link><pubDate>Fri, 14 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_milei-memecoin-promotion/</guid><description>A tweet from Argentina's president Javier Milei promoted a memecoin called Libra, which he described as a "private project [that] will [be] dedicated to encouraging the growth of the Argentine economy by funding small Argentine businesses and startups". The token quickly soared in price as traders …</description><content:encoded><![CDATA[<p>A tweet from Argentina&rsquo;s president Javier Milei promoted a memecoin called Libra, which he described as a &ldquo;private project [that] will [be] dedicated to encouraging the growth of the Argentine economy by funding small Argentine businesses and startups&rdquo;. The token quickly soared in price as traders poured in.However, within hours of the launch, insiders began selling off their holdings of the token. The token had been highly concentrated among insiders, with around 82% of the token held in a small cluster of apparently insider addresses. Those insiders cashed out around $107 million, crashing the token price by around 95%.After the crash, Milei deleted his tweet promoting the project. He later claimed he was &ldquo;not aware of the details of the project and after having become aware of it I decided not to continue spreading the word (that is why I deleted the tweet).&rdquo;</p>
<p>Total loss estimated at $107,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/lookonchain/status/1890619615883219455</breach:sourceUrl><breach:dateOfBreach>2025-02-14</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-14</breach:dateOfDisclosure><breach:vendorProduct>Milei memecoin promotion</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>107000000</breach:financialLossUsd></item><item><title>Tweet by Four.Meme</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_four-meme-hack/</link><pubDate>Tue, 11 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_four-meme-hack/</guid><description>A BNB Chain memecoin platform, Four.Meme, announced on Twitter that they were "currently experiencing a malicious attack". The team briefly paused a portion of the service while deploying a fix, but brought it back online later that day. Around $183,000 was lost to the attack.

Total loss estimated …</description><content:encoded><![CDATA[<p>A BNB Chain memecoin platform, Four.Meme, announced on Twitter that they were &ldquo;currently experiencing a malicious attack&rdquo;. The team briefly paused a portion of the service while deploying a fix, but brought it back online later that day. Around $183,000 was lost to the attack.</p>
<p>Total loss estimated at $183,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/four_meme_/status/1889198796695044138</breach:sourceUrl><breach:dateOfBreach>2025-02-11</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-11</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Four.Meme</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>183000</breach:financialLossUsd></item><item><title>"AlleyCat - The Gambling Deployer!"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-02_alleycat-project-developer-takes-presale-money-to-fund-gambling-habit/</link><pubDate>Sat, 01 Feb 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-02_alleycat-project-developer-takes-presale-money-to-fund-gambling-habit/</guid><description>The creator of the AlleyCat Solana-based cryptocurrency project has reportedly taken about 600 SOL (~$130,000) raised during the project's presale and transferred it to gambling platforms including Sportsbet.io and Bitcasino. Although the project raised hundreds of thousands of dollars in presale …</description><content:encoded><![CDATA[<p>The creator of the AlleyCat Solana-based cryptocurrency project has reportedly taken about 600 SOL (<del>$130,000) raised during the project&rsquo;s presale and transferred it to gambling platforms including Sportsbet.io and Bitcasino. Although the project raised hundreds of thousands of dollars in presale funds, stating it was needed for token liquidity on launch, only 18 SOL (</del>$11,000) was ever used for liquidity.Altogether, around $827,000 has passed through the AlleyCat creator&rsquo;s Sportsbet.io account in seven months. Crypto scam-spotting account Rug Pull Finder has alleged that the AlleyCat creator is also behind other rugpulls.The AlleyCat cryptocurrency project is based on the 1983 Atari game of the same name, though the crypto project does not appear to have any affiliation with (or approval from) the game&rsquo;s creators.</p>
<p>Total loss estimated at $130,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://rugpullfinder.co/scams/f/alleycat---the-gambling-deployer</breach:sourceUrl><breach:dateOfBreach>2025-02-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-01</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>AlleyCat project developer takes presale money to fund gambling habit</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>130000</breach:financialLossUsd></item><item><title>"Poetic Justice"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_rugpuller-tool-rug-pulls-rugpullers/</link><pubDate>Fri, 31 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_rugpuller-tool-rug-pulls-rugpullers/</guid><description>A suite of software tools called DogWifTools was popular among memecoin creators looking to rug pull unsuspecting traders. By helping token creators mask supply control and fake trading activity, the tool was used to convince outside traders that a token had potential — at least, up until the token …</description><content:encoded><![CDATA[<p>A suite of software tools called DogWifTools was popular among memecoin creators looking to rug pull unsuspecting traders. By helping token creators mask supply control and fake trading activity, the tool was used to convince outside traders that a token had potential — at least, up until the token creator pulled the rug out from under them.However, poor security by the software developers allowed attackers to ship a remote access trojan (RAT) along with the DogWifTools release. Once the package was downloaded, the trojan began scanning infected devices for crypto private keys, login information, and other sensitive data. Attackers even used scans of identification documents taken from their targets&rsquo; computers to create Binance accounts.Ultimately, around $10 million was stolen from would-be scammers. Along with the virus, the people who compromised DogWifTools left an angry note on infected machines: &ldquo;Solana is a fucking joke and a scam from the beginning, it was designed for criminals by criminals! As a result, we have confiscated all your crypto, because you deserved it! You people who use automated tools to run these scam tokens are fucking disgusting to us. It&rsquo;s about time you got fucked over for once. Solana is nothing more than a shitty platform that enables scammers and rug pullers to steal from innocent users.&ldquo;They also launched an onion website containing a message: &ldquo;We specifically targeted scammers in the crypto market who were using tools to gain an unfair advantage over innocent, day-to-day traders. &hellip; We believe it was morally correct to confiscate money that was not rightfully theirs.&rdquo; They added that they would soon be publishing the user data they stole on the scammers.</p>
<p>Total loss estimated at $10,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://rekt.news/poetic-justice/</breach:sourceUrl><breach:dateOfBreach>2025-01-31</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-31</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Rugpuller tool</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>10000000</breach:financialLossUsd></item><item><title>"Solana Meme Coin Dogwifhat Has No Deal With Las Vegas Sphere, Venue Says"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_dogwifhat-memecoin-lies-about-deal-to-put-the-meme-on-the-las-vegas-sphere-after-raising-700-000-to-pay-for-it/</link><pubDate>Fri, 31 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_dogwifhat-memecoin-lies-about-deal-to-put-the-meme-on-the-las-vegas-sphere-after-raising-700-000-to-pay-for-it/</guid><description>In late January, the creator of the "dogwifhat" memecoin announced "Officially confirmed. Viva hat vegas." in a tweet accompanied by a photo overlaying the dog meme with the Las Vegas Sphere. Project organizers had raised around $700,000 in March 2024 to fund the project, hoping that the …</description><content:encoded><![CDATA[In late January, the creator of the &ldquo;dogwifhat&rdquo; memecoin announced &ldquo;Officially confirmed. Viva hat vegas.&rdquo; in a tweet accompanied by a photo overlaying the dog meme with the Las Vegas Sphere. Project organizers had raised around $700,000 in March 2024 to fund the project, hoping that the attention-grabbing stunt would spike the memecoin price. The announcement alone had somewhat of a similar effect, causing the $WIF price to spike by more than 30% shortly after.However, crypto media firm Decrypt reached out to a spokesperson for the Las Vegas Sphere and discovered that no such deal had been reached.Dogwifhat creators have since backtracked, replacing the tweet with a version omitting the &ldquo;officially confirmed&rdquo; portion, but still claiming that they &ldquo;have been in ongoing negotiations with various parties to collaborate on the Sphere ad placement&rdquo;. They promised to return the funds &ldquo;if, by any chance, the plan is not executed&rdquo;.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/303887/solana-meme-coin-dogwifhat-no-deal-sphere</breach:sourceUrl><breach:dateOfBreach>2025-01-31</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-31</breach:dateOfDisclosure><breach:vendorProduct>Meme used in the post to announce the falsified deal</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>Tweet by Ether Strategy</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_ether-strategy-destroys-over-500-000-of-eth/</link><pubDate>Thu, 30 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_ether-strategy-destroys-over-500-000-of-eth/</guid><description>A Ethereum-based project promising to duplicate the bitcoin leveraged investment strategy used by MicroStrategy has announced that, prior to even launching, 165 ETH (~$535,850) was lost when a misconfiguration in the project interface resulted in tokens being sent to the wrong address. The project …</description><content:encoded>&lt;p>A Ethereum-based project promising to duplicate the bitcoin leveraged investment strategy used by MicroStrategy has announced that, prior to even launching, 165 ETH (~$535,850) was lost when a misconfiguration in the project interface resulted in tokens being sent to the wrong address. The project appears to have determined that those tokens are irrecoverably lost, because they announced that they had contributed 165 ETH of their own to reimburse users for their costly mistake.&lt;/p>
&lt;p>Total loss estimated at $535,850.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/ethstrateg/status/1885108303417782462</breach:sourceUrl><breach:dateOfBreach>2025-01-30</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-30</breach:dateOfDisclosure><breach:vendorProduct>Ether Strategy destroys over $500,000 of ETH</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>535850</breach:financialLossUsd></item><item><title>Tweet thread by Arkham</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_ross-ulbricht-memecoin-mistake/</link><pubDate>Thu, 30 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_ross-ulbricht-memecoin-mistake/</guid><description>Ross Ulbricht, the founder of the Silk Road darknet market place, earned a presidential pardon on January 21 as an apparent thank you by President Trump to the Libertarian Party. When fans created a token called $ROSS to celebrate his release, they sent a substantial number of the tokens — 50% of …</description><content:encoded>Ross Ulbricht, the founder of the Silk Road darknet market place, earned a presidential pardon on January 21 as an apparent thank you by President Trump to the Libertarian Party. When fans created a token called $ROSS to celebrate his release, they sent a substantial number of the tokens — 50% of the supply — to donation wallets that his family have operated for years, used to raise money to campaign for his release.It&amp;rsquo;s not clear whether Ulbricht has taken over control of these wallets, or if they are still being operated on his behalf. Either way, whoever does control the wallets made a big mistake when they tried to cash out on their memecoin stash by adding single-sided liquidity on Meteora. They accidentally initialized the liquidity pool at too low a price, allowing a MEV bot to snap up 5% of the token supply (notionally ~$1.5 million) at a discount and resell them.The wallet operator then made the same error again with a larger quantity of tokens, selling off another 35% of the supply and losing out on around $10.5 million in notional value.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/arkham/status/1884976064717365367</breach:sourceUrl><breach:dateOfBreach>2025-01-30</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-30</breach:dateOfDisclosure><breach:initialAttackVector>MEV / sandwich attack</breach:initialAttackVector><breach:vendorProduct>Ross Ulbricht memecoin mistake</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>Tweet by SlowMist</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_fake-trump-twitter-account-memecoins/</link><pubDate>Tue, 21 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_fake-trump-twitter-account-memecoins/</guid><description>A Twitter account called @TrumpDailyPosts has more than 1.3 million followers on Twitter. While the account does automatically crosspost to Twitter any posts Donald Trump makes on his Truth Social account, it also posts Trump-related news and other tweets.After the Trump family actually did launch …</description><content:encoded><![CDATA[<p>A Twitter account called @TrumpDailyPosts has more than 1.3 million followers on Twitter. While the account does automatically crosspost to Twitter any posts Donald Trump makes on his Truth Social account, it also posts Trump-related news and other tweets.After the Trump family actually did launch the $TRUMP and $MELANIA memecoins, several more tweets by the @TrumpDailyPosts account appeared to crosspost additional announcements by Donald Trump on Truth Social of memecoins with names like $POTUS, $WIN, $POWER, and $MAGA. The tweets contained the date and timestamps that normally establish that a post on the account is a repost of Trump&rsquo;s genuine Truth Social posts.It&rsquo;s not clear if the @TrumpDailyPosts Twitter account was hacked or if those running it decided to scam their followers. However, by sharing the now-deleted posts to their large following, they made around $1.25 million from people who were hoping to hop on the trend and buy in early to new Trump-backed memecoins.</p>
<p>Total loss estimated at $1,250,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/SlowMist_Team/status/1881703899503136818</breach:sourceUrl><breach:dateOfBreach>2025-01-21</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-21</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Fake Trump Twitter account memecoins</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>1250000</breach:financialLossUsd></item><item><title>"‘Forgive him Satoshi’ — Trump’s pastor ripped for memecoin that crashed 93% after launch"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_trump-inauguration-pastor-launches-memecoin/</link><pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_trump-inauguration-pastor-launches-memecoin/</guid><description>Reverand Lorenzo Sewell, a pastor and vocal Trump supporter who delivered the benediction at Donald Trump's inauguration, followed in his hero's footsteps by trying to shill a memecoin to his followers. In a video posted to Twitter hours after his speech, in which he seemed to still be wearing the …</description><content:encoded><![CDATA[Reverand Lorenzo Sewell, a pastor and vocal Trump supporter who delivered the benediction at Donald Trump&rsquo;s inauguration, followed in his hero&rsquo;s footsteps by trying to shill a memecoin to his followers. In a video posted to Twitter hours after his speech, in which he seemed to still be wearing the same outfit, Sewell urged: &ldquo;I need you to do me a favor right now. I need you to go buy the official Lorenzo Sewell coin.&ldquo;The reaction to his post was not exactly warm, with lawyer Ari Cohn tweeting: &ldquo;🎶Look at this grift, isn&rsquo;t it neat?  Wouldn&rsquo;t you say God&rsquo;s debasement&rsquo;s complete? 🎶&ldquo;After a very brief spike in token price, the memecoin collapsed.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.dlnews.com/articles/markets/trump-pastor-memecoin-tanks/</breach:sourceUrl><breach:dateOfBreach>2025-01-20</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-20</breach:dateOfDisclosure><breach:vendorProduct>Tweet by Pastor Lorenzo Sewell</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>Tweet by Melania Trump</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_melania-trump-launches-a-memecoin/</link><pubDate>Sun, 19 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_melania-trump-launches-a-memecoin/</guid><description>Before people had a chance to process the fact that the incoming president of the United States had just launched his own transparent crypto cash-grab, the soon-to-be First Lady did the same. Whoever is calling the Trump family's crypto shots seemed to think they could just follow the same playbook …</description><content:encoded><![CDATA[Before people had a chance to process the fact that the incoming president of the United States had just launched his own transparent crypto cash-grab, the soon-to-be First Lady did the same. Whoever is calling the Trump family&rsquo;s crypto shots seemed to think they could just follow the same playbook a second time and enjoy the same results, but the launch of the new token brought a sudden crash in the $TRUMP token value.This is not Melania Trump&rsquo;s first foray into the crypto world. In December 2021, she launched her own line of NFTs — only to apparently wash trade them after a tepid response.Meanwhile, some in the crypto world are reacting with horror at Trump&rsquo;s decisionmaking. While they hoped that Trump&rsquo;s administration would be crypto-friendly, they did not seem to anticipate that the Trump family would openly embrace some of the ecosystem&rsquo;s worst parts to enrich themselves at everyone else&rsquo;s expense.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/MELANIATRUMP/status/1881094861279129643</breach:sourceUrl><breach:dateOfBreach>2025-01-19</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-19</breach:dateOfDisclosure><breach:vendorProduct>Melania Trump's tweet announcing the memecoin</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>Tweet by Donald Trump</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_trump-launches-a-shitcoin/</link><pubDate>Fri, 17 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_trump-launches-a-shitcoin/</guid><description>In what is likely a preview of the levels of grift about to come — levels previously not thought possible — Trump has launched a Solana memecoin two days before his inauguration. The move was so unexpected that many believed the president-elect's Twitter account had been compromised to promote a …</description><content:encoded>In what is likely a preview of the levels of grift about to come — levels previously not thought possible — Trump has launched a Solana memecoin two days before his inauguration. The move was so unexpected that many believed the president-elect&amp;rsquo;s Twitter account had been compromised to promote a fake scam token, but half a day later, it appears this scam token is of the genuinely Trump-backed variety.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/realDonaldTrump/status/1880446012168249386</breach:sourceUrl><breach:dateOfBreach>2025-01-17</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-17</breach:dateOfDisclosure><breach:vendorProduct>Trump memecoin promo image</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"The Idols NFT"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_the-idols-nft-exploit/</link><pubDate>Tue, 14 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_the-idols-nft-exploit/</guid><description>An attacker noticed a vulnerability in a smart contract for The Idols, an NFT project that also incorporates ETH staking functionality. They discovered that a function used to distribute rewards had a bug when the sender and recipient addresses were the same, allowing a holder to repeatedly claim …</description><content:encoded>&lt;p>An attacker noticed a vulnerability in a smart contract for The Idols, an NFT project that also incorporates ETH staking functionality. They discovered that a function used to distribute rewards had a bug when the sender and recipient addresses were the same, allowing a holder to repeatedly claim rewards. By taking advantage of this bug, they were able to siphon 97 stETH (~$324,000) from the project.Although The Idols boasts of two audits from several years ago, the contract containing the vulnerability may not have been audited.&lt;/p>
&lt;p>Total loss estimated at $324,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://rekt.news/theidolsnft-rekt/</breach:sourceUrl><breach:dateOfBreach>2025-01-14</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-14</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>The Idols NFT</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>324000</breach:financialLossUsd></item><item><title>"Traders seethe after Sony freezes memecoins on its new blockchain"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_sony-accused-of-rugging/</link><pubDate>Tue, 14 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_sony-accused-of-rugging/</guid><description>Only hours after Sony launched its "Soneium" layer-2 Ethereum blockchain, the company was accused of "rugging" people who had purchased various memecoins launched on Soneium when it began prohibiting their trading. The two tokens, now listed as "forbidden" for trading, were based on Sony products. …</description><content:encoded><![CDATA[Only hours after Sony launched its &ldquo;Soneium&rdquo; layer-2 Ethereum blockchain, the company was accused of &ldquo;rugging&rdquo; people who had purchased various memecoins launched on Soneium when it began prohibiting their trading. The two tokens, now listed as &ldquo;forbidden&rdquo; for trading, were based on Sony products. One, &ldquo;Aibo&rdquo;, was themed around a series of robotic dog toys. The other, &ldquo;Toro&rdquo;, was based on Sony&rsquo;s unofficial Toro Inoue mascot.Sony&rsquo;s crackdown on these tokens perhaps should not have come as a huge surprise, given that the announcement of Soneium&rsquo;s launch touted &ldquo;protecting content rights and creating fair profit-sharing mechanisms&rdquo; among its goals.Nevertheless, members of the Soneium Discord widely accused Sony of &ldquo;rugging&rdquo; or &ldquo;honeypotting&rdquo; them by prohibiting trading on the memecoins they had purchased.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.dlnews.com/articles/defi/traders-seethe-after-sony-freezes-memecoins/</breach:sourceUrl><breach:dateOfBreach>2025-01-14</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-14</breach:dateOfDisclosure><breach:vendorProduct>Sony accused of "rugging"</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Almost 10,000 images of tennis balls plunge up to 90% in value as Australian Open appears to ditch NFTs"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_australian-open-apparently-scraps-its-nft-project/</link><pubDate>Mon, 13 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_australian-open-apparently-scraps-its-nft-project/</guid><description>Holders of any of the several thousand "AO ArtBall" NFTs may be disappointed as the Australian Open appears to have abandoned the project aimed at tennis fans. The first NFTs originally sold for 0.067 ETH (~$275 at the time), and another round were minted for 0.23 ETH (~$450 at the time). However, …</description><content:encoded><![CDATA[Holders of any of the several thousand &ldquo;AO ArtBall&rdquo; NFTs may be disappointed as the Australian Open appears to have abandoned the project aimed at tennis fans. The first NFTs originally sold for 0.067 ETH (<del>$275 at the time), and another round were minted for 0.23 ETH (</del>$450 at the time). However, the sale prices of the NFTs have steadily dwindled since early 2023, and recent sales have been for 0.003 to 0.0075 ETH (~$10–$25).Buyers were told they could use the NFTs as a sort of fan pass, receiving access to a Discord, and earning ground passes and behind-the-scenes access for finals weeks. There was also a scheme in which NFT holders could redeem access to passes to matches.However, the Australian Open seems to have let the project — launched at the peak of NFT hype — peter out, with no mention of redeeming passes, and project websites still promising a 2024 update. The Discord has been shut down.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theguardian.com/sport/2025/jan/14/almost-10000-images-of-tennis-balls-plunge-up-to-90-in-value-as-australian-open-appears-to-ditch-nfts?CMP=aus_bsky</breach:sourceUrl><breach:dateOfBreach>2025-01-13</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-13</breach:dateOfDisclosure><breach:vendorProduct>Australian Open apparently scraps its NFT project</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>Tweet by SlowMist</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_unilend-exploit/</link><pubDate>Sun, 12 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_unilend-exploit/</guid><description>The UniLend project, which advertises itself as a "unified platform for all things AI and defi", was exploited for almost $200,000. An attacker was able to take advantage of a bug in a smart contract that handled token redemption.UniLend acknowledged the hack, downplaying it as affecting "only" 4% …</description><content:encoded><![CDATA[<p>The UniLend project, which advertises itself as a &ldquo;unified platform for all things AI and defi&rdquo;, was exploited for almost $200,000. An attacker was able to take advantage of a bug in a smart contract that handled token redemption.UniLend acknowledged the hack, downplaying it as affecting &ldquo;only&rdquo; 4% of the platform&rsquo;s $4.7 million TVL. They offered a bounty to the attacker.</p>
<p>Total loss estimated at $197,600.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/SlowMist_Team/status/1878651772375572573</breach:sourceUrl><breach:dateOfBreach>2025-01-12</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-12</breach:dateOfDisclosure><breach:initialAttackVector>AI-assisted attack or AI-generated exploit</breach:initialAttackVector><breach:vendorProduct>UniLend</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>197600</breach:financialLossUsd></item><item><title>"Moby Post-Mortem Report / Growth Plan"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_moby-trade-theft/</link><pubDate>Wed, 08 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_moby-trade-theft/</guid><description>The Moby Trade defi options protocol suffered a $1 million loss, narrowly avoiding the loss of another nearly $1.5 million. The project team stated that a hacker had "identified and exploited a vulnerability in the key management system" that was supposed to protect a private key used by the …</description><content:encoded><![CDATA[<p>The Moby Trade defi options protocol suffered a $1 million loss, narrowly avoiding the loss of another nearly $1.5 million. The project team stated that a hacker had &ldquo;identified and exploited a vulnerability in the key management system&rdquo; that was supposed to protect a private key used by the project. Using the private key, they were able to perform contract upgrades that then allowed them to drain about almost $1.1 million in wBTC, wETH, and USDC.Another $1.47 million in assets were vulnerable as a result, but the whitehat blockchain security firm Seal911 successfully drained those funds to later be returned to the protocol once it was secured.</p>
<p>Total loss estimated at $1,088,500.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://medium.com/moby-trade/moby-post-mortem-report-growth-plan-504ad5b0dd35</breach:sourceUrl><breach:dateOfBreach>2025-01-08</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-08</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Moby Trade theft</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1088500</breach:financialLossUsd></item><item><title>Tweet by Orange Finance</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_orange-finance-hack/</link><pubDate>Wed, 08 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_orange-finance-hack/</guid><description>The Arbitrum-based liquidity management project Orange Finance suffered at least $840,000 in losses after hackers compromised the project's admin address, then used it to upgrade the project's smart contracts and transfer funds."The team is not sure what happened," wrote Orange Finance in a tweet …</description><content:encoded><![CDATA[<p>The Arbitrum-based liquidity management project Orange Finance suffered at least $840,000 in losses after hackers compromised the project&rsquo;s admin address, then used it to upgrade the project&rsquo;s smart contracts and transfer funds.&ldquo;The team is not sure what happened,&rdquo; wrote Orange Finance in a tweet announcing the hack, encouraging people to revoke contract approvals for the compromised addresses.Orange Finance attempted to negotiate with the attacker via on-chain message, writing, &ldquo;If you respond positively to our offer within 24 hours, we guarantee that no law enforcement agencies will be involved, and the matter will be treated as a white-hat hack.&rdquo;</p>
<p>Total loss estimated at $840,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/0xOrangeFinance/status/1876863611458801890</breach:sourceUrl><breach:dateOfBreach>2025-01-08</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-08</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Orange Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>840000</breach:financialLossUsd></item><item><title>Telegram post</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2025-01_noones-hacked-for-almost-8-million/</link><pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2025-01_noones-hacked-for-almost-8-million/</guid><description>After crypto sleuth zachxbt noticed an apparent theft from the NoOnes peer-to-peer crypto trading platform on January 1, CEO Ray Youssef was forced to acknowledge the theft. He claimed that the project's Solana bridge had suffered a compromised, and explained that it had been taken offline for …</description><content:encoded><![CDATA[<p>After crypto sleuth zachxbt noticed an apparent theft from the NoOnes peer-to-peer crypto trading platform on January 1, CEO Ray Youssef was forced to acknowledge the theft. He claimed that the project&rsquo;s Solana bridge had suffered a compromised, and explained that it had been taken offline for &ldquo;exhaustive pen testing&rdquo;.Youssef emphasized that user funds were safe, which led to questioning from others on how that could be possible when nearly $8 million had been stolen. Youssef claimed he had reimbursed the stolen assets himself.</p>
<p>Total loss estimated at $7,900,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://t.me/investigations/202</breach:sourceUrl><breach:dateOfBreach>2025-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-01</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>NoOnes</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>7900000</breach:financialLossUsd></item><item><title>"FEG token holders in despair after third hack causes 99% dump"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_feed-every-gorilla-hack-2/</link><pubDate>Sun, 29 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_feed-every-gorilla-hack-2/</guid><description>The "Feed Every Gorilla" project has once again been hacked, after suffering a pair of flash loan attacks in May 2022 amounting to $1.9 million in losses. The protocol also suffered losses later in 2022, thanks to an issue with a token locking service that cost FEG $2 million (though around $1.9 …</description><content:encoded><![CDATA[<p>The &ldquo;Feed Every Gorilla&rdquo; project has once again been hacked, after suffering a pair of flash loan attacks in May 2022 amounting to $1.9 million in losses. The protocol also suffered losses later in 2022, thanks to an issue with a token locking service that cost FEG $2 million (though around $1.9 million was ultimately returned by the exploiter).This time, the FEG project team blamed an issue with the project&rsquo;s bridge, which is a tool used to deposit and withdraw tokens from the project. An attacker was able to maliciously withdraw a large amount of FEG tokens via the flaw in the bridge, which they then sold off for around $1.07 million, tanking the FEG token price by 99% in the process. The bridge had been audited by the PeckShield blockchain security firm.</p>
<p>Total loss estimated at $1,070,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://protos.com/feg-token-holders-in-despair-after-third-hack-causes-99-dump/</breach:sourceUrl><breach:dateOfBreach>2024-12-29</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-29</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Feed Every Gorilla</breach:vendorProduct><breach:blockchain>bsc, ethereum</breach:blockchain><breach:financialLossUsd>1070000</breach:financialLossUsd></item><item><title>“Tai Mo Shan to Pay $123 Million for Negligently Misleading Investors About Stability of Terra USD”</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_sec-fines-jump-crypto-subsidiary/</link><pubDate>Fri, 20 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_sec-fines-jump-crypto-subsidiary/</guid><description>The SEC has levied a $123 million fine against Jump Crypto subsidiary Tai Mo Shan, which was part of a secret deal with Terraform Labs to help prop up the floundering Terra stablecoin in May 2021. Jump spent $20 million to help the supposedly “self-healing” stablecoin regain its $1 peg, earning …</description><content:encoded>The SEC has levied a $123 million fine against Jump Crypto subsidiary Tai Mo Shan, which was part of a secret deal with Terraform Labs to help prop up the floundering Terra stablecoin in May 2021. Jump spent $20 million to help the supposedly “self-healing” stablecoin regain its $1 peg, earning about $1.28 billion in the process, and Terraform Labs CEO Do Kwon would later claim that the restoration to a $1 price was thanks to an automatic feature of the Terra project and not some backroom deal. This lie by Terraform Labs and Jump Crypto helped build confidence in the sustainability of the Terra token, which collapsed horrendously a year later.The SEC also found that Tai Mo Shan had acted as a statuary underwriter for the Terra sister token Luna, which was an unregistered security.Tai Mo Shan agreed to the fine, and to a prohibition on future violations of securities laws.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.sec.gov/newsroom/press-releases/2024-212</breach:sourceUrl><breach:dateOfBreach>2024-12-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-20</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>SEC fines Jump Crypto subsidiary</breach:vendorProduct><breach:blockchain>terra</breach:blockchain></item><item><title>Indictment</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_hay-and-mayo-rug-pull-indictment/</link><pubDate>Wed, 18 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_hay-and-mayo-rug-pull-indictment/</guid><description>Gabriel Hay and Gavin Mayo, two LA-based NFT creators, have been charged for defrauding investors of more than $22.4 million through a series of NFT rug pulls and other crypto scams. The duo launched various projects with detailed and false roadmaps to lure NFT buyers, then abandoned the projects …</description><content:encoded><![CDATA[<p>Gabriel Hay and Gavin Mayo, two LA-based NFT creators, have been charged for defrauding investors of more than $22.4 million through a series of NFT rug pulls and other crypto scams. The duo launched various projects with detailed and false roadmaps to lure NFT buyers, then abandoned the projects without following through.For example, a &ldquo;Vault of Gems&rdquo; NFT project falsely claimed to be the &ldquo;first NFT pegged to a hard asset, like jewelry&rdquo;, which would have its own exchange. A &ldquo;Faceless&rdquo; NFT project promised to produce comic books, a movie, and a clothing company. None of the promises ever materialized, and Hay and Mayo abandoned the projects soon after launching them.Hay and Mayo worked to hide their involvement with their scams, and have been charged with harassment for attempting to threaten those who connected them. In one case, after a person revealed Hay and Mayo to be the ones behind the Faceless NFT project, the duo sent threatening emails and text messages to the man and his parents. In an email to his parents, they impersonated a law firm, and even threatened to make false sexual abuse claims against the man.</p>
<p>Total loss estimated at $22,400,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.justice.gov/opa/media/1382011/dl</breach:sourceUrl><breach:dateOfBreach>2024-12-18</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-18</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Hay and Mayo</breach:vendorProduct><breach:blockchain>ethereum, solana</breach:blockchain><breach:financialLossUsd>22400000</breach:financialLossUsd></item><item><title>Tweet by Anchor Drops</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_crypto-holder-loses-assets-priced-at-2-5-million/</link><pubDate>Thu, 12 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_crypto-holder-loses-assets-priced-at-2-5-million/</guid><description>A crypto holder tweeted at the Ledger hardware wallet manufacturer to report that 10 BTC (~$1 million) and "~1.5m of NFTs" had been stolen from a Ledger wallet they were using. "The ledger was purchased directly from you. The seed phrase was stored in a secure location, never entered anywhere …</description><content:encoded><![CDATA[<p>A crypto holder tweeted at the Ledger hardware wallet manufacturer to report that 10 BTC (~$1 million) and &ldquo;~1.5m of NFTs&rdquo; had been stolen from a Ledger wallet they were using. &ldquo;The ledger was purchased directly from you. The seed phrase was stored in a secure location, never entered anywhere online. I never signed any malicious transactions. Everything is in my physical possession.I haven’t touched this ledger in 2 months,&rdquo; they wrote.Some blamed the theft on an apparent malicious Ethereum transaction the user had signed nearly three years prior. However, while a malicious transaction signature on Ethereum could explain the NFT thefts, it should not alone enable the theft of assets on the separate bitcoin blockchain.Despite this, Ledger blamed its customer, telling a media outlet that &ldquo;As we know, the user got phished when it comes to the ETH wallet, we can assume user error on the BTC side too&rdquo;.</p>
<p>Total loss estimated at $2,500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/anchor_drops/status/1867384126954979472</breach:sourceUrl><breach:dateOfBreach>2024-12-12</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-12</breach:dateOfDisclosure><breach:initialAttackVector>Seed phrase / wallet compromise</breach:initialAttackVector><breach:vendorProduct>Crypto holder</breach:vendorProduct><breach:blockchain>ethereum, bitcoin</breach:blockchain><breach:financialLossUsd>2500000</breach:financialLossUsd></item><item><title>"Clober Dex Incident Analysis"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_clober-dex-hack/</link><pubDate>Wed, 11 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_clober-dex-hack/</guid><description>Clober, a DEX built on Coinbase's Base Ethereum layer-2, suffered an exploit only about a week after its launch. A re-entrancy bug in the project allowed an attacker to siphon 133.7 ETH (~$501,000) from the project. Although the project boasted of audits, Clober had made changes to a contract after …</description><content:encoded><![CDATA[<p>Clober, a DEX built on Coinbase&rsquo;s Base Ethereum layer-2,  suffered an exploit only about a week after its launch. A re-entrancy bug in the project allowed an attacker to siphon 133.7 ETH (~$501,000) from the project. Although the project boasted of audits, Clober had made changes to a contract after the audits that introduced the vulnerability.Clober has offered a 20% &ldquo;bug bounty&rdquo; to the exploiter vi on-chain message, though they have not yet received any public reply.</p>
<p>Total loss estimated at $501,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.certik.com/resources/blog/clober-dex-incident-analysis</breach:sourceUrl><breach:dateOfBreach>2024-12-11</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-11</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Clober DEX</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>501000</breach:financialLossUsd></item><item><title>"False prophet"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_alpaca-finance-oracle-issue/</link><pubDate>Tue, 10 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_alpaca-finance-oracle-issue/</guid><description>Users of the Alpaca Finance lending protocol suffered losses when the protocol's sloppy oracle implementation finally resulted in consequences. Although many had warned the project about their glacial oracle setup, and the vulnerabilities they were opening themselves up to, the project repeatedly …</description><content:encoded><![CDATA[<p>Users of the Alpaca Finance lending protocol suffered losses when the protocol&rsquo;s sloppy oracle implementation finally resulted in consequences. Although many had warned the project about their glacial oracle setup, and the vulnerabilities they were opening themselves up to, the project repeatedly denied any issues and even banned those voicing concerns.Then, when a new token called THENA was listed on Binance and experienced major volatility as trading opened, Alpaca&rsquo;s issues came to a head. As the token price surged, the slow oracle failed to reflect price changes, allowing people to withdraw far more THENA than they had posted as collateral. THENA lenders have lost an estimated $2.8 million.On December 10, Alpaca Finance proposed distributing $50,000 &ldquo;saved&rdquo; by their liquidation bot to the lenders who had lost funds. Alpaca Finance also banned users complaining about their losses in the project Discord, dismissing them as a &ldquo;group bot/FUD attack&rdquo;.</p>
<p>Total loss estimated at $2,670,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://rekt.news/false-prophet/</breach:sourceUrl><breach:dateOfBreach>2024-12-10</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-10</breach:dateOfDisclosure><breach:initialAttackVector>Software bug / unintentional loss</breach:initialAttackVector><breach:vendorProduct>Alpaca Finance oracle issue</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>2670000</breach:financialLossUsd></item><item><title>"Hawk Tuah memecoin dumps 90% amid backlash over controversial launch"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_hawk-tuah-memecoin-immediately-crashes/</link><pubDate>Thu, 05 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_hawk-tuah-memecoin-immediately-crashes/</guid><description>Who could have guessed that buying up a token based around the long-past-its-expiration-date hawk tuah meme might turn out to be an unwise investment? Haliey Welch, the originator of the raunchy catchphrase, launched a memecoin that she insisted was not a cash grab but a "good way to interact with …</description><content:encoded><![CDATA[Who could have guessed that buying up a token based around the long-past-its-expiration-date hawk tuah meme might turn out to be an unwise investment? Haliey Welch, the originator of the raunchy catchphrase, launched a memecoin that she insisted was not a cash grab but a &ldquo;good way to interact with her fans&rdquo;. (The &ldquo;interaction&rdquo; in question here was limited to &quot; fans give money&quot;, because she had no other specific plans for the token).The token followed the typical pattern of quickly pumping, then crashing spectacularly, losing around 90% of its &ldquo;value&rdquo;. This is often an indicator of a pump-and-dump scheme by insiders, but Welch vehemently denied such wrongdoing, blaming the crash on &ldquo;snipers&rdquo;.&ldquo;I really lost $43k apeing in &lsquo;hawk tuah&rsquo; coin,&rdquo; wrote one buyer on Twitter. Other Twitter users marveled at a wallet that swapped $1.4 million worth of MOODENG (a memecoin based on the tiny hippo of the same name) only to lose it all on the $HAWK token.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/hawk-tuah-memecoin-dumps-90-percent-outrage-token-launch-insider</breach:sourceUrl><breach:dateOfBreach>2024-12-05</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-05</breach:dateOfDisclosure><breach:vendorProduct>"Hawk tuah" memecoin immediately crashes</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"Solana Web3.js library backdoored to steal secret, private keys"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_solana-javascript-library-compromised/</link><pubDate>Mon, 02 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_solana-javascript-library-compromised/</guid><description>An attacker was able to compromise an account that had publish access for the official Solana web3.js library, which is widely used by dApps to read and write from the Solana blockchain. The library gets over 350,000 downloads per week from the popular JavaScript package manager npm.Malicious …</description><content:encoded>An attacker was able to compromise an account that had publish access for the official Solana web3.js library, which is widely used by dApps to read and write from the Solana blockchain. The library gets over 350,000 downloads per week from the popular JavaScript package manager npm.Malicious versions of the library allowed exploiters to steal private keys and drain funds from dApps like various Solana bots.Around $184,000 was stolen as a result of the compromise. Although it was caught fairly quickly, and the malicious code was removed from package managers, developers will need to update projects that used the malicious version of the library, and refresh any potentially exposed secrets.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/solana-web3js-library-backdoored-to-steal-secret-private-keys/</breach:sourceUrl><breach:dateOfBreach>2024-12-02</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-02</breach:dateOfDisclosure><breach:initialAttackVector>Software supply chain attack</breach:initialAttackVector><breach:vendorProduct>Solana Javascript library compromised</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:blockchain>solana</breach:blockchain></item><item><title>Tweet by Clipper DEX</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-12_clipper-dex-hack/</link><pubDate>Sun, 01 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-12_clipper-dex-hack/</guid><description>The Clipper decentralized exchange suffered a $450,000 exploit across two Ethereum layer-2 chains. Although some speculated that the issue may have been a private key leak, Clipper denied this, and instead said that an attacker had exploited a feature allowing people to make withdrawals denominated …</description><content:encoded>&lt;p>The Clipper decentralized exchange suffered a $450,000 exploit across two Ethereum layer-2 chains. Although some speculated that the issue may have been a private key leak, Clipper denied this, and instead said that an attacker had exploited a feature allowing people to make withdrawals denominated in a single token by performing swaps along with the withdrawal.Although the $450,000 theft is relatively small compared to some other crypto hacks, it represented around 6% of the total value locked on Clipper. Clipper stated they were working to trace and attempt to recover funds, and asked the hacker to contact them to potentially negotiate a return of some funds.&lt;/p>
&lt;p>Total loss estimated at $450,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/Clipper_DEX/status/1863263893470003460</breach:sourceUrl><breach:dateOfBreach>2024-12-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-01</breach:dateOfDisclosure><breach:initialAttackVector>Private key compromise</breach:initialAttackVector><breach:vendorProduct>Clipper DEX</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>450000</breach:financialLossUsd></item><item><title>"This Child Made $30K Rugging a Solana Meme Coin—Then Crypto Degens Got Revenge"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-11_quant-rug-pull/</link><pubDate>Wed, 20 Nov 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-11_quant-rug-pull/</guid><description>A 13-year-old known as the "Gen Z Quant kid," created a token called QUANT and executed a rug pull, making $30,000. In retaliation, various people in the cryptocurrency world executed a "revenge pump" — pumping up the price of the token after the kid cashed out, causing him to miss out on potential …</description><content:encoded><![CDATA[<p>A 13-year-old known as the &ldquo;Gen Z Quant kid,&rdquo; created a token called QUANT and executed a rug pull, making $30,000. In retaliation, various people in the cryptocurrency world executed a &ldquo;revenge pump&rdquo; — pumping up the price of the token after the kid cashed out, causing him to miss out on potential gains. Worse, they then found the child&rsquo;s identity, and published his address and the school he attended. They also identified his mother, and began leaving hateful comments on her Instagram account. Rumors also emerged that a member of the cryptocurrency community dognapped the child&rsquo;s dog, then launched a memecoin based on the animal.</p>
<p>Total loss estimated at $30,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/292594/this-child-made-30k-rugging-a-solana-meme-coin-then-crypto-degens-got-revenge</breach:sourceUrl><breach:dateOfBreach>2024-11-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-11-20</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>QUANT</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>30000</breach:financialLossUsd></item><item><title>"Crypto lender Polter Finance halts operations after $12M hack"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-11_polter-finance-hack/</link><pubDate>Sat, 16 Nov 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-11_polter-finance-hack/</guid><description>The Fantom-based Polter Finance defi project was exploited for $7 million when an attacker was able to perform an oracle manipulation attack. By artificially increasing the price of the $BOO token, which is a governance token used by the SpookySwap project, they were then able to use that token to …</description><content:encoded><![CDATA[<p>The Fantom-based Polter Finance defi project was exploited for $7 million when an attacker was able to perform an oracle manipulation attack. By artificially increasing the price of the $BOO token, which is a governance token used by the SpookySwap project, they were then able to use that token to drain Polter&rsquo;s liquidity pools using a flash loan. The attacker successfully drained the entire $12 million worth of tokens on the platform.The creator of the platform stated that they had filed a police report with Singaporean authorities. They also attempted to contact the hacker via on-chain message to negotiate the return of funds, but have not received a response.</p>
<p>Total loss estimated at $12,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/polter-finance-12m-hack-response</breach:sourceUrl><breach:dateOfBreach>2024-11-16</breach:dateOfBreach><breach:dateOfDisclosure>2024-11-16</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Polter Finance</breach:vendorProduct><breach:blockchain>fantom</breach:blockchain><breach:financialLossUsd>12000000</breach:financialLossUsd></item><item><title>Tweet by DeltaPrime</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-11_deltaprime-hack-2/</link><pubDate>Mon, 11 Nov 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-11_deltaprime-hack-2/</guid><description>The DeltaPrime defi protocol was hacked for the second time in two months, losing $4.8 million in Arbitrum and Avalanche tokens. The attacker appeared to have exploited a flaw in one of the platform's smart contracts that enabled them to borrow more than they put up in collateral.DeltaPrime paused …</description><content:encoded><![CDATA[<p>The DeltaPrime defi protocol was hacked for the second time in two months, losing $4.8 million in Arbitrum and Avalanche tokens. The attacker appeared to have exploited a flaw in one of the platform&rsquo;s smart contracts that enabled them to borrow more than they put up in collateral.DeltaPrime paused the protocol on both Arbitrum and Avalanche, stopping the attacker from being able to steal more funds than they already had.DeltaPrime was hacked previously on September 16, losing $6 million after a leaked private key enabled an attacker to mint a huge number of the platform&rsquo;s stablecoin deposit receipts.</p>
<p>Total loss estimated at $4,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/DeltaPrimeDefi/status/1855899502944903195</breach:sourceUrl><breach:dateOfBreach>2024-11-11</breach:dateOfBreach><breach:dateOfDisclosure>2024-11-11</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>DeltaPrime</breach:vendorProduct><breach:blockchain>avalanche, ethereum</breach:blockchain><breach:financialLossUsd>4800000</breach:financialLossUsd></item><item><title>"Trader who lost $26M to copy-paste error says it’s been ‘max pain’"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-11_qklpjeth-copypaste/</link><pubDate>Sun, 10 Nov 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-11_qklpjeth-copypaste/</guid><description>After apparently exhausting all his other options, a trader has put out a call to "all skilled hackers and white hats out there" to help him recover 7,912 Renzo staked ETH (ezETH) he inadvertently sent to an inaccessible address back in June. The tokens were priced at a little over $28 million at …</description><content:encoded><![CDATA[<p>After apparently exhausting all his other options, a trader has put out a call to &ldquo;all skilled hackers and white hats out there&rdquo; to help him recover 7,912 Renzo staked ETH (ezETH) he inadvertently sent to an inaccessible address back in June. The tokens were priced at a little over $28 million at the time, and are currently priced at a little less than $26 million. According to the trader, he copied the wrong address to his clipboard before making the trade, which rendered his funds permanently inaccessible.Short of finding a vulnerability in Renzo, the trader&rsquo;s only real choice is to plead with Renzo to change their smart contract in such a way as to release the funds. While this is technically possible, Renzo has told the trader they could not grant his request due to &ldquo;regulatory limitations&rdquo;.</p>
<p>Total loss estimated at $28,127,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/trader-loses-26-million-copy-paste-error-max-pain</breach:sourceUrl><breach:dateOfBreach>2024-11-10</breach:dateOfBreach><breach:dateOfDisclosure>2024-11-10</breach:dateOfDisclosure><breach:vendorProduct>qklpjeth copypaste</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>28127000</breach:financialLossUsd></item><item><title>Tweet by CyversAlerts</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-11_coinpoker-hack/</link><pubDate>Fri, 08 Nov 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-11_coinpoker-hack/</guid><description>Crypto-powered poker website CoinPoker was apparently exploited for around $2 million when an attacker was able to compromise a hot wallet controlled by the platform. The attacker then laundered most of the funds through the Tornado Cash mixer.The platform sent a message to the exploiter attempting …</description><content:encoded>Crypto-powered poker website CoinPoker was apparently exploited for around $2 million when an attacker was able to compromise a hot wallet controlled by the platform. The attacker then laundered most of the funds through the Tornado Cash mixer.The platform sent a message to the exploiter attempting to negotiate a return of some of the funds.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CyversAlerts/status/1858455889029550545</breach:sourceUrl><breach:dateOfBreach>2024-11-08</breach:dateOfBreach><breach:dateOfDisclosure>2024-11-08</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>CoinPoker</breach:vendorProduct><breach:blockchain>bsc, ethereum, polygon</breach:blockchain></item><item><title>"Security Update"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_m2-hack/</link><pubDate>Thu, 31 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_m2-hack/</guid><description>The UAE-based M2 cryptocurrency exchange was hacked for $13.7 million in bitcoin, ether, and Solana tokens. The exploiter compromised several of the exchange's hot wallets to take the funds.Shortly after the theft, M2 acknowledged the hack and announced that "the situation has been fully resolved". …</description><content:encoded><![CDATA[<p>The UAE-based M2 cryptocurrency exchange was hacked for $13.7 million in bitcoin, ether, and Solana tokens. The exploiter compromised several of the exchange&rsquo;s hot wallets to take the funds.Shortly after the theft, M2 acknowledged the hack and announced that &ldquo;the situation has been fully resolved&rdquo;. This apparently involved M2 restoring customer funds from their own assets, rather than recovering the stolen assets.</p>
<p>Total loss estimated at $13,700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://explore.m2.com/newsroom/security-update</breach:sourceUrl><breach:dateOfBreach>2024-10-31</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-31</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>M2</breach:vendorProduct><breach:blockchain>ethereum, bitcoin, solana</breach:blockchain><breach:financialLossUsd>13700000</breach:financialLossUsd></item><item><title>"Bitcoin scammers impersonate police, Sunray Finance $2.7M drain: Crypto-Sec"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_sunray-finance-hack/</link><pubDate>Wed, 30 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_sunray-finance-hack/</guid><description>A perpetuals trading platform called Sunray Finance was hacked on October 30 by an attacker who was able to upgrade a smart contract used by the protocol. They then were able to mint a massive number of the protocol's SUN token — 200 sextillion, to be precise. Then, they cashed out what they were …</description><content:encoded><![CDATA[<p>A perpetuals trading platform called Sunray Finance was hacked on October 30 by an attacker who was able to upgrade a smart contract used by the protocol. They then were able to mint a massive number of the protocol&rsquo;s SUN token — 200 sextillion, to be precise. Then, they cashed out what they were able to, crashing the SUN token price in the process. Ultimately, the attacker made off with about $2.1 million of the Tether stablecoin.In the process of selling off tokens, an arbitrage bot was able to take advantage of the price difference by selling the rapidly crashing SUN token into a second liquidity pool that apparently went unnoticed by the hacker, and the bot operator also profited around $560,000.</p>
<p>Total loss estimated at $3,260,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/btc-scammers-sunray-finance-crypto-sec?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound</breach:sourceUrl><breach:dateOfBreach>2024-10-30</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-30</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Sunray Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>3260000</breach:financialLossUsd></item><item><title>"US Government Crypto Wallet Drained of $20 Million in Suspicious Transfers"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_possible-us-government-theft/</link><pubDate>Thu, 24 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_possible-us-government-theft/</guid><description>More than $20 million in stablecoins and Ethereum were transferred from a wallet identified as belonging to the US government, and holding funds connected to the 2016 hack of the Bitfinex cryptocurrency exchange. While the government does occasionally shuffle cryptocurrency around, these funds were …</description><content:encoded><![CDATA[<p>More than $20 million in stablecoins and Ethereum were transferred from a wallet identified as belonging to the US government, and holding funds connected to the 2016 hack of the Bitfinex cryptocurrency exchange. While the government does occasionally shuffle cryptocurrency around, these funds were moved to a brand new wallet and then began to be shuffled through cryptocurrency exchanges — something that crypto sleuth zachxbt noted &ldquo;looks nefarious&rdquo;.The government has not made any statements regarding the movement of assets.The following day, $19.3 million in tokens were returned to the original wallet.</p>
<p>Total loss estimated at $1,200,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/288151/us-government-crypto-wallet-drained-20-million</breach:sourceUrl><breach:dateOfBreach>2024-10-24</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-24</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Possible US government theft</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1200000</breach:financialLossUsd><breach:financialRecoveredUsd>1930000</breach:financialRecoveredUsd></item><item><title>"Solana Meme Coin Sharpei Plunges 96% in Seconds in Epic Rug Pull"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_sharpei-memecoin-rug-pull/</link><pubDate>Wed, 23 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_sharpei-memecoin-rug-pull/</guid><description>A dog-themed memecoin project called Sharpei abruptly cashed out $3.4 million, tanking the token price by more than 96% in seconds. The project had been promoted by crypto influencers, but hit a snag when a pitch deck for the project leaked. The deck contained multiple lies, including claims to have …</description><content:encoded><![CDATA[<p>A dog-themed memecoin project called Sharpei abruptly cashed out $3.4 million, tanking the token price by more than 96% in seconds. The project had been promoted by crypto influencers, but hit a snag when a pitch deck for the project leaked. The deck contained multiple lies, including claims to have hired multiple &ldquo;KOLs&rdquo; who later denied involvement, and false claims of partnerships with various platforms and projects.As the token price stuttered along with these revelations, insiders apparently decided to quit while they were ahead, and cashed out in a quick and coordinated sale.</p>
<p>Total loss estimated at $3,400,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/288160/solana-meme-coin-sharpei-epic-rug-pull</breach:sourceUrl><breach:dateOfBreach>2024-10-23</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-23</breach:dateOfDisclosure><breach:vendorProduct>Sharpei memecoin</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>3400000</breach:financialLossUsd></item><item><title>Tweet by Tapioca DAO</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_tapioca-dao-exploit/</link><pubDate>Fri, 18 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_tapioca-dao-exploit/</guid><description>The defi lending protocol Tapioca DAO was exploited after an attacker reportedly socially engineered the DAO's co-founder and gain access to their private key. The attacker then used their access to sell off TAP tokens, and to drain a stablecoin liquidity pool on the platform, netting around $4.4 …</description><content:encoded><![CDATA[<p>The defi lending protocol Tapioca DAO was exploited after an attacker reportedly socially engineered the DAO&rsquo;s co-founder and gain access to their private key. The attacker then used their access to sell off TAP tokens, and to drain a stablecoin liquidity pool on the platform, netting around $4.4 million in USDC and ETH. The TAP token price subsequently crashed by around 96%.Various security researchers have observed that the attack appears to be linked to a slew of social engineering attacks perpetrated by cybercriminals out of North Korea.</p>
<p>Total loss estimated at $4,400,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/tapioca_dao/status/1847330264139145361</breach:sourceUrl><breach:dateOfBreach>2024-10-18</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-18</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>Tapioca DAO</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>4400000</breach:financialLossUsd></item><item><title>"Radiant Capital Loses $50M to Second Blockchain Exploit This Year"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_radiant-capital-hack-2/</link><pubDate>Wed, 16 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_radiant-capital-hack-2/</guid><description>The cryptocurrency lending project Radiant Capital was hacked for the second time in under a year, this time for more than $50 million in the USDC stablecoin, wBNB, ETH, and other tokens. An attacker successfully gained access to three of eleven private keys controlling a multisignature wallet, …</description><content:encoded><![CDATA[<p>The cryptocurrency lending project Radiant Capital was hacked for the second time in under a year, this time for more than $50 million in the USDC stablecoin, wBNB, ETH, and other tokens. An attacker successfully gained access to three of eleven private keys controlling a multisignature wallet, which enabled them to upgrade the project&rsquo;s smart contracts in such a way as to drain funds.This is the second Radiant Capital exploit this year, after a $4.5 million theft in January that was enabled by an unaddressed vulnerability in the underlying Compound Finance code.The US and South Korean governments later attributed this attack on Radiant to North Korean state-sponsored attackers.</p>
<p>Total loss estimated at $50,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/tech/2024/10/16/radiant-capital-loses-50m-to-blockchain-exploit/</breach:sourceUrl><breach:dateOfBreach>2024-10-16</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-16</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>Radiant Capital</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>50000000</breach:financialLossUsd></item><item><title>"On the LSM Module"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_cosmos-lsm/</link><pubDate>Tue, 15 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_cosmos-lsm/</guid><description>Cosmos creator Jae Kwon has raised concerns about a portion of the Cosmos protocol called the "Liquid Staking Module" after learning it was developed by North Korean agents. Although a contributor to the protocol, Zaki Manian, learned of the developers' links to North Korea after contact from the …</description><content:encoded><![CDATA[Cosmos creator Jae Kwon has raised concerns about a portion of the Cosmos protocol called the &ldquo;Liquid Staking Module&rdquo; after learning it was developed by North Korean agents. Although a contributor to the protocol, Zaki Manian, learned of the developers&rsquo; links to North Korea after contact from the FBI in March 2023, Kwon claims that Manian ignored known flaws in their code, failed to fully audit their code, and did not report the issue to the project team or the Cosmos community. According to Kwon, the code contained a vulnerability that would allow stakers to avoid having their stakes slashed, which &ldquo;contradicts the fundamental principles of staking security.&ldquo;Kwon urged the Cosmos governance team to perform a full audit of the code written by these developers, and develop more protocols to prevent issues like this going forward. He also called for the governance team to blacklist Zaki Manian.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://github.com/allinbits/announcements/blob/main/2024_10_15_lsmnk.md</breach:sourceUrl><breach:dateOfBreach>2024-10-15</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-15</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>Cosmos LSM</breach:vendorProduct><breach:blockchain>cosmos</breach:blockchain></item><item><title>Tweet by Scam Sniffer</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_pepe-token-permit-phishing/</link><pubDate>Sun, 13 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_pepe-token-permit-phishing/</guid><description>An attacker using the permit phishing technique stole $1.39 million in tokens from an unsuspecting holder. The victim unknowingly signed a "Permit2" signature — a function intended to make crypto transactions smoother and less expensive, but one that also makes it possible for malicious actors to …</description><content:encoded><![CDATA[<p>An attacker using the permit phishing technique stole $1.39 million in tokens from an unsuspecting holder. The victim unknowingly signed a &ldquo;Permit2&rdquo; signature — a function intended to make crypto transactions smoother and less expensive, but one that also makes it possible for malicious actors to completely drain crypto wallets.The attacker stole around $1.1 million of the cartoon frog-themed PEPE tokens, and another roughly $50,000 of the also cartoon frog-themed APU token.</p>
<p>Total loss estimated at $1,390,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/realScamSniffer/status/1845503748514492492</breach:sourceUrl><breach:dateOfBreach>2024-10-13</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-13</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>PEPE token permit phishing</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1390000</breach:financialLossUsd></item><item><title>"EigenLayer Says Unauthorized Selling Was an 'Isolated Incident', But Critics Still Have Concerns"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-10_eigen-token-theft/</link><pubDate>Fri, 04 Oct 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-10_eigen-token-theft/</guid><description>Around 1.67 million EIGEN tokens belonging to an investor in the popular Ethereum-based EigenLayer project were stolen after the investor was tricked into transferring the tokens into the attacker's wallet. The thief then sold the tokens for around $3.1 million, although the tokens were notionally …</description><content:encoded><![CDATA[<p>Around 1.67 million EIGEN tokens belonging to an investor in the popular Ethereum-based EigenLayer project were stolen after the investor was tricked into transferring the tokens into the attacker&rsquo;s wallet. The thief then sold the tokens for around $3.1 million, although the tokens were notionally worth around $5.5 million. Some of the stolen funds were later frozen by centralized exchanges.After the incident, some questioned why the tokens had been sent to an investor without a vesting contract, given they were supposed to be locked for a period of time to prevent sale.</p>
<p>Total loss estimated at $3,100,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/284903/eigenlayer-says-unauthorized-selling-was-an-isolated-incident-but-critics-still-have-concerns</breach:sourceUrl><breach:dateOfBreach>2024-10-04</breach:dateOfBreach><breach:dateOfDisclosure>2024-10-04</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>EIGEN token theft</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>3100000</breach:financialLossUsd></item><item><title>"Staking Protocol Bug Let Users Swap One Bitcoin for One Ethereum"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_bedrock-bug/</link><pubDate>Fri, 27 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_bedrock-bug/</guid><description>A staking platform called Bedrock lost around $2 million after exploiters discovered a bug that allowed them to swap 1 ETH for 1 BTC despite the more than $63,000 difference in prices for the two assets.A security firm working with Bedrock had tried to warn Bedrock of the vulnerability several hours …</description><content:encoded>&lt;p>A staking platform called Bedrock lost around $2 million after exploiters discovered a bug that allowed them to swap 1 ETH for 1 BTC despite the more than $63,000 difference in prices for the two assets.A security firm working with Bedrock had tried to warn Bedrock of the vulnerability several hours before the attack, but the team was asleep. The vulnerable contracts had been deployed a day and a half prior to the attack, and had not been audited.Fortunately for Bedrock, security groups were able to pause third-party projects surrounding Bedrock, which helped to limit the losses — which ultimately could have been as high as the entire value of funds on the protocol.&lt;/p>
&lt;p>Total loss estimated at $2,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/283440/staking-protocol-bug-let-users-swap-one-bitcoin-for-one-ethereum</breach:sourceUrl><breach:dateOfBreach>2024-09-27</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-27</breach:dateOfDisclosure><breach:initialAttackVector>Software bug / unintentional loss</breach:initialAttackVector><breach:vendorProduct>Bedrock bug</breach:vendorProduct><breach:blockchain>ethereum, bitcoin</breach:blockchain><breach:financialLossUsd>2000000</breach:financialLossUsd></item><item><title>"Onyx protocol exploited a second time for $3.8M via known bug"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_onyx-hack-2/</link><pubDate>Thu, 26 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_onyx-hack-2/</guid><description>The Onyx protocol was hacked for a second time by attackers taking advantage of known bugs in forks of the Compound Finance project. Projects regularly fail to patch these bugs, despite many instances of multi-million dollar hacks affecting Compound forks in the past.Onyx apparently didn't learn …</description><content:encoded><![CDATA[<p>The Onyx protocol was hacked for a second time by attackers taking advantage of known bugs in forks of the Compound Finance project. Projects regularly fail to patch these bugs, despite many instances of multi-million dollar hacks affecting Compound forks in the past.Onyx apparently didn&rsquo;t learn their lesson the first time around, when they were exploited for $2 million in November 2023 by an attacker taking advantage of a known vulnerability affecting empty markets on the protocol. This same bug seems to have contributed to this exploit, although Onyx has claimed the hack was due to a separate vulnerability in an NFT liquidation contract.</p>
<p>Total loss estimated at $3,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/onyx-protocol-exploited-second-time-3-8m-via-known-bug</breach:sourceUrl><breach:dateOfBreach>2024-09-26</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-26</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Onyx</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>3800000</breach:financialLossUsd></item><item><title>"Police Arrest Two People Related to $243M Crypto Heist Targeting Genesis Creditor"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_gemini-phishing-attack/</link><pubDate>Thu, 19 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_gemini-phishing-attack/</guid><description>Two people have been arrested in relation to a phishing scam that successfully stole more than 4,000 BTC priced at around $243 million from a single individual. The victim was targeted with a phishing scam in which the attackers posed as Google support employees and convinced the victim to reset …</description><content:encoded>&lt;p>Two people have been arrested in relation to a phishing scam that successfully stole more than 4,000 BTC priced at around $243 million from a single individual. The victim was targeted with a phishing scam in which the attackers posed as Google support employees and convinced the victim to reset their two-factor authentication for their account on the Gemini cryptocurrency exchange.The FBI raided a luxury home in Miami in connection to the theft, and arrested two men in their early twenties. Authorities worked with crypto investigators including zachxbt to trace the stolen funds.&lt;/p>
&lt;p>Total loss estimated at $243,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/business/2024/09/19/police-arrests-two-people-related-to-243m-crypto-heist-targeting-genesis-creditor</breach:sourceUrl><breach:dateOfBreach>2024-09-19</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-19</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>Gemini phishing attack</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>243000000</breach:financialLossUsd><breach:financialRecoveredUsd>500000</breach:financialRecoveredUsd></item><item><title>"Telegram bot Banana Gun’s users drained of over $1.9M"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_banana-gun-exploit/</link><pubDate>Thu, 19 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_banana-gun-exploit/</guid><description>Some people use a Telegram-based crypto trading bot called "Banana Gun" to "snipe" crypto trades, copytrade, and perform other activities. On September 19, at least 11 victims lost around $3 million after their accounts were apparently compromised and drained.Banana Gun acknowledged the attack on …</description><content:encoded><![CDATA[<p>Some people use a Telegram-based crypto trading bot called &ldquo;Banana Gun&rdquo; to &ldquo;snipe&rdquo; crypto trades, copytrade, and perform other activities. On September 19, at least 11 victims lost around $3 million after their accounts were apparently compromised and drained.Banana Gun acknowledged the attack on Twitter and shut down the bot. They posted that they did not believe their backend was compromised, and stated that they believed the attack occurred via a &ldquo;front-end vulnerability&rdquo; — though it was not clear what this might have referred to.</p>
<p>Total loss estimated at $3,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/telegram-bot-banana-gun-users-drained-500-ether</breach:sourceUrl><breach:dateOfBreach>2024-09-19</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-19</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Banana Gun</breach:vendorProduct><breach:blockchain>ethereum, solana</breach:blockchain><breach:financialLossUsd>3000000</breach:financialLossUsd><breach:affectedCount>11</breach:affectedCount></item><item><title>"Ethena domain registrar hacked, Ethena Labs warns users to stay away"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_ethena-website-compromised/</link><pubDate>Wed, 18 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_ethena-website-compromised/</guid><description>The website for the Ethena protocol was compromised by attackers who gained control of the project's domain registration. The protocol issued warnings to their users to urge them not to interact with the website, which could compromise their crypto holdings.They later were able to deactivate the …</description><content:encoded>The website for the Ethena protocol was compromised by attackers who gained control of the project&amp;rsquo;s domain registration. The protocol issued warnings to their users to urge them not to interact with the website, which could compromise their crypto holdings.They later were able to deactivate the website and regain control of the domain. &amp;ldquo;Remember scammers are always chasing you,&amp;rdquo; they wrote on Twitter.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/ethena-domain-registrar-hacked</breach:sourceUrl><breach:dateOfBreach>2024-09-18</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-18</breach:dateOfDisclosure><breach:initialAttackVector>DNS hijacking / domain takeover (front-end compromise)</breach:initialAttackVector><breach:vendorProduct>Ethena website compromised</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Delta Prime attacker stole $6M by minting massive number of tokens"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_delta-prime-hack-1/</link><pubDate>Mon, 16 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_delta-prime-hack-1/</guid><description>The DeltaPrime defi protocol suffered a $6 million loss after a private key was leaked. Access to the private key allowed the attacker to mint 1.1×1069 DPUSDC, which are tokens that allow holders to redeem the USDC stablecoin at a 1:1 ratio. They repeated the mint with several other deposit receipt …</description><content:encoded><![CDATA[<p>The DeltaPrime defi protocol suffered a $6 million loss after a private key was leaked. Access to the private key allowed the attacker to mint 1.1×1069 DPUSDC, which are tokens that allow holders to redeem the USDC stablecoin at a 1:1 ratio. They repeated the mint with several other deposit receipt tokens for bitcoin, ether, and other cryptocurrencies. Altogether, they redeemed a small fraction of these enormous quantities of deposit receipts, amounting to around $6 million in assets.DeltaPrime acknowledged the attack on Twitter, and announced that &ldquo;the risk is contained&rdquo;. They also stated that they were &ldquo;looking into other ways to reduce user losses to a minimum&rdquo;, including by pulling from the protocol&rsquo;s insurance pool.</p>
<p>Total loss estimated at $6,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/delta-prime-attack-6m-mint-tokens</breach:sourceUrl><breach:dateOfBreach>2024-09-16</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-16</breach:dateOfDisclosure><breach:initialAttackVector>Private key compromise</breach:initialAttackVector><breach:vendorProduct>Delta Prime</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>6000000</breach:financialLossUsd></item><item><title>"CryptoPunks NFT Worth $1.5 Million Just Sold for $23,000—Here's How"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_cryptopunk-niftex-sale/</link><pubDate>Wed, 11 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_cryptopunk-niftex-sale/</guid><description>A rare CryptoPunk NFT recently sold for only 10 ETH (~$25,300), despite a market value that's likely around 600 ETH (~$1.5 million). The sale went through thanks to lingering smart contracts from a defunct NFT fractionalization platform called Niftex, which allowed people to buy and sell "shards" of …</description><content:encoded><![CDATA[<p>A rare CryptoPunk NFT recently sold for only 10 ETH (<del>$25,300), despite a market value that&rsquo;s likely around 600 ETH (</del>$1.5 million). The sale went through thanks to lingering smart contracts from a defunct NFT fractionalization platform called Niftex, which allowed people to buy and sell &ldquo;shards&rdquo; of various NFTs. Niftex launched in November 2020, and is now defunct, with its domain redirecting to the Kraken cryptocurrency exchange.The platform&rsquo;s smart contracts remain operational, however, and so despite the lack of a frontend website for the platform, the backend still remains. A trader was able to use these smart contracts to trigger a feature that allows a buyout of the fractional shard holders which, if not countered by someone else, automatically goes through in 14 days. The bidder proposed a purchase of 0.001 ETH per share, and without an operational Niftex frontend, no one noticed. The bid went through, and the trader successfully purchased all 10,000 shares — and thus, the NFT — for 10 ETH.Since then, several people have offered to purchase the NFT for amounts ranging from 100 to 605 ETH. If the new owner were to accept the 605 ETH bid, they would 60x their purchase price.One owner of a fractionalized share said he thought he had managed to successfully block the sale, but miscalculated. &ldquo;GG to the new owner&rdquo;, he wrote. He wrote on Twitter, &ldquo;I don’t consider this a heist.  It’s an arb.  The smart contract worked as intended. If you want decentralized systems you have to take the good with the bad.  It’s part of the game.  It’s why we’re here.   If you don’t like those rules, you probably shouldn’t be playing.&rdquo;</p>
<p>Total loss estimated at $1,400,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/249012/cryptopunks-nft-worth-1-5-million-sold-23000</breach:sourceUrl><breach:dateOfBreach>2024-09-11</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-11</breach:dateOfDisclosure><breach:vendorProduct>Cryptopunk Niftex sale</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1400000</breach:financialLossUsd></item><item><title>Tweet thread by CertiK</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_cut-token-exploit/</link><pubDate>Tue, 10 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_cut-token-exploit/</guid><description>An attacker exploited a bug in the smart contract for a BSC-based token called CUT, draining a PancakeSwap liquidity pool of almost $1.45 million in the BSC-USD stablecoin.

Total loss estimated at $1,448,974.</description><content:encoded>&lt;p>An attacker exploited a bug in the smart contract for a BSC-based token called CUT, draining a PancakeSwap liquidity pool of almost $1.45 million in the BSC-USD stablecoin.&lt;/p>
&lt;p>Total loss estimated at $1,448,974.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CertiKAlert/status/1833531143339012327</breach:sourceUrl><breach:dateOfBreach>2024-09-10</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-10</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>CUT token</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>1448974</breach:financialLossUsd></item><item><title>"Friend.tech creators walk off with $44m as project shuts down"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_friend-tech-team-abandons-project/</link><pubDate>Sat, 07 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_friend-tech-team-abandons-project/</guid><description>The development team behind friend.tech has officially ditched the crypto-based social media project, which was (very) briefly hailed as a potential platform for influencers to earn money from their followers. It attracted crypto influencers, OnlyFans models, and a handful of more mainstream …</description><content:encoded>The development team behind friend.tech has officially ditched the crypto-based social media project, which was (very) briefly hailed as a potential platform for influencers to earn money from their followers. It attracted crypto influencers, OnlyFans models, and a handful of more mainstream notables. Friend.tech received undisclosed seed funding from the crypto venture capital firm Paradigm.The project spiked in popularity when it launched in August 2023, but interest rapidly dwindled. A token launched in May 2024 also suffered a mostly downward trajectory. On September 7, the team reassigned ownership and admin rights to the smart contracts to the burn address, making them permanently inaccessible.Some denounced the project as a Ponzi scheme (repeating accusations it has received since its inception, based on its incentive structure). Others accused the development team of rug pulling and not delivering on their promises — accusations that intensified as one co-founder deleted his Twitter account and the other set his to private. The team is estimated to have made around $44 to $60 million in fees.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.dlnews.com/articles/defi/friend-tech-shuts-down-after-revenue-and-users-plummet/</breach:sourceUrl><breach:dateOfBreach>2024-09-07</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-07</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Friend.tech team abandons project</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Hackers breach social media accounts of Lara and Tiffany Trump"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_trump-family-twitter-accounts-compromised/</link><pubDate>Tue, 03 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_trump-family-twitter-accounts-compromised/</guid><description>The Twitter accounts belonging to Lara and Tiffany Trump were compromised and used to announce a fake launch of the (unfortunately real) World Liberty Financial project that their family has been promoting. Donald Trump's son Eric tried to warn people of the scam, but in doing so retweeted the scam …</description><content:encoded><![CDATA[<p>The Twitter accounts belonging to Lara and Tiffany Trump were compromised and used to announce a fake launch of the (unfortunately real) World Liberty Financial project that their family has been promoting. Donald Trump&rsquo;s son Eric tried to warn people of the scam, but in doing so retweeted the scam tweet containing the malicious token address.The posts were deleted and accounts were locked down very quickly by Twitter, but not before approximately 2,000 people bought around $1.8 million of the fake token.</p>
<p>Total loss estimated at $1,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.politico.com/news/2024/09/03/lara-tiffany-trump-social-media-hack-00177261</breach:sourceUrl><breach:dateOfBreach>2024-09-03</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-03</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Trump family Twitter accounts compromised</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1800000</breach:financialLossUsd><breach:affectedCount>2000</breach:affectedCount></item><item><title>"Lacoste Quietly Shuts Down NFT Project UNDW3, Community Alleges 'Soft Rug Pull'"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_lacoste-quietly-ditches-its-undw3-project/</link><pubDate>Tue, 03 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_lacoste-quietly-ditches-its-undw3-project/</guid><description>Lacoste abruptly shutdown the website, Discord, and Twitter account belonging to "UNDW3", its NFT project. Lacoste launched its original collection of NFTs in June 2022, selling 11,212 of the tokens for 0.08 ETH (~$93 at the time). Lacoste made around $1 million off the mint, plus earnings from fees …</description><content:encoded><![CDATA[Lacoste abruptly shutdown the website, Discord, and Twitter account belonging to &ldquo;UNDW3&rdquo;, its NFT project. Lacoste launched its original collection of NFTs in June 2022, selling 11,212 of the tokens for 0.08 ETH (<del>$93 at the time). Lacoste made around $1 million off the mint, plus earnings from fees on secondary sales. Later announcements promised holders of the NFTs that they could participate in raffles to earn real-life merchandise and &ldquo;digital twins&rdquo;. They were also promised a say in the future direction of the brand.However, that&rsquo;s vanished as the project was closed without any acknowledgement. People still have their NFTs, but can no longer earn benefits from Lacoste. Meanwhile, resale prices have dwindled to around 0.004 ETH (</del>$13). Angry token holders have accused Lacoste of a &ldquo;soft rug pull&rdquo;.Perhaps naming your crypto project &ldquo;underwater&rdquo; was an ill omen.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://blog.cryptoflies.com/lacoste-quietly-shuts-down-nft-project-undw3-community-alleges-soft-rug/#:~:text=Lacoste%20quietly%20shut%20down%20its,may%20have%20influenced%20the%20decision.&amp;text=Fashion%20brand%20Lacoste%20appears%20to,(NFT)%20project%2C%20UNDW3.</breach:sourceUrl><breach:dateOfBreach>2024-09-03</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-03</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Lacoste quietly ditches its "UNDW3" project</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Penpie Post-Mortem Report"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-09_penpie-hacked-for-27-3-million/</link><pubDate>Tue, 03 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-09_penpie-hacked-for-27-3-million/</guid><description>The defi protocol Penpie was exploited for 11,113.6 ETH (~$27.3 million) by an attacker who exploited a flaw allowing them to withdraw unearned "rewards". Although the protocol claimed to have been audited by two blockchain security firms, they later disclosed that the smart contracts containing the …</description><content:encoded><![CDATA[<p>The defi protocol Penpie was exploited for 11,113.6 ETH (~$27.3 million) by an attacker who exploited a flaw allowing them to withdraw unearned &ldquo;rewards&rdquo;. Although the protocol claimed to have been audited by two blockchain security firms, they later disclosed that the smart contracts containing the bugs had not been fully audited.The team behind Pendle (the platform on which Pendie is built) detected the attack and paused Pendle an hour after the attack began, which they claim prevented another $105 million from being stolen.Members of the Penpie team filed complaints with Singaporean police and the US FBI. They also attempted to negotiate a &ldquo;bug bounty&rdquo; via on-chain and social media messages to the attacker, but the hacker seems uninterested and has continued to transfer funds between various crypto wallets and launder funds through Tornado Cash.</p>
<p>Total loss estimated at $27,348,259.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://blog.penpiexyz.io/penpie-post-mortem-report-1ac9863b663a</breach:sourceUrl><breach:dateOfBreach>2024-09-03</breach:dateOfBreach><breach:dateOfDisclosure>2024-09-03</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract vulnerability exploit</breach:initialAttackVector><breach:vendorProduct>Penpie</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>27348259</breach:financialLossUsd></item><item><title>"Aave hacked via periphery contract — $56K stolen from 'tip jar'"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_peripheral-aave-smart-contract-hack/</link><pubDate>Wed, 28 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_peripheral-aave-smart-contract-hack/</guid><description>The popular defi lending platform, Aave, suffered a smart contract exploit that allowed an attacker to steal around $56,000. A smart contract outside of the core Aave protocol, which is used to allow people to use existing collateral to repay their loans, had gradually accrued a balance of tokens …</description><content:encoded><![CDATA[<p>The popular defi lending platform, Aave, suffered a smart contract exploit that allowed an attacker to steal around $56,000. A smart contract outside of the core Aave protocol, which is used to allow people to use existing collateral to repay their loans, had gradually accrued a balance of tokens leftover from slippage. These small leftover token amounts are sometimes called &ldquo;dust&rdquo;. Altogether, these tokens amounted to around $70,000 across several blockchain networks.An exploiter was able to take advantage of an arbitrary call error that allowed them to steal funds from these various contracts, amounting to around $56,000. Various people associated with Aave emphasized that there was no risk to user funds or flaw in the core Aave protocol, and one described the hack as &ldquo;raiding the tip jar&rdquo;.</p>
<p>Total loss estimated at $56,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://protos.com/aave-hacked-via-periphery-contract-56k-stolen-from-tip-jar/</breach:sourceUrl><breach:dateOfBreach>2024-08-28</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-28</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract vulnerability exploit</breach:initialAttackVector><breach:vendorProduct>"Peripheral" Aave smart contract</breach:vendorProduct><breach:blockchain>ethereum, polygon, avalanche</breach:blockchain><breach:financialLossUsd>56000</breach:financialLossUsd></item><item><title>"Bitcoin miner Rhodium files for bankruptcy in Texas court"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_rhodium-enterprises-bankruptcy/</link><pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_rhodium-enterprises-bankruptcy/</guid><description>The Texas-based Rhodium Enterprises bitcoin mining company has filed for bankruptcy, disclosing debts between $50 and $100 million and total assets between $100 and $500 million. The company had tried to begin restructuring, but was not able to reach agreement among shareholders, and so decided to …</description><content:encoded>The Texas-based Rhodium Enterprises bitcoin mining company has filed for bankruptcy, disclosing debts between $50 and $100 million and total assets between $100 and $500 million. The company had tried to begin restructuring, but was not able to reach agreement among shareholders, and so decided to enter bankruptcy.Bitcoin mining has been an extremely challenging business in recent times, partly due to volatile crypto prices over the last few years, and due to diminishing miner rewards following the April halving event.Rhodium Enterprises had been showing signs of trouble, including failing to make scheduled loan payments earlier this month. In December 2023, a dispute between them and a subsidiary of the Riot Platforms bitcoin mining group culminated in armed security removing Rhodium employees from a bitcoin mining facility in Rockdale, Texas, where Rhodium was leasing bitcoin miners. The case was later sent to arbitration.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/bitcoin-miner-rhodium-files-bankruptcy-texas</breach:sourceUrl><breach:dateOfBreach>2024-08-26</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-26</breach:dateOfDisclosure><breach:initialAttackVector>Protocol collapse / insolvency</breach:initialAttackVector><breach:vendorProduct>Rhodium Enterprises bankruptcy</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain></item><item><title>Tweet by ValidatorK</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_users-suffer-losses-after-polygon-discord-hack/</link><pubDate>Sat, 24 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_users-suffer-losses-after-polygon-discord-hack/</guid><description>Some fans of the Polygon blockchain, or those looking for help with using it, suffered losses after hackers successfully compromised the project's Discord server. Discord hacks have become a major issue in the cryptocurrency world, and although Polygon is one of the largest projects to suffer a …</description><content:encoded><![CDATA[<p>Some fans of the Polygon blockchain, or those looking for help with using it, suffered losses after hackers successfully compromised the project&rsquo;s Discord server. Discord hacks have become a major issue in the cryptocurrency world, and although Polygon is one of the largest projects to suffer a Discord compromise, it&rsquo;s far from the only project to do so.One member of the Discord described losing more than $140,000 in tokens after clicking a link shared by a person appearing to be a member of the Polygon team, which advertised a token distribution to serve as a &ldquo;pre-migration celebration&rdquo;.</p>
<p>Total loss estimated at $140,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/ValidatorK/status/1827255871765934329/</breach:sourceUrl><breach:dateOfBreach>2024-08-24</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-24</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Users</breach:vendorProduct><breach:blockchain>polygon</breach:blockchain><breach:financialLossUsd>140000</breach:financialLossUsd></item><item><title>"McRugged: Hackers Take Over McDonald’s Instagram, Make $700K on Fake Grimace Token"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_mcdonalds-instagram-hack/</link><pubDate>Wed, 21 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_mcdonalds-instagram-hack/</guid><description>McDonald's Instagram account, as well as the Twitter account of a McDonald's marketing director, began promoting a memecoin called $GRIMACE (named for the restaurant chain's blobby purple mascot). The posts to McDonald's 5.1 million followers caused the token price to spike. Then, the attacker sold …</description><content:encoded><![CDATA[<p>McDonald&rsquo;s Instagram account, as well as the Twitter account of a McDonald&rsquo;s marketing director, began promoting a memecoin called $GRIMACE (named for the restaurant chain&rsquo;s blobby purple mascot). The posts to McDonald&rsquo;s 5.1 million followers caused the token price to spike. Then, the attacker sold off their holdings, profiting around $700,000 and plunging the token price.They then boasted about their haul on the compromised Instagram account, changing the bio to say: &ldquo;Sorry mah nigga you have just been rug pulled by India_X_Kr3w thank you for the $700,000 in Solana 🇮🇳&quot;.The token stunt by the massive company was perhaps made more believable by McDonald&rsquo;s previous forays into crypto, including when they launched a McRib-themed NFT project in December 2021. The company had also joked about a &ldquo;Grimacecoin&rdquo; back in January 2022, in a reply to a tweet from Elon Musk.</p>
<p>Total loss estimated at $700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/245783/mcrugged-hackers-mcdonalds-instagram-make-700k-grimace-token</breach:sourceUrl><breach:dateOfBreach>2024-08-21</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-21</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>McDonalds Instagram</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>700000</breach:financialLossUsd></item><item><title>Tweet by Lookonchain</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_crypto-holder-loses-over-55-million-to-apparent-phishing-attack/</link><pubDate>Tue, 20 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_crypto-holder-loses-over-55-million-to-apparent-phishing-attack/</guid><description>Someone holding almost $55.5 million in the DAI stablecoin was apparently phished, signing a transaction to reassign ownership of their DAI stash to a phishing address. The victim appeared to realize their error several hours later, attempting to withdraw the tokens only to have the transaction fail …</description><content:encoded>&lt;p>Someone holding almost $55.5 million in the DAI stablecoin was apparently phished, signing a transaction to reassign ownership of their DAI stash to a phishing address. The victim appeared to realize their error several hours later, attempting to withdraw the tokens only to have the transaction fail since they were no longer the owner of the assets.The attacker later moved the stablecoins to a new wallet, and exchanged about half of them for 10,625 ETH.&lt;/p>
&lt;p>Total loss estimated at $55,473,618.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/lookonchain/status/1826161475049894198</breach:sourceUrl><breach:dateOfBreach>2024-08-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-20</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>Crypto holder</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>55473618</breach:financialLossUsd></item><item><title>"Judge Fines Ripple $125M, Bans Future Securities Law Violations in Long-Running SEC Case"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_ripple-fined-125-million-by-the-sec/</link><pubDate>Wed, 07 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_ripple-fined-125-million-by-the-sec/</guid><description>A judgment has been issued in the long-running case against Ripple by the SEC, and the company has been fined $125 million for violations of securities laws in its institutional sales of its XRP token. The SEC has also obtained an injunction against the company, with the judge in the case opining …</description><content:encoded>A judgment has been issued in the long-running case against Ripple by the SEC, and the company has been fined $125 million for violations of securities laws in its institutional sales of its XRP token. The SEC has also obtained an injunction against the company, with the judge in the case opining that there was a &amp;ldquo;likelihood that [Ripple] will eventually (if it has not already) cross the line&amp;rdquo; again with respect to securities laws.Ripple and others in the crypto world have been celebrating the judgment as a victory, in part because it is a substantially smaller penalty than the $1 billion in disgorgement and $900 million in penalties sought by the agency.The SEC has already signaled throughout the case that they were likely to appeal an eventual outcome, after objecting to the judge&amp;rsquo;s decision that several other types of token sales were not unlawful securities offerings.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/policy/2024/08/07/judge-fines-ripple-125m-bans-future-securities-law-violations-in-long-running-sec-case/</breach:sourceUrl><breach:dateOfBreach>2024-08-07</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-07</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>Ripple</breach:vendorProduct><breach:blockchain>ripple</breach:blockchain></item><item><title>"New Ronin Bridge hack down to dodgy upgrade, team banks on 'white hat' op"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_12-million-taken-by-whitehats-from-ronin-bridge/</link><pubDate>Tue, 06 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_12-million-taken-by-whitehats-from-ronin-bridge/</guid><description>The Ronin bridge, which bridges crypto assets to the Ronin Network used by Axie Infinity and other gaming projects, has once again suffered a breach — though a considerably smaller one than the recordbreaking $625 million theft in March 2022. An update to the bridge code introduced a flaw with …</description><content:encoded>&lt;p>The Ronin bridge, which bridges crypto assets to the Ronin Network used by Axie Infinity and other gaming projects, has once again suffered a breach — though a considerably smaller one than the recordbreaking $625 million theft in March 2022. An update to the bridge code introduced a flaw with respect to how transactions were confirmed.Fortunately for the Ronin team, it seems that most of the losses actually went to whitehats and MEV bots that were frontrunning transactions by would-be exploiters. ETH and USDC priced at around $12 million were taken — the maximum amount before triggering a safety feature in the code. Later that day, Ronin announced that the ETH (worth around $10 million) had been returned, and that the USDC was in the process of being returned. They also announced that they would reward the whitehats with a $500,000 bug bounty reward.The Ronin bridge was taken offline shortly after the flaw was detected, and the team announced it would undergo an audit before being brought back online.&lt;/p>
&lt;p>Total loss estimated at $12,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://protos.com/new-ronin-bridge-hack-down-to-dodgy-upgrade-team-banks-on-white-hat-op/</breach:sourceUrl><breach:dateOfBreach>2024-08-06</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-06</breach:dateOfDisclosure><breach:initialAttackVector>MEV / sandwich attack</breach:initialAttackVector><breach:vendorProduct>$12 million taken by whitehats from Ronin bridge</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>12000000</breach:financialLossUsd><breach:financialRecoveredUsd>11500000</breach:financialRecoveredUsd></item><item><title>"No one surprised as DJT token has finally rugged"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_trump-themed-djt-token-rug-pulls-people-blame-martin-shkreli-or-barron-trump/</link><pubDate>Tue, 06 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_trump-themed-djt-token-rug-pulls-people-blame-martin-shkreli-or-barron-trump/</guid><description>Surprising just about no one, a wallet holding around 20% of the supply of the $DJT Trump-themed memecoin suddenly dumped its holdings, crashing the token price by around 90%. The token price had briefly spiked in June, when it was falsely reported that the token was "an official Trump token". …</description><content:encoded><![CDATA[<p>Surprising just about no one, a wallet holding around 20% of the supply of the $DJT Trump-themed memecoin suddenly dumped its holdings, crashing the token price by around 90%. The token price had briefly spiked in June, when it was falsely reported that the token was &ldquo;an official Trump token&rdquo;. However, the token&rsquo;s price had already dwindled since that time, and before the sudden dump.People were quick to blame those behind the project, primarily &ldquo;Pharma Bro&rdquo; Martin Shkreli (who has been accused of dumping his own token before). Shkreli was quick to shift the blame to Donald Trump&rsquo;s youngest son, Barron, who he has also claimed is behind the token (although this has not been independently confirmed). However, the owner of the wallet that dumped its tokens is not definitively known.</p>
<p>Total loss estimated at $2,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://protos.com/no-one-surprised-as-djt-token-has-finally-rugged/</breach:sourceUrl><breach:dateOfBreach>2024-08-06</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-06</breach:dateOfDisclosure><breach:vendorProduct>Trump-themed $DJT token</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>2000000</breach:financialLossUsd></item><item><title>"Kujira Foundation's Tokens Stung by Its Own Leveraged Positions as Bets Backfire"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-08_kujira-token-tanks-as-team-s-leveraged-bets-melt-down/</link><pubDate>Thu, 01 Aug 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-08_kujira-token-tanks-as-team-s-leveraged-bets-melt-down/</guid><description>The team behind the Kujira project wound up with around $2 million in bad debt after taking some of their operational funds and using it to make leveraged bets on their own platform. They blamed "a series of events over the last few months, including exploits, socially engineered attacks and …</description><content:encoded>The team behind the Kujira project wound up with around $2 million in bad debt after taking some of their operational funds and using it to make leveraged bets on their own platform. They blamed &amp;ldquo;a series of events over the last few months, including exploits, socially engineered attacks and fallouts within the ecosystem&amp;rdquo; for causing the positions to be liquidated. The $KUJI token price crashed by more than 60% as a result of the team&amp;rsquo;s poor risk management.The Kujira team apologized for the fiasco, and announced a plan to create a DAO to take over the project treasury.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/markets/2024/08/02/kujira-foundations-tokens-stung-by-its-own-leveraged-positions-as-bets-backfire/</breach:sourceUrl><breach:dateOfBreach>2024-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-08-01</breach:dateOfDisclosure><breach:vendorProduct>Kujira token tanks as team's leveraged bets melt down</breach:vendorProduct><breach:blockchain>cosmos</breach:blockchain></item><item><title>"Community Update on the Future of Reignmakers"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_draftkings-reignmakers-shutdown/</link><pubDate>Tue, 30 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_draftkings-reignmakers-shutdown/</guid><description>American sports gambling behemoth DraftKings announced the shutdown of its Reignmakers NFT game and NFT marketplace, effective immediately. Reignmakers was a fantasy sports game that allowed players to purchase digital trading cards used for digital fantasy leagues.In an announcement in the project …</description><content:encoded><![CDATA[American sports gambling behemoth DraftKings announced the shutdown of its Reignmakers NFT game and NFT marketplace, effective immediately. Reignmakers was a fantasy sports game that allowed players to purchase digital trading cards used for digital fantasy leagues.In an announcement in the project Discord and on their website, DraftKings wrote that the shutdown was &ldquo;due to recent developments&rdquo;. They offered holders the ability to cash out their Reignmakers cards &ldquo;based on factors that include, but are not limited to, the relative size and quality of your digital game piece collection&rdquo;. Holders were also invited to transfer their NFTs to their own cryptocurrency wallets, although the DraftKings-run &ldquo;contests&rdquo; in which people used their NFTs to try to earn rewards and win prizes will no longer exist. It&rsquo;s also unclear whether some NFTs, built to not be transferrable off-marketplace, will be able to be retained by their holders.Members of the DraftKings Discord reacted with chagrin to the news, and doubt that the vague promises of cash payments would amount to much. &ldquo;What kind of compensation u think we get coming to us? Pennies?&rdquo; wrote one. &ldquo;Yeah I&rsquo;m out like $20k,&rdquo; said another. Some blamed the shutdown on a recent lawsuit from a holder of the Reignmakers NFTs who lost $14,000 — a lawsuit which recently survived the motion to dismiss stage.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://reignmakers.draftkings.com/reignmakers-faqs</breach:sourceUrl><breach:dateOfBreach>2024-07-30</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-30</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>DraftKings Reignmakers shutdown</breach:vendorProduct><breach:blockchain>ethereum, polygon</breach:blockchain></item><item><title>"Compound DAO asleep at the wheel as $25M governance 'attack' passes"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_compound-dao-governance-attack/</link><pubDate>Sun, 28 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_compound-dao-governance-attack/</guid><description>A controversial proposal in front of the Compound Finance DAO has narrowly passed, granting 499,000 COMP (~$24 million, and amounting to 5% of the project's treasury) to an outside group. A Compound Finance whale, "Humpy", proposed the vote to allocate the tokens to a protocol created by a group …</description><content:encoded><![CDATA[A controversial proposal in front of the Compound Finance DAO has narrowly passed, granting 499,000 COMP (~$24 million, and amounting to 5% of the project&rsquo;s treasury) to an outside group. A Compound Finance whale, &ldquo;Humpy&rdquo;, proposed the vote to allocate the tokens to a protocol created by a group called the &ldquo;Golden Boys&rdquo;, which Humpy also leads. The vote was the third attempt to allocate tokens to the Golden Boys&rsquo; group, after two unsuccessful votes in May and earlier in July.Humpy has previously been accused of governance attacks on other protocols, including Balancer and SushiSwap.Prior to the proposal&rsquo;s passage, some Compound Finance DAO members raised objections. &ldquo;In my personal opinion, the actions of Humpy and the Golden Boys can be considered a governance attack if they persist in their attempts to take funds from the protocol in clear opposition to the will of all other Compound DAO delegates,&rdquo; stated Compound Finance security adviser Michael Lewellen, who also described the proposal as &ldquo;a malicious attempt to steal funds from the protocol&rdquo;.Afterwards, Lewellen wrote that &ldquo;OpenZeppelin is working with all active delegates and Compound contributors to assess our options for protecting the protocol. We see serious risks to the future decentralization of the DAO as a result of Proposal 289 passing and so we are exploring options to mitigate or reverse this outcome.&rdquo;]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://protos.com/compound-dao-asleep-at-the-wheel-as-25m-governance-attack-passes/</breach:sourceUrl><breach:dateOfBreach>2024-07-28</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-28</breach:dateOfDisclosure><breach:initialAttackVector>Governance attack / malicious on-chain proposal</breach:initialAttackVector><breach:vendorProduct>Compound DAO governance attack</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>ETHTrustFund</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_ethtrustfund-rug-pull/</link><pubDate>Sat, 20 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_ethtrustfund-rug-pull/</guid><description>The operators of a project called ETHTrustFund on Coinbase's Base layer-2 Ethereum blockchain have apparently rug-pulled the project. The ETHTrustFund project was a fork of the Olympus DAO project on Base, but there was months of inactivity on the project following its March launch. Then, on July …</description><content:encoded><![CDATA[<p>The operators of a project called ETHTrustFund on Coinbase&rsquo;s Base layer-2 Ethereum blockchain have apparently rug-pulled the project. The ETHTrustFund project was a fork of the Olympus DAO project on Base, but there was months of inactivity on the project following its March launch. Then, on July 20, the developer deleted his Telegram and Twitter accounts and the project&rsquo;s website, and suddenly moved the project treasury to a new wallet. The funds were then laundered through Railgun and Tornado Cash.</p>
<p>Total loss estimated at $2,200,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://rekt.news/ethtrustfund-rekt/</breach:sourceUrl><breach:dateOfBreach>2024-07-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-20</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>ETHTrustFund</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>2200000</breach:financialLossUsd></item><item><title>Tweet by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_rho-loss/</link><pubDate>Fri, 19 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_rho-loss/</guid><description>An apparent misconfiguration by the RHO Markets lending protocol allowed operators of an MEV bot to take $7.6 million from the project's users across multiple chains.In a stroke of luck for the RHO team, the MEV bot operator sent RHO an on-chain message indicating they were willing to return all of …</description><content:encoded>An apparent misconfiguration by the RHO Markets lending protocol allowed operators of an MEV bot to take $7.6 million from the project&amp;rsquo;s users across multiple chains.In a stroke of luck for the RHO team, the MEV bot operator sent RHO an on-chain message indicating they were willing to return all of the funds, although they first demanded that RHO &amp;ldquo;admit that it was not an exploit or a hack, but a misconfiguration on your end. Also, please provide what you are going to do to prevent it from happening again.&amp;ldquo;RHO is built on the Scroll Ethereum layer-2 network. Scroll temporarily paused the chain as RHO investigated the loss.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/zachxbt/status/1814286415347544211</breach:sourceUrl><breach:dateOfBreach>2024-07-19</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-19</breach:dateOfDisclosure><breach:initialAttackVector>MEV / sandwich attack</breach:initialAttackVector><breach:vendorProduct>Rho loss</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialRecoveredUsd>7600000</breach:financialRecoveredUsd></item><item><title>"India’s WazirX confirms security breach following a $230M ‘suspicious transfer’"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_wazirx-hack/</link><pubDate>Thu, 18 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_wazirx-hack/</guid><description>After a $230 million "suspicious transfer", Indian cryptocurrency exchange WazirX has paused withdrawals and acknowledged that one of their multisignature wallets was compromised. The attacker began selling off the tokens, causing the price of tokens like Shiba Inu to drop around 10%.WazirX is the …</description><content:encoded><![CDATA[<p>After a $230 million &ldquo;suspicious transfer&rdquo;, Indian cryptocurrency exchange WazirX has paused withdrawals and acknowledged that one of their multisignature wallets was compromised. The attacker began selling off the tokens, causing the price of tokens like Shiba Inu to drop around 10%.WazirX is the largest cryptocurrency exchange in India. The company was acquired by Binance in 2019, but the two companies re-separated in 2023 after a bizarre public dispute.WazirX&rsquo;s June 2024 proof-of-reserves reported around $500 million in total holdings, making the $235 million theft a substantial portion of the assets held at the exchange.Blockchain sleuth zachxbt observed that the theft had some of the hallmarks of the Lazarus Group, a North Korean hacking group that has perpetrated other 9-figure heists including the $625 million Axie Infinity theft in March 2022, and the theft of more than $100 million from Atomic Wallet users. The US and South Korea both officially pinned the attack on North Korea later on.</p>
<p>Total loss estimated at $235,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://techcrunch.com/2024/07/18/indias-wazirx-confirms-security-breach-after-230-million-suspicious-transfer/</breach:sourceUrl><breach:dateOfBreach>2024-07-18</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-18</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>WazirX</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>235000000</breach:financialLossUsd></item><item><title>Tweet by Trekki</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_trekki-nft-shutdown/</link><pubDate>Wed, 17 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_trekki-nft-shutdown/</guid><description>Travel company Trip.com has some perturbed crypto holders on its hands, after shutting down the "Trekki" NFT project it launched in June 2023. The company's dolphin-themed NFTs had come with a roadmap that promised eventual staking features, "travel to grow" and "travel to earn" mechanisms, and …</description><content:encoded><![CDATA[Travel company Trip.com has some perturbed crypto holders on its hands, after shutting down the &ldquo;Trekki&rdquo; NFT project it launched in June 2023. The company&rsquo;s dolphin-themed NFTs had come with a roadmap that promised eventual staking features, &ldquo;travel to grow&rdquo; and &ldquo;travel to earn&rdquo; mechanisms, and other developments, which have been cancelled. However, Trip.com promised that its discount coupon functionality would remain.&ldquo;Can&rsquo;t believe @Trip a multibillion company is also a rugged project,&rdquo; wrote one person in response to the shutdown announcement.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/TrekkiNFT/status/1813142415588671645</breach:sourceUrl><breach:dateOfBreach>2024-07-17</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-17</breach:dateOfDisclosure><breach:vendorProduct>Trekki NFT shutdown</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>Tweet by LI.FI</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_li-fi-exploit/</link><pubDate>Tue, 16 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_li-fi-exploit/</guid><description>Users of the cross-chain swapping API LI.FI Protocol, and of projects that build on top of it, suffered wallet drains amounting to at least $10 million (and counting). An attacker was able to exploit the users who had set infinite approvals. The protocol urged those who had interacted with several …</description><content:encoded><![CDATA[<p>Users of the cross-chain swapping API LI.FI Protocol, and of projects that build on top of it, suffered wallet drains amounting to at least $10 million (and counting). An attacker was able to exploit the users who had set infinite approvals. The protocol urged those who had interacted with several affected smart contracts to revoke permission, and warned: &ldquo;Please do not interact with any LI.FI powered applications for now!&rdquo;</p>
<p>Total loss estimated at $10,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/lifiprotocol/status/1813196697641570635</breach:sourceUrl><breach:dateOfBreach>2024-07-16</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-16</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>LI.FI</breach:vendorProduct><breach:blockchain>ethereum, solana</breach:blockchain><breach:financialLossUsd>10000000</breach:financialLossUsd></item><item><title>Tweet by Chaofan Shou</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_minterest-hack/</link><pubDate>Sun, 14 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_minterest-hack/</guid><description>An attacker stole $1.4 million from the defi lending project Minterest. Using a flash loan attack, they manipulated the exchange rate calculated by the project, allowing them to withdraw more tokens than they originally loaned.Minterest paused the supply and borrow portions of their protocol after …</description><content:encoded>&lt;p>An attacker stole $1.4 million from the defi lending project Minterest. Using a flash loan attack, they manipulated the exchange rate calculated by the project, allowing them to withdraw more tokens than they originally loaned.Minterest paused the supply and borrow portions of their protocol after the attack, and attempted to contact the attacker to negotiate a return of some of the funds.&lt;/p>
&lt;p>Total loss estimated at $1,400,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/shoucccc/status/1812659977464729991</breach:sourceUrl><breach:dateOfBreach>2024-07-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-14</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Minterest</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1400000</breach:financialLossUsd></item><item><title>"Dough Finance loses $1.8M in flash loan attack"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_dough-finance-hack/</link><pubDate>Fri, 12 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_dough-finance-hack/</guid><description>Defi platform Dough Finance was hacked for 608 ETH ($1.8 million) by a hacker using a flash loan attack funded through the Railgun privacy service.Dough Finance sent an on-chain message to the attacker, asking them to return the "misappropriated funds", threatening that they would "pursue all …</description><content:encoded><![CDATA[<p>Defi platform Dough Finance was hacked for 608 ETH ($1.8 million) by a hacker using a flash loan attack funded through the Railgun privacy service.Dough Finance sent an on-chain message to the attacker, asking them to return the &ldquo;misappropriated funds&rdquo;, threatening that they would &ldquo;pursue all criminal, legal, and administrative avenues available&rdquo; in the event that the attacker did not do so.</p>
<p>Total loss estimated at $1,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/dough-finance-loses-1-8m-flash-loan-attack</breach:sourceUrl><breach:dateOfBreach>2024-07-12</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-12</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Dough Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1800000</breach:financialLossUsd></item><item><title>"American rapper Doja Cat’s X account was hacked to promote a now-collapsed token"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-07_doja-cat-twitter-hack/</link><pubDate>Mon, 08 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-07_doja-cat-twitter-hack/</guid><description>The Twitter account belonging to rapper Doja Cat was compromised on July 8, tweeting to her 5.6 million followers that they should "buy $DOJA or else", and various other messages to that effect. Doja Cat quickly posted on her Instagram account to say that the Twitter account had been compromised.The …</description><content:encoded>The Twitter account belonging to rapper Doja Cat was compromised on July 8, tweeting to her 5.6 million followers that they should &amp;ldquo;buy $DOJA or else&amp;rdquo;, and various other messages to that effect. Doja Cat quickly posted on her Instagram account to say that the Twitter account had been compromised.The attacker appeared to have only marginal success, as the token reached a market cap of around $500,000 before collapsing by 96%.Hackers have compromised a string of celebrity Twitter accounts to promote memecoins recently, including those of Hulk Hogan and Metallica.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/304127/american-rapper-doja-cats-x-account-was-hacked-to-promote-a-now-collapsed-token</breach:sourceUrl><breach:dateOfBreach>2024-07-08</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-08</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Doja Cat Twitter</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"SEC Charges Consensys Software for Unregistered Offers and Sales of Securities Through Its MetaMask Staking Service"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_sec-sues-consensys/</link><pubDate>Fri, 28 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_sec-sues-consensys/</guid><description>As expected, the SEC has filed a lawsuit against Consensys, the maker of the popular MetaMask cryptocurrency wallet. Although Consensys had recently gloated about the SEC completing an investigation into the company's offering of ETH, and determining not to pursue action over it, a Wells notice sent …</description><content:encoded>As expected, the SEC has filed a lawsuit against Consensys, the maker of the popular MetaMask cryptocurrency wallet. Although Consensys had recently gloated about the SEC completing an investigation into the company&amp;rsquo;s offering of ETH, and determining not to pursue action over it, a Wells notice sent to the firm in April suggested that some legal action was impending. Shortly afterwards, Consensys filed a lawsuit against the SEC, alleging regulatory overreach.The SEC&amp;rsquo;s lawsuit claims that Consensys violated securities laws by acting as an unregistered securities broker, and by offering staking services that constituted unregistered securities offerings. The SEC has previously cracked down on staking offerings by other firms, including Coinbase and Kraken.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.sec.gov/newsroom/press-releases/2024-79</breach:sourceUrl><breach:dateOfBreach>2024-06-28</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-28</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>SEC sues Consensys</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>Tweet by CertiKAlert</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_farcana-token-plunge/</link><pubDate>Sun, 23 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_farcana-token-plunge/</guid><description>The token for the Farcana blockchain shooting game plummeted in value by around 60%. First, the project team announced that one of the project wallets had been compromised. However, they later deleted that tweet, then claimed that one of their market makers had been compromised. They emphasized that …</description><content:encoded>&lt;p>The token for the Farcana blockchain shooting game plummeted in value by around 60%. First, the project team announced that one of the project wallets had been compromised. However, they later deleted that tweet, then claimed that one of their market makers had been compromised. They emphasized that their wallets had not been hacked, and that their smart contracts had not been exploited.23.8 million FAR were taken from a wallet, and the majority were sold for around $164,000 in USDT. The exploiter still holds 3.4 million FAR, which are notionally worth $83,250 but not likely to be sellable for that amount.Farcana raised $10 million in seed funding in November 2023 from investors including Animoca and Polygon Ventures.&lt;/p>
&lt;p>Total loss estimated at $164,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CertiKAlert/status/1805171670132347168</breach:sourceUrl><breach:dateOfBreach>2024-06-23</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-23</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract vulnerability exploit</breach:initialAttackVector><breach:vendorProduct>Farcana token plunge</breach:vendorProduct><breach:blockchain>polygon</breach:blockchain><breach:financialLossUsd>164000</breach:financialLossUsd></item><item><title>Tweet thread by Scam Sniffer</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_0xfb94d-theft/</link><pubDate>Sun, 23 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_0xfb94d-theft/</guid><description>A victim lost $11 million in Aave Ethereum (aEthMK) and Pendle USDe tokens after signing several permit phishing signatures. Permit phishing is a technique in which scammers convince a victim to sign a transaction that grants broad permissions, allowing the scammer to then drain assets from the …</description><content:encoded>&lt;p>A victim lost $11 million in Aave Ethereum (aEthMK) and Pendle USDe tokens after signing several permit phishing signatures. Permit phishing is a technique in which scammers convince a victim to sign a transaction that grants broad permissions, allowing the scammer to then drain assets from the wallets.&lt;/p>
&lt;p>Total loss estimated at $11,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/realScamSniffer/status/1804708942981091516</breach:sourceUrl><breach:dateOfBreach>2024-06-23</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-23</breach:dateOfDisclosure><breach:initialAttackVector>Phishing attack</breach:initialAttackVector><breach:vendorProduct>0xfb94d theft</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>11000000</breach:financialLossUsd></item><item><title>Instagram post by 50 Cent</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_50-cent-account-compromise/</link><pubDate>Sat, 22 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_50-cent-account-compromise/</guid><description>50 Cent has claimed his Twitter account and website were hacked to promote a memecoin called $GUNIT. "I have no association with this crypto," the rapper wrote on Instagram.50 Cent also claimed in the post that "Who ever did this made $300,000,000 in 30 minutes." It's not clear where 50 Cent got …</description><content:encoded><![CDATA[<p>50 Cent has claimed his Twitter account and website were hacked to promote a memecoin called $GUNIT. &ldquo;I have no association with this crypto,&rdquo; the rapper wrote on Instagram.50 Cent also claimed in the post that &ldquo;Who ever did this made $300,000,000 in 30 minutes.&rdquo; It&rsquo;s not clear where 50 Cent got this number, because the token has only done $19.8 million in volume. One wallet made around $722,000 off the token, and three others also made over $100,000.</p>
<p>Total loss estimated at $1,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.instagram.com/p/C8fW3MrO46P/</breach:sourceUrl><breach:dateOfBreach>2024-06-22</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-22</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>50 Cent account compromise</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>1000000</breach:financialLossUsd></item><item><title>Telegram message</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_sportsbet-io-hack/</link><pubDate>Sat, 22 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_sportsbet-io-hack/</guid><description>It appears that the online crypto sports betting platform Sportsbet.io suffered a theft of around $3.5 million in USDT and Tron's TRX tokens. The theft was observed by crypto sleuth zachxbt, who noted that the theft seems to have been perpetrated by the same attacker who stole at least $55 million …</description><content:encoded><![CDATA[<p>It appears that the online crypto sports betting platform Sportsbet.io suffered a theft of around $3.5 million in USDT and Tron&rsquo;s TRX tokens. The theft was observed by crypto sleuth zachxbt, who noted that the theft seems to have been perpetrated by the same attacker who stole at least $55 million from the BtcTurk cryptocurrency exchange only hours earlier.SportsBet has not yet disclosed any theft.</p>
<p>Total loss estimated at $3,500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://t.me/investigations/136</breach:sourceUrl><breach:dateOfBreach>2024-06-22</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-22</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Sportsbet.io</breach:vendorProduct><breach:blockchain>tron</breach:blockchain><breach:financialLossUsd>3500000</breach:financialLossUsd></item><item><title>Twitter thread by CertiK</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_certik-and-kraken-bug-dispute/</link><pubDate>Wed, 19 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_certik-and-kraken-bug-dispute/</guid><description>Prominent blockchain security firm CertiK has accused American cryptocurrency exchange Kraken of threatening them after they reported a bug. According to CertiK, they discovered a bug in the exchange software, which they tested with multiple transactions over several days. Some of these were large …</description><content:encoded><![CDATA[<p>Prominent blockchain security firm CertiK has accused American cryptocurrency exchange Kraken of threatening them after they reported a bug. According to CertiK, they discovered a bug in the exchange software, which they tested with multiple transactions over several days. Some of these were large transactions, which CertiK said they performed to test whether Kraken had alerting in place to detect higher-value transfers. When they reported the vulnerability to the exchange, they say the exchange patched the bug, but then threatened CertiK employees and demanded they repay a &ldquo;mismatched&rdquo; amount of crypto allegedly taken during the testing period.However, others have noted that the number of transactions and amount of cryptocurrency taken by CertiK while &ldquo;investigating&rdquo; the bug seems to far exceed the norm for whitehat security researchers, and that they took cryptocurrency amounting to millions of dollars — making their &ldquo;testing&rdquo; look a lot more like a blackhat theft. Furthermore, CertiK made several transfers to Tornado Cash as part of their &ldquo;testing&rdquo; — an entity that is sanctioned by the United States.Kraken alleged that CertiK did not disclose the full extent of their employees&rsquo; transactions, and refused to return the $3 million they had taken. They also alleged that CertiK had attempted to extort them. Kraken said they had been in contact with law enforcement, and were &ldquo;treating this as a criminal case&rdquo;.Ultimately, CertiK returned the funds. However, it&rsquo;s not clear if criminal action may be ongoing.</p>
<p>Total loss estimated at $3,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/CertiK/status/1803450205389402215</breach:sourceUrl><breach:dateOfBreach>2024-06-19</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-19</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>CertiK and Kraken bug dispute</breach:vendorProduct><breach:blockchain>polygon</breach:blockchain><breach:financialLossUsd>3000000</breach:financialLossUsd></item><item><title>"Pharma Bro's Trump Card"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_martin-shkreli-claims-to-have-been-behind-a-donald-trump-memecoin/</link><pubDate>Tue, 18 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_martin-shkreli-claims-to-have-been-behind-a-donald-trump-memecoin/</guid><description>After Arkham Intelligence announced a $150,000 bounty for anyone who could prove the identity of the person behind a Donald Trump memecoin called $DJT, blockchain sleuth zachxbt quickly rose to the occasion. He submitted evidence that Martin Shkreli, the "pharma bro" who spent years in federal …</description><content:encoded><![CDATA[After Arkham Intelligence announced a $150,000 bounty for anyone who could prove the identity of the person behind a Donald Trump memecoin called $DJT, blockchain sleuth zachxbt quickly rose to the occasion. He submitted evidence that Martin Shkreli, the &ldquo;pharma bro&rdquo; who spent years in federal prison for financial fraud and who was previously known for hiking the price of an anti-malaria drug 56×, was behind the token. This wouldn&rsquo;t have been Shkreli&rsquo;s first foray into the blockchain world, after he launched a &ldquo;web3 drug discovery platform&rdquo;, and then later dubiously claimed to have been hacked for over $450,000 after his computer was infected by a trojan after he torrented a porn video.Shkreli attempted to frontrun the news in a Twitter space, and came out with his own claims that he had collaborated with Barron Trump to create the token, and with Andrew Tate to pump its price. However, fellow felon and memecoin pumper Roger Stone subsequently crawled out of the woodwork to claim that neither Barron nor Donald Trump was involved with $DJT.Shkreli has yet to provide solid proof that he created the memecoin, though zachxbt&rsquo;s research tends to be very strong. If true, Shkreli faces potential legal repercussions, as he is still on parole after his release in 2022. The terms of his parole require him to &ldquo;refrain from engaging in self-employment which involves access to client&rsquo;s assets, investments, or money, or solicitation of assets, investments, or money&rdquo;, and to make financial disclosures to the courts. Shkreli was also banned from the securities industry in 2018, as part of a settlement with the SEC.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://rekt.news/pharma-bro/</breach:sourceUrl><breach:dateOfBreach>2024-06-18</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-18</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>Martin Shkreli claims to have been behind a Donald Trump memecoin</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"HLG Down Over 60% as Exploiter Mints 1 Billion New Tokens"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_holograph-hack/</link><pubDate>Thu, 13 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_holograph-hack/</guid><description>The Holograph tokenization project was exploited on June 13 after they took advantage of a flaw in a smart contract that allowed them to mint 1 billion HLG tokens. Notionally worth $14.4 million at the time the tokens were minted, relatively low liquidity meant that the introduction of a billion …</description><content:encoded><![CDATA[<p>The Holograph tokenization project was exploited on June 13 after they took advantage of a flaw in a smart contract that allowed them to mint 1 billion HLG tokens. Notionally worth $14.4 million at the time the tokens were minted, relatively low liquidity meant that the introduction of a billion additional tokens crashed the token price by 80%. The attacker ultimately was able to cash out around 348 ETH (~$1.2 million).One of the addresses involved in the exploit appears to have contributed to the Holograph protocol, though it&rsquo;s not clear if they took advantage of insider knowledge to pull off the heist.</p>
<p>Total loss estimated at $1,200,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/tech/2024/06/13/hlg-down-over-60-as-exploiter-mints-1-billion-new-tokens/</breach:sourceUrl><breach:dateOfBreach>2024-06-13</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-13</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Holograph</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1200000</breach:financialLossUsd></item><item><title>Tweet by Cyvers</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_uwu-lend-hack-2/</link><pubDate>Thu, 13 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_uwu-lend-hack-2/</guid><description>After suffering a $20 million loss in a June 10 hack, the UwU Lend defi lending protocol has now seen another $3.7 million in suspicious outflows only days later. Although UwU Lend paused the protocol after the attack, they re-enabled it on June 12, claiming to have identified and resolved the …</description><content:encoded><![CDATA[<p>After suffering a $20 million loss in a June 10 hack, the UwU Lend defi lending protocol has now seen another $3.7 million in suspicious outflows only days later. Although UwU Lend paused the protocol after the attack, they re-enabled it on June 12, claiming to have identified and resolved the vulnerability. This apparently wasn&rsquo;t the case, given the same attacker quickly repeated their exploit.UwU Lend was created by Michael Patryn, aka Omar Dhanani, aka &ldquo;0xSifu&rdquo;, who has been behind several cryptocurrency projects that have suffered major exploits. This is not exactly helping concerns among some observers that perhaps Sifu is the common denominator in these suspicious losses.</p>
<p>Total loss estimated at $3,700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/CyversAlerts/status/1801160124033093748</breach:sourceUrl><breach:dateOfBreach>2024-06-13</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-13</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>UwU Lend</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>3700000</breach:financialLossUsd></item><item><title>"Do Kwon's Crypto Firm Agrees to Pay $4.5 Billion Penalty to SEC"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_terraform-labs-settlement/</link><pubDate>Wed, 12 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_terraform-labs-settlement/</guid><description>Terraform Labs and its former CEO Do Kwon have agreed to settle the SEC's civil action against them with a $4.5 billion payment of disgorgement, interest, and penalties. Kwon and the company were behind the collapsed Terra/Luna stablecoin project, which imploded in May 2022. It was among the first …</description><content:encoded>Terraform Labs and its former CEO Do Kwon have agreed to settle the SEC&amp;rsquo;s civil action against them with a $4.5 billion payment of disgorgement, interest, and penalties. Kwon and the company were behind the collapsed Terra/Luna stablecoin project, which imploded in May 2022. It was among the first dominoes in what ended up being an industry-wide collapse.If the settlement is approved by the judge, Kwon will personally be responsible for around $200 million of the settlement payment, with Terraform Labs shouldering the rest. Although the settlement is among the largest the SEC has received in a securities fraud lawsuit, it&amp;rsquo;s unlikely the company will ever pay anything close to the total amount, as it is in bankruptcy and claims to have only around $150 million in assets remaining. Both the company and Kwon will be banned from trading crypto asset securities.The substantial fine is among the lesser of Kwon&amp;rsquo;s worries at the moment, as he is still in jail in Montenegro pending extradition to either South Korea or the United States to face serious criminal charges for his role in the fraud.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.wsj.com/finance/regulation/do-kwons-crypto-firm-agrees-to-pay-massive-4-5-billion-penalty-to-sec-35355452</breach:sourceUrl><breach:dateOfBreach>2024-06-12</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-12</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>Terraform Labs settlement</breach:vendorProduct><breach:blockchain>terra</breach:blockchain></item><item><title>Tweet by UwU Lend</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_uwu-lend-hack-1/</link><pubDate>Mon, 10 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_uwu-lend-hack-1/</guid><description>The defi lending protocol UwU Lend was hacked for around $20 million. After various blockchain security firms observed suspicious outflows of funds, the protocol acknowledged there had been a "situation" on their Twitter account, and wrote that they had paused the protocol while they were …</description><content:encoded><![CDATA[<p>The defi lending protocol UwU Lend was hacked for around $20 million. After various blockchain security firms observed suspicious outflows of funds, the protocol acknowledged there had been a &ldquo;situation&rdquo; on their Twitter account, and wrote that they had paused the protocol while they were investigating.UwU Lend was founded by Michael Patryn, aka Omar Dhanani, aka &ldquo;0xSifu&rdquo; — a co-founder of the ill-fated QuadrigaCX exchange and ex-con. He also pseudonymously ran the defi cryptocurrency project Wonderland until his identity was revealed after the protocol suffered a meltdown.</p>
<p>Total loss estimated at $20,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/UwU_Lend/status/1800159455767843009</breach:sourceUrl><breach:dateOfBreach>2024-06-10</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-10</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>UwU Lend</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>20000000</breach:financialLossUsd></item><item><title>"Loopring suffers $5 million hack after 'Guardian' two-factor authentication service is compromised"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_loopring-wallet-hack/</link><pubDate>Sun, 09 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_loopring-wallet-hack/</guid><description>Although Loopring markets its wallet application as "Ethereum's most secure wallet", that's evidently a pretty low bar. They disclosed that they had suffered a breach in their wallet recovery service, which allows individuals to designate trusted entities to recover assets or freeze compromised …</description><content:encoded><![CDATA[<p>Although Loopring markets its wallet application as &ldquo;Ethereum&rsquo;s most secure wallet&rdquo;, that&rsquo;s evidently a pretty low bar. They disclosed that they had suffered a breach in their wallet recovery service, which allows individuals to designate trusted entities to recover assets or freeze compromised accounts. An attacker was able to &ldquo;recover&rdquo; assets from wallets that had only designated a single Loopring guardian, pilfering at least $5 million.Loopring announced that they had suspended their account recovery operations, and were working with law enforcement to trace the attackers.</p>
<p>Total loss estimated at $5,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://theblock.co/post/299177/loopring-suffers-5-million-hack-after-guardian-two-factor-authentication-service-is-compromised</breach:sourceUrl><breach:dateOfBreach>2024-06-09</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-09</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Loopring wallet</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>5000000</breach:financialLossUsd></item><item><title>Tweet by br1an.eth</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_br1an-eth-private-key-compromise/</link><pubDate>Wed, 05 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_br1an-eth-private-key-compromise/</guid><description>A blockchain developer posted on Twitter that he had lost almost $50,000 after his cryptocurrency wallet was drained. He explained that he had been working on a software project on Github in a private repository that contained his wallet's private key. In order to apply for a funding grant from the …</description><content:encoded><![CDATA[<p>A blockchain developer posted on Twitter that he had lost almost $50,000 after his cryptocurrency wallet was drained. He explained that he had been working on a software project on Github in a private repository that contained his wallet&rsquo;s private key. In order to apply for a funding grant from the Optimism project, he had to make the repository public. However, he forgot that the secret key was in the repository.Generally, it is very bad practice to store sensitive secrets in Github, even when projects are set to private.&ldquo;Got drained of everything,&rdquo; he wrote on Twitter. A commenter asked how long it took for the attacker to steal the money after the private key became publicly visible. &ldquo;2 min&rdquo;, he replied.</p>
<p>Total loss estimated at $48,630.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/bdguan/status/1798414648884052147</breach:sourceUrl><breach:dateOfBreach>2024-06-05</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-05</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>br1an.eth private key compromise</breach:vendorProduct><breach:blockchain>cosmos</breach:blockchain><breach:financialLossUsd>48630</breach:financialLossUsd></item><item><title>"Velocore Incident Post-Mortem"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-06_velocore-hack/</link><pubDate>Sun, 02 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-06_velocore-hack/</guid><description>The Velocore DEX, built on the Linea Ethereum layer-2 blockchain, was exploited for around $6.8 million in ETH. The hacker was able to take advantage of a bug in the project's smart contract in the logic to calculate swap fees. Using a flash loan attack funded through Tornado Cash, the attacker …</description><content:encoded><![CDATA[<p>The Velocore DEX, built on the Linea Ethereum layer-2 blockchain, was exploited for around $6.8 million in ETH. The hacker was able to take advantage of a bug in the project&rsquo;s smart contract in the logic to calculate swap fees. Using a flash loan attack funded through Tornado Cash, the attacker drained most of the tokens from the pool, bridged the tokens back to the Ethereum mainnet, and then tumbled the stolen funds back through Tornado.In an unusual move, the operators of the Linea layer-2 blockchain chose to unilaterally halt the chain in order to stop the outflow of stolen assets. Because Linea — like many layer-2 chains — is highly centralized, it was possible for the Linea team to unilaterally stop the production of blocks.This was very controversial, as a single operator being able to unilaterally control the operation of a blockchain goes against much of the cryptocurrency ethos. Following their action, they tried to explain that &ldquo;Linea&rsquo;s goal is to decentralize our network - including the sequencer. When our network matures to a decentralized, censorship-resistant environment, Linea&rsquo;s team will no longer have the ability to halt block production and censor addresses - this is a primary goal of our network&rdquo;.</p>
<p>Total loss estimated at $6,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://velocorexyz.medium.com/velocore-incident-post-mortem-6197020ec3e9</breach:sourceUrl><breach:dateOfBreach>2024-06-02</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-02</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Velocore</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>6800000</breach:financialLossUsd></item><item><title>"Japan's DMM Bitcoin says over $300 mln of cryptocurrency lost"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_dmm-bitcoin-loss/</link><pubDate>Fri, 31 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_dmm-bitcoin-loss/</guid><description>A Japanese cryptocurrency exchange called DMM Bitcoin has announced that they suffered an "unauthorized leak" of 4,502.9 bitcoin (~$308 million) from a company wallet. They've provided very little in additional details around how the loss occurred, or who may have been involved. They have taken some …</description><content:encoded><![CDATA[<p>A Japanese cryptocurrency exchange called DMM Bitcoin has announced that they suffered an &ldquo;unauthorized leak&rdquo; of 4,502.9 bitcoin (~$308 million) from a company wallet. They&rsquo;ve provided very little in additional details around how the loss occurred, or who may have been involved. They have taken some of their services offline as they investigate the incident.The company claims it will replace the lost funds with help from other companies in their group.This is one of the largest cryptocurrency thefts in recent history, rivaling the roughly $320 million theft from the Wormhole bridge in February 2022 and the $477 million theft from FTX in November 2022.The DMM hack was later attributed to a North Korean state-sponsored cybercrime group.</p>
<p>Total loss estimated at $308,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.reuters.com/technology/dmm-bitcoin-says-bitcoin-worth-about-482-bln-yen-leaked-2024-05-31/</breach:sourceUrl><breach:dateOfBreach>2024-05-31</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-31</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>DMM Bitcoin loss</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain><breach:financialLossUsd>308000000</breach:financialLossUsd></item><item><title>Tweet thread by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_cat-memecoin-team-hacks-gcr/</link><pubDate>Mon, 27 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_cat-memecoin-team-hacks-gcr/</guid><description>According to crypto sleuth zachxbt, the team behind the Solana-based $CAT memecoin hacked the Twitter account of "Gigantic-Cassocked-Rebirth" (@GCRClassic) crypto influencer.First, the team sniped their own $CAT token launch to obtain 63% of the token supply, ultimately selling a portion of it for …</description><content:encoded><![CDATA[<p>According to crypto sleuth zachxbt, the team behind the Solana-based $CAT memecoin hacked the Twitter account of &ldquo;Gigantic-Cassocked-Rebirth&rdquo; (@GCRClassic) crypto influencer.First, the team sniped their own $CAT token launch to obtain 63% of the token supply, ultimately selling a portion of it for around $5 million. Then, they took out $2.3 million and $1 million long positions on the ORDI and ETHFI tokens, respectively. Finally, they posted from the compromised influencer account to shill the ORDI and ETHFI tokens to his massive following. Ultimately, their gambit doesn&rsquo;t appear to have been incredibly successful: they made around $34,000 on the ORDI position, but lost $3,500 on the ETHFI position. However, as zachxbt noted, it&rsquo;s possible they also opened positions on centralized exchanges where the outcomes aren&rsquo;t publicly visible.</p>
<p>Total loss estimated at $30,500.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://x.com/zachxbt/status/1795082820177498349</breach:sourceUrl><breach:dateOfBreach>2024-05-27</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-27</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>CAT memecoin team</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>30500</breach:financialLossUsd></item><item><title>"Caitlyn Jenner Meme Coin Sows Confusion as Observers Question Its Provenance"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_caitlyn-jenner-memecoin/</link><pubDate>Sun, 26 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_caitlyn-jenner-memecoin/</guid><description>Olympic athlete-turned-Trumpworld media personality Caitlyn Jenner has confused many by apparently launching a memecoin on pump.fun and heavily promoting it on her Twitter account with more than 3 million followers. Her original post featured a photo of her grasping hands with Donald Trump, with the …</description><content:encoded><![CDATA[Olympic athlete-turned-Trumpworld media personality Caitlyn Jenner has confused many by apparently launching a memecoin on pump.fun and heavily promoting it on her Twitter account with more than 3 million followers. Her original post featured a photo of her grasping hands with Donald Trump, with the text &ldquo;make america great again!!! 🇺🇸 and we love crypto!&quot;.At first, people widely believed her account had been hacked, given how frequently celebrity token promotions turn out to be compromised Twitter accounts. Then, she began joining Twitter spaces and posting videos about the token, but with the emergence of more and more convincing deepfakes, even those didn&rsquo;t convince people that it was truly Jenner behind the token.Despite the confusion — or perhaps because of it — the token has been popular.The token launch was linked to Sahil Arora, a person allegedly connected to multiple celebrity rug pulls and pump-and-dumps. However, Jenner quickly turned on Arora shortly after the token&rsquo;s launch, posting on Twitter &ldquo;FUCK SAHIL! He scammed us! BIG TIME!&rdquo; and that &ldquo;Sahil appears to be fully out&rdquo;.Jenner is not the first in her family to get mixed up with crypto. In October 2023, her stepdaughter Kim Kardashian was fined over $1 million for unlawful touting of a crypto security.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://coindesk.com/markets/2024/05/27/caitlyn-jenner-meme-coin-sows-confusion-as-observers-question-its-provenance/</breach:sourceUrl><breach:dateOfBreach>2024-05-26</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-26</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Caitlyn Jenner memecoin</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"Normie Incident Analysis"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_normie-exploit/</link><pubDate>Sun, 26 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_normie-exploit/</guid><description>An attacker perpetrated a flash loan attack on the "Normie" memecoin on the Base layer-2 blockchain to drain millions of NORMIE tokens. The vulnerability was evidently discovered in March, but never patched.Although the token claimed to have a market cap of $42 million, the attacker was only able to …</description><content:encoded><![CDATA[<p>An attacker perpetrated a flash loan attack on the &ldquo;Normie&rdquo; memecoin on the Base layer-2 blockchain to drain millions of NORMIE tokens. The vulnerability was evidently discovered in March, but never patched.Although the token claimed to have a market cap of $42 million, the attacker was only able to cash out around 224 wETH (~$882,000). However, the losses to some holders of the token were much more substantial. One individual had put around $1.16 million into $NORMIE, and those holdings are now priced at around $150.The attacker has been negotiating the possible return of funds to the project team, who has expressed interest in relaunching the token.</p>
<p>Total loss estimated at $882,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.certik.com/resources/blog/normie-incident-analysis</breach:sourceUrl><breach:dateOfBreach>2024-05-26</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-26</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>NORMIE</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>882000</breach:financialLossUsd></item><item><title>Thief wallet</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_gala-games-hack/</link><pubDate>Mon, 20 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_gala-games-hack/</guid><description>Someone was able to mint 5 billion $GALA tokens, the native token of the Gala Games blockchain gaming project. The tokens would be notionally worth around $200 million based on their paper value, although such a massive amount wouldn't be sellable without impacting the token price. Furthermore, the …</description><content:encoded><![CDATA[<p>Someone was able to mint 5 billion $GALA tokens, the native token of the Gala Games blockchain gaming project. The tokens would be notionally worth around $200 million based on their paper value, although such a massive amount wouldn&rsquo;t be sellable without impacting the token price. Furthermore, the Gala Games team was able to add the attacker&rsquo;s address to a blocklist shortly after the theft a few hours after the attack began, preventing them from swapping more of the tokens.Altogether, the attacker was able to swap around $21 million of the GALA tokens into ETH before the address was frozen.The attacker was able to perform the exploit because they had access to a wallet with admin access to the Gala Games smart contract. It&rsquo;s not clear if the attacker is a rogue employee, or if an admin wallet was compromised.As of writing, Gala Games has not publicly acknowledged the attack.</p>
<p>Total loss estimated at $21,451,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://etherscan.io/address/0xe2Ca471124b124831e231fb835778840Ad100F97</breach:sourceUrl><breach:dateOfBreach>2024-05-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-20</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Gala Games</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>21451000</breach:financialLossUsd></item><item><title>"Pump.fun Attacker Says He Wanted to 'Kill' Solana Meme Coin Launcher"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_pump-fun-exploit/</link><pubDate>Thu, 16 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_pump-fun-exploit/</guid><description>Pump.fun is a Solana-based memecoin generator that soared to popularity recently amid a resurgence in memecoin trading. On May 16, the project suffered a $2 million exploit by an attacker who then began airdropping the money to somewhat random wallets.A former employee — whose real identity is known …</description><content:encoded><![CDATA[Pump.fun is a Solana-based memecoin generator that soared to popularity recently amid a resurgence in memecoin trading. On May 16, the project suffered a $2 million exploit by an attacker who then began airdropping the money to somewhat random wallets.A former employee — whose real identity is known — brazenly took credit for the theft on Twitter. They wrote: &ldquo;everybody be cool, this is a r o b b e r y. &hellip; I&rsquo;m about to change the course of history. n then rot in jail. am I sane? nah. am I well? v much not. do I want for anything? my mom raised from the dead n barring that: life without parole.&ldquo;In a Twitter Spaces chat, the attacker stated that he had worked for the company briefly, and that he had grievances against its management. &ldquo;I just kind of wanted to kill Pump.fun because it&rsquo;s something to do&hellip; It&rsquo;s inadvertently hurt people for a long time,&rdquo; he said.Pump.fun paused trading shortly after the attack, and stated that they were &ldquo;cooperating with relevant parties, including law enforcement, to minimize the damage.&rdquo; The attacker responded to the post: &ldquo;Neener neener neener&rdquo;.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/231099/pump-fun-attacker-wanted-kill-solana-meme-coin-launcher</breach:sourceUrl><breach:dateOfBreach>2024-05-16</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-16</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Pump.fun</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"Two Brothers Arrested for Attacking Ethereum Blockchain and Stealing $25M in Cryptocurrency"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_peraire-bueno-mev-indictment/</link><pubDate>Wed, 15 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_peraire-bueno-mev-indictment/</guid><description>Two brothers, Anton and James Peraire-Bueno, were indicted for a theft involving MEV — maximal extractable value. MEV involves previewing upcoming transactions on a blockchain and taking actions to extract additional profits — which can sometimes be substantial — based on that information.According …</description><content:encoded><![CDATA[<p>Two brothers, Anton and James Peraire-Bueno, were indicted for a theft involving MEV — maximal extractable value. MEV involves previewing upcoming transactions on a blockchain and taking actions to extract additional profits — which can sometimes be substantial — based on that information.According to the Justice Department, the Peraire-Buenos exploited a flaw in popular MEV software called &ldquo;MEV-boost&rdquo;, which is used by most Ethereum validators. By creating their own validators and &ldquo;bait transactions&rdquo;, they were able to trick MEV bots into proposing transactions involving illiquid cryptocurrencies, which the brothers then frontran. They were able to create false signatures that tricked a MEV-boost relay into releasing information about upcoming blocks that they were able to tamper with.The brothers were charged with conspiracy to commit wire fraud, wire fraud, and conspiracy to commit money laundering, and face up to 20 years in prison for each charge.The Justice Department is describing the case as a &ldquo;first-of-its-kind manipulation of the Ethereum blockchain&rdquo;. The case is an interesting one, as some believe the practice of MEV itself exploits Ethereum users. Others believe anything you can do with code should be allowed — &ldquo;code is law&rdquo;. However, by signing false transactions and tricking the relay into releasing private information, the brothers&rsquo; actions do seem to go beyond simply making profits in a &ldquo;code is law&rdquo; Wild West, and into the realm of actual fraud.</p>
<p>Total loss estimated at $25,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.justice.gov/opa/pr/two-brothers-arrested-attacking-ethereum-blockchain-and-stealing-25m-cryptocurrency</breach:sourceUrl><breach:dateOfBreach>2024-05-15</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-15</breach:dateOfDisclosure><breach:initialAttackVector>MEV / sandwich attack</breach:initialAttackVector><breach:vendorProduct>Peraire-Bueno MEV indictment</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>25000000</breach:financialLossUsd></item><item><title>"Alex Bridge Incident Anlaysis"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_alex-xlink-bridge-theft/</link><pubDate>Tue, 14 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_alex-xlink-bridge-theft/</guid><description>An attacker tried to pull off what could have been a ~$12 million heist from ALEX Lab's XLink bridge after a private key was compromised. However, the sloppy work by the attacker enabled an apparent whitehat hacker to step in.The attacker was successfully able to transfer around 13.8 million STX …</description><content:encoded><![CDATA[<p>An attacker tried to pull off what could have been a <del>$12 million heist from ALEX Lab&rsquo;s XLink bridge after a private key was compromised. However, the sloppy work by the attacker enabled an apparent whitehat hacker to step in.The attacker was successfully able to transfer around 13.8 million STX (</del>$2 million) on the Stack BTC layer-2 chain. However, their attempts to steal assets notionally worth around $4.3 million from the project&rsquo;s BNB Chain implementation failed when they upgraded the project contract to a malicious version, but failed to prevent other people from calling the withdraw function. The attacker&rsquo;s first transactions to withdraw the funds themself failed, and an apparent whitehat hacker was able to step in and complete the withdrawal ahead of the exploiter. They later negotiated a deal for the funds&rsquo; return, after offering a 10% &ldquo;bounty&rdquo;.The exploiter had also tried, and failed, to steal assets notionally worth around $5 million on the Ethereum blockchain, but failed to do so. ALEX Lab later announced they were able to recover or secure around $4.5 million of those assets. ALEX also later announced that they believed the attackers were part of the North Korean Lazarus Group.</p>
<p>Total loss estimated at $6,300,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.certik.com/resources/blog/alex</breach:sourceUrl><breach:dateOfBreach>2024-05-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-14</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>ALEX XLink bridge theft</breach:vendorProduct><breach:blockchain>bitcoin, bsc, ethereum</breach:blockchain><breach:financialLossUsd>6300000</breach:financialLossUsd></item><item><title>Tweet by CyversAlert</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_sonne-finance-hack/</link><pubDate>Tue, 14 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_sonne-finance-hack/</guid><description>The Sonne Finance lending protocol was exploited for at least $20 million as an attacker was able to exploit a vulnerability in some of their smart contracts. Sonne is a fork of the Compound Finance project, which has known vulnerabilities that are sometimes not properly addressed by people who …</description><content:encoded>&lt;p>The Sonne Finance lending protocol was exploited for at least $20 million as an attacker was able to exploit a vulnerability in some of their smart contracts. Sonne is a fork of the Compound Finance project, which has known vulnerabilities that are sometimes not properly addressed by people who reuse the code — as has happened with Radiant Capital and Rari.After being alerted to the theft by several security companies, Sonne announced they had paused the contract on the Optimism Ethereum layer-2 chain.&lt;/p>
&lt;p>Total loss estimated at $20,000,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/CyversAlerts/status/1790515178515136789</breach:sourceUrl><breach:dateOfBreach>2024-05-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-14</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Sonne Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>20000000</breach:financialLossUsd></item><item><title>"Public statement"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_cypher-contributor-theft/</link><pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_cypher-contributor-theft/</guid><description>After the founder of the Solana-based Cypher futures trading protocol publicly accused a core contributor of stealing funds, the contributor — publicly known only as "hoak" — has confessed to the thefts.Cypher was hacked for $1 million in August 2023, but was able to recover around $600,000 of the …</description><content:encoded><![CDATA[<p>After the founder of the Solana-based Cypher futures trading protocol publicly accused a core contributor of stealing funds, the contributor — publicly known only as &ldquo;hoak&rdquo; — has confessed to the thefts.Cypher was hacked for $1 million in August 2023, but was able to recover around $600,000 of the stolen funds, which they promised to distribute to impact users via a redemption fund. However, over a period of months and unbeknownst to the rest of the team, hoak had been dipping into the recovered funds — taking around half of what was in the fund for himself.After he was accused, hoak fessed up in a public statement where he wrote that his actions were a &ldquo;culmination of what snowballed into a crippling gambling addiction and probably multiple other psychological factors that went by unchecked for too long.&rdquo; He continued: &ldquo;I know likely nothing I say or do will make things better - perhaps other than rotting in jail. To address the elephant in the room, the allegations are true, I took the funds and gambled them away. I didn’t run away with it, nor did anyone else.&rdquo;</p>
<p>Total loss estimated at $316,294.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://docs.google.com/document/d/10ta9quGGrmTNE1Pi7MlgLgSx9zxEqQdkbBfis1pmHrM/edit</breach:sourceUrl><breach:dateOfBreach>2024-05-13</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-13</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Cypher contributor theft</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>316294</breach:financialLossUsd></item><item><title>Tweet by Cyvers Alerts</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_gnus-ai-exploi/</link><pubDate>Sun, 05 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_gnus-ai-exploi/</guid><description>An exploiter was able to create a fake version of the $GNUS token on the Fantom blockchain, then bridge the tokens to Ethereum and Polygon where they were then sold as though they were authentic. They were able to drain $1.27 million from the project's liquidity pools.GNUS.ai (short for "Genius", …</description><content:encoded><![CDATA[<p>An exploiter was able to create a fake version of the $GNUS token on the Fantom blockchain, then bridge the tokens to Ethereum and Polygon where they were then sold as though they were authentic. They were able to drain $1.27 million from the project&rsquo;s liquidity pools.GNUS.ai (short for &ldquo;Genius&rdquo;, not a reference to the animal) is one of many AI-related blockchain projects that has sprung out of the recent AI hype. This particular one promises to allow people to &ldquo;utiliz[e] unused cycles&rdquo; on various computing devices for computation-intensive AI systems, using cryptocurrency for payments.</p>
<p>Total loss estimated at $1,270,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/CyversAlerts/status/1787407808024940865</breach:sourceUrl><breach:dateOfBreach>2024-05-05</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-05</breach:dateOfDisclosure><breach:initialAttackVector>AI-assisted attack or AI-generated exploit</breach:initialAttackVector><breach:vendorProduct>GNUS.ai exploi</breach:vendorProduct><breach:blockchain>ethereum, fantom, polygon</breach:blockchain><breach:financialLossUsd>1270000</breach:financialLossUsd></item><item><title>Tweet by Cyvers Alerts</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-05_0x1e227-address-poisoning/</link><pubDate>Fri, 03 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-05_0x1e227-address-poisoning/</guid><description>An Ethereum wallet was apparently drained of 1,155 wrapped bitcoin (~$72.7 million) when they transferred it to a malicious address that had been operating an address poisoning scheme.Address poisoning is a scam tactic that takes advantage of crypto traders' tendencies to copy and paste wallet …</description><content:encoded><![CDATA[<p>An Ethereum wallet was apparently drained of 1,155 wrapped bitcoin (~$72.7 million) when they transferred it to a malicious address that had been operating an address poisoning scheme.Address poisoning is a scam tactic that takes advantage of crypto traders&rsquo; tendencies to copy and paste wallet addresses from their transaction histories, since the addresses are long strings of characters that are not practical to type from memory. By creating a new wallet address with identical start and/or ending character strings to addresses used by the victim, and spamming the victim with transactions from that similar address, scammers are sometimes able to get victims to erroneously copy the spoofed address for future transfers.That&rsquo;s what appears to have happened in this case, when a victim transferred 1,155 wrapped bitcoin — tokens pegged to the bitcoin price meant for use on the Ethereum blockchain — to the malicious address.The victim and the exploiter later reached an agreement for the return of most of the funds, with the exploiter keeping $7.2 million as a &ldquo;bounty&rdquo;.</p>
<p>Total loss estimated at $7,200,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/CyversAlerts/status/1786363410243858869</breach:sourceUrl><breach:dateOfBreach>2024-05-03</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-03</breach:dateOfDisclosure><breach:initialAttackVector>Address poisoning attack</breach:initialAttackVector><breach:vendorProduct>0x1E227 address poisoning</breach:vendorProduct><breach:blockchain>bitcoin, ethereum</breach:blockchain><breach:financialLossUsd>7200000</breach:financialLossUsd><breach:financialRecoveredUsd>65500000</breach:financialRecoveredUsd></item><item><title>"Early Bitcoin Investor Charged with Tax Fraud"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_roger-ver-arrested-for-50-million-tax-fraud/</link><pubDate>Tue, 30 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_roger-ver-arrested-for-50-million-tax-fraud/</guid><description>Roger Ver, an early bitcoin investor who later became an outspoken evangelist for the fork Bitcoin Cash, has been arrested on tax fraud charges. According to the Department of Justice, Ver evaded almost $50 million in owed taxes by concealing income and lying to tax preparers about his bitcoin …</description><content:encoded>Roger Ver, an early bitcoin investor who later became an outspoken evangelist for the fork Bitcoin Cash, has been arrested on tax fraud charges. According to the Department of Justice, Ver evaded almost $50 million in owed taxes by concealing income and lying to tax preparers about his bitcoin assets as he attempted to renounce his US citizenship and become a citizen of the tax haven St. Kitts and Nevis.Ver was arrested in Spain, and the United States will seek his extradition.Besides his tax woes, Ver has also been caught up in accusations by CoinFLEX that he owed the platform around $84 million after failing to meet a margin call. Ver has in turn claimed that CoinFLEX owed him money. CoinFLEX filed for restructuring in August 2022.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.justice.gov/opa/pr/early-bitcoin-investor-charged-tax-fraud</breach:sourceUrl><breach:dateOfBreach>2024-04-30</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-30</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>Roger Ver arrested for $50 million tax fraud</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain></item><item><title>"Post-Mortem Report: Pike USDC Withdrawal Vulnerability"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_pike-finance-hacks/</link><pubDate>Tue, 30 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_pike-finance-hacks/</guid><description>Pike Finance, a cross-chain lending protocol, was exploited twice in four days as attackers discovered vulnerabilities in the project's smart contracts.The first attack, on April 26, was enabled by a flaw in the security measures related to transfers of the USDC stablecoin. An attacker was able to …</description><content:encoded><![CDATA[<p>Pike Finance, a cross-chain lending protocol, was exploited twice in four days as attackers discovered vulnerabilities in the project&rsquo;s smart contracts.The first attack, on April 26, was enabled by a flaw in the security measures related to transfers of the USDC stablecoin. An attacker was able to change the recipient address and amount, ultimately making off with almost $300,000 in the stablecoin. Pike released a postmortem two days later, acknowledging that the bug had been identified by a third-party auditor but had not been rectified by their team.When the Pike team went to patch the smart contracts to thwart this attack, they introduced new, even worse vulnerabilities. As a result, on April 30, an attacker was able to upgrade the project&rsquo;s smart contracts to malicious ones, then withdraw $1.68 million in ETH, ARB, and OP tokens.Pike Finance has offered a 20% reward for the return of the funds or information pertaining to the attacker, and has promised &ldquo;a plan to make users whole&rdquo;. Pike, which launched in early 2024, is backed by Circle and Wormhole.</p>
<p>Total loss estimated at $2,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://mirror.xyz/pikefinance.eth/M1ToE42vwEHuE6xlz0dVRQwPT0xpaRtpIIw2arOdBAM</breach:sourceUrl><breach:dateOfBreach>2024-04-30</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-30</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Pike Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>2000000</breach:financialLossUsd></item><item><title>Telegram post by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_rain-hack/</link><pubDate>Mon, 29 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_rain-hack/</guid><description>Bahrain-based cryptocurrency exchange Rain was exploited for around $16.13 million dollars on April 29. The exchange did not publicly disclose the hack until the suspicious outflows across wallets on multiple blockchains were noticed by blockchain investigator zachxbt.After zachxbt sounded the alarm …</description><content:encoded><![CDATA[<p>Bahrain-based cryptocurrency exchange Rain was exploited for around $16.13 million dollars on April 29. The exchange did not publicly disclose the hack until the suspicious outflows across wallets on multiple blockchains were noticed by blockchain investigator zachxbt.After zachxbt sounded the alarm on May 13, Rain admitted that they had had a &ldquo;security incident&rdquo;, but stressed that customer funds were safe, and stated that the Rain Group had &ldquo;covered any potential losses resulting from this incident&rdquo;.The attack was later attributed to North Korean state-sponsored attackers.</p>
<p>Total loss estimated at $14,800,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://t.me/investigations/122</breach:sourceUrl><breach:dateOfBreach>2024-04-29</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-29</breach:dateOfDisclosure><breach:initialAttackVector>Nation-state attack (Lazarus/DPRK) — private key or social engineering compromise</breach:initialAttackVector><breach:vendorProduct>Rain</breach:vendorProduct><breach:blockchain>bitcoin, ethereum, ripple, solana</breach:blockchain><breach:financialLossUsd>14800000</breach:financialLossUsd></item><item><title>"Founders And CEO Of Cryptocurrency Mixing Service Arrested And Charged With Money Laundering And Unlicensed Money Transmitting Offenses"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_samourai-wallet-operators-charged/</link><pubDate>Wed, 24 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_samourai-wallet-operators-charged/</guid><description>Keonne Rodriguez and William Lonergan Hill, founders of the Samourai Wallet, were arrested and charged with conspiracy to commit money laundering and conspiracy to operate an unlicensed money transmitting business. The charges relate to their operation of a cryptocurrency mixer that the DOJ says …</description><content:encoded><![CDATA[Keonne Rodriguez and William Lonergan Hill, founders of the Samourai Wallet, were arrested and charged with conspiracy to commit money laundering and conspiracy to operate an unlicensed money transmitting business. The charges relate to their operation of a cryptocurrency mixer that the DOJ says helped to launder over $2 billion in unlawful transactions. $100 million of that, they say, was connected to dark web markets including Silk Road and Hydra Market. Indeed, Samourai had actively marketed its products to &ldquo;Dark/Grey Market participants&rdquo;.Rodriguez was arrested in the United States; the United States will seek extradition for Hill, who was arrested in Portugal.Samourai Wallet advertised itself as &ldquo;a bitcoin wallet made for the streets&rdquo;, which would &ldquo;keep your transactions private, your identity masked, and your funds secure&rdquo;. It touted features including &ldquo;remote self-destruct&rdquo;, and would hide itself from a phone&rsquo;s applications list. As charges were filed in the United States, the wallet&rsquo;s website began displaying a seizure notice that informed visitors of a coordinated law enforcement action by the US Attorney&rsquo;s Office in the Southern District of New York, FBI, IRS, Europol, and Portuguese and Icelandic police. The app was also removed from the Google Play Store.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.justice.gov/usao-sdny/pr/founders-and-ceo-cryptocurrency-mixing-service-arrested-and-charged-money-laundering</breach:sourceUrl><breach:dateOfBreach>2024-04-24</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-24</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>Samourai Wallet operators charged</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain></item><item><title>"ZKasino Users Plead for Refunds as $33M of Bridged Ether Sent to Lido"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_zkasino-rug-pull/</link><pubDate>Sat, 20 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_zkasino-rug-pull/</guid><description>A project promising to build a decentralized casino managed to raise $33 million, despite an anonymous team that had exhibited several instances of shady behavior throughout ZKasino's development. The project promised that everyone who bridged ETH to their layer-2 chain would be able to receive …</description><content:encoded><![CDATA[<p>A project promising to build a decentralized casino managed to raise $33 million, despite an anonymous team that had exhibited several instances of shady behavior throughout ZKasino&rsquo;s development. The project promised that everyone who bridged ETH to their layer-2 chain would be able to receive their ETH back 1:1 in thirty days.Instead, the project&rsquo;s creators transferred those more than 10,500 ETH ($33 million) to Lido, an Ethereum staking service. As for the &ldquo;return&rdquo; of funds, the project team indeed followed through with their promises to return the crypto&hellip; except instead of ETH, depositors received the project&rsquo;s native token, ZKAS, which would vest over a period of 15 months. The project announced that they had calculated the ZKAS distribution based on a discounted rate, &ldquo;as a favour to our users who have bridged to participate in the ecosystem&rdquo;. Gee, thanks!One investor in the project wrote, &ldquo;We made a mistake investing in Zkasino early. &hellip; [I]t sounds like a scam, but 95% of crypto consists of such crap. With memecoins pumping every day, people believe this could be the next one.&ldquo;It seems that ZKasino&rsquo;s creators have links to other crypto scams, including a failed &ldquo;ZigZagExchange&rdquo;, which raised around $15 million that was allegedly misallocated to work on the ZKasino project. Crypto sleuth zachxbt had also described the team as &ldquo;proven bad actors&rdquo; in December, listing multiple instances in which they had avoided making promised payments.After the rug pull, the project&rsquo;s planned IDO on Ape Terminal and AIT Launchpad were canceled, and MEXC (which had invested in the project&rsquo;s seed round) canceled the token listing.</p>
<p>Total loss estimated at $33,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.coindesk.com/business/2024/04/22/zkasino-users-plead-for-refunds-as-33m-of-bridged-ether-sent-to-lido/</breach:sourceUrl><breach:dateOfBreach>2024-04-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-20</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>ZKasino</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>33000000</breach:financialLossUsd></item><item><title>Tweet by Hedgey Finance</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_hedgey-finance-hack/</link><pubDate>Fri, 19 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_hedgey-finance-hack/</guid><description>Hedgey Finance, a platform used to manage token claims, lockups, and vesting, was hit with a flash loan attack that drained $44.7 million of customer funds from the platform.The majority of assets were stolen from Hedgey on the Arbitrum layer-2 network, although around $2.1 million of them were …</description><content:encoded><![CDATA[<p>Hedgey Finance, a platform used to manage token claims, lockups, and vesting, was hit with a flash loan attack that drained $44.7 million of customer funds from the platform.The majority of assets were stolen from Hedgey on the Arbitrum layer-2 network, although around $2.1 million of them were stolen from the version deployed on the Ethereum mainnet.Hedgey Finance confirmed the exploit, and sent an optimistic and congratulatory message on-chain: &ldquo;Well done for finding it! We&rsquo;re assuming you executed this exploit as a white hat, so we&rsquo;d like to get in touch with you to discuss next steps.&rdquo; No on-chain response thus far.</p>
<p>Total loss estimated at $44,700,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/hedgeyfinance/status/1781400318644810138</breach:sourceUrl><breach:dateOfBreach>2024-04-19</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-19</breach:dateOfDisclosure><breach:initialAttackVector>Flash loan attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Hedgey Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>44700000</breach:financialLossUsd></item><item><title>Tweet thread by CertikAlert</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_grand-base-theft/</link><pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_grand-base-theft/</guid><description>Grand Base, a real world assets platform built on the Base layer-2 blockchain, has seen $2 million exit the platform in a hack or rug pull.The team behind the project claimed that the deployer wallet had been compromised, allowing an attacker to drain the project's liquidity pool. Altogether, 615 …</description><content:encoded><![CDATA[<p>Grand Base, a real world assets platform built on the Base layer-2 blockchain, has seen $2 million exit the platform in a hack or rug pull.The team behind the project claimed that the deployer wallet had been compromised, allowing an attacker to drain the project&rsquo;s liquidity pool. Altogether, 615 ETH (~$2 million) was taken from the project.Grand Base is a platform where users can trade &ldquo;gAssets&rdquo;, which are crypto tokens that represent stocks in tech companies including Amazon, Apple, Google, Meta, and Microsoft.</p>
<p>Total loss estimated at $1,972,305.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/CertiKAlert/status/1779834754289779178</breach:sourceUrl><breach:dateOfBreach>2024-04-15</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-15</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Grand Base theft</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1972305</breach:financialLossUsd></item><item><title>"$26 million in 'unnecessary liquidations' hit Blast-based lender Pac Finance"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_pac-finance-liquidations/</link><pubDate>Fri, 12 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_pac-finance-liquidations/</guid><description>Pac Finance, a fork of the Aave lending protocol deployed on the Blast blockchain, surprised some of its users as an unannounced and unexpected code change lowered the liquidation threshold. Pac Finance said that they had asked an engineer to make changes to the smart contract, and that that person …</description><content:encoded>Pac Finance, a fork of the Aave lending protocol deployed on the Blast blockchain, surprised some of its users as an unannounced and unexpected code change lowered the liquidation threshold. Pac Finance said that they had asked an engineer to make changes to the smart contract, and that that person had unexpectedly decreased the threshold at which positions could be forcibly liquidated. This change resulted in $26 million being liquidated across the project.Pac Finance has said they are &amp;ldquo;actively developing a plan with [impacted users] to mitigate the issue.&amp;rdquo;</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.theblock.co/post/287992/26-million-in-unnecessary-liquidations-hit-blast-based-lender-pac-finance</breach:sourceUrl><breach:dateOfBreach>2024-04-12</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-12</breach:dateOfDisclosure><breach:initialAttackVector>Software bug / unintentional loss</breach:initialAttackVector><breach:vendorProduct>Pac Finance liquidations</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Former Security Engineer Sentenced To Three Years In Prison For Hacking Two Decentralized Cryptocurrency Exchanges"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_nirvana-finance-hacker-sentenced/</link><pubDate>Fri, 12 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_nirvana-finance-hacker-sentenced/</guid><description>Shakeeb Ahmed, the hacker who stole a combined $12 million from Crema Finance and Nirvana Finance in July 2022, has been sentenced to three years in prison. Ahmed had previously worked for Amazon, where he led a bug bounty program focused on paying whitehat hackers to discover flaws in Amazon's …</description><content:encoded>Shakeeb Ahmed, the hacker who stole a combined $12 million from Crema Finance and Nirvana Finance in July 2022, has been sentenced to three years in prison. Ahmed had previously worked for Amazon, where he led a bug bounty program focused on paying whitehat hackers to discover flaws in Amazon&amp;rsquo;s software.US Attorney Damian Williams described this as the first ever conviction for a smart contract hack.Ahmed forfeited around $12.3 million in stolen funds, and will pay more than $5 million in restitution.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.justice.gov/usao-sdny/pr/former-security-engineer-sentenced-three-years-prison-hacking-two-decentralized</breach:sourceUrl><breach:dateOfBreach>2024-04-12</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-12</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>Nirvana Finance</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"Solana Project Marginfi Withdrawals Top $214 Million After CEO's Resignation"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_marginfi-ceo-resignation/</link><pubDate>Wed, 10 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_marginfi-ceo-resignation/</guid><description>The MarginFi decentralized lending project on Solana has been at the epicenter of some major drama recently, amid concerns around oracle problems, withdrawal failures, and accusations that the project has not been paying out its promised rewards. Much of this came from a Solana staking pool, …</description><content:encoded><![CDATA[The MarginFi decentralized lending project on Solana has been at the epicenter of some major drama recently, amid concerns around oracle problems, withdrawal failures, and accusations that the project has not been paying out its promised rewards. Much of this came from a Solana staking pool, SolBlaze; MarginFi responded by describing their allegations as a &ldquo;hit piece&rdquo; and &ldquo;misinformation&rdquo;.On April 10, CEO Edgar Pavlovsky tweeted that he had resigned from MarginFi, publicly calling that he &ldquo;d[idn&rsquo;t] agree with the way things have been done internally or externally&rdquo;. Pavlovsky had been criticized for his response to the controversy around MarginFi, in which he had been argumentative and insulting, tweeting things like &ldquo;take your money out, go fuck yourself&rdquo; to those who accused him and MarginFi of malfeasance.Amid the chaos, more than $210 million in TVL has exited the protocol.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://decrypt.co/225844/solana-project-marginfi-withdrawals-top-214-million</breach:sourceUrl><breach:dateOfBreach>2024-04-10</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-10</breach:dateOfDisclosure><breach:vendorProduct>MarginFi CEO resignation</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>"Decrypting MuskSwap: A web of Scams and Tracking Funds Through Tornado Cash"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_muskswap-exit-scam/</link><pubDate>Mon, 08 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_muskswap-exit-scam/</guid><description>A person or group have raised funds for various crypto projects only to abandon them, empty the project wallets, and launder the funds through Tornado Cash. The largest of the projects was called "MuskSwap", which proclaimed: "$MUSK &amp;amp; MuskSwap was born to show admiration to elon musk's super …</description><content:encoded><![CDATA[<p>A person or group have raised funds for various crypto projects only to abandon them, empty the project wallets, and launder the funds through Tornado Cash. The largest of the projects was called &ldquo;MuskSwap&rdquo;, which proclaimed: &ldquo;$MUSK &amp; MuskSwap was born to show admiration to elon musk&rsquo;s super projects like solarcity, tesla, space x and his constant influence on the world finance &amp; the crypto market.&ldquo;The project described itself as a DEX with a native $MUSK token, and launched in July 2021. However, the token tanked on December 25, 2021. Although the project team tried to blame the crash on &ldquo;liquidity issues&rdquo; and promised paths forward, they locked the project Telegram chat on March 11, 2022. On April 5, 2022, the team withdrew remaining funds and deleted the website.Crypto analysis firm CertiK linked the MuskSwap project to several other scam tokens and projects: RocketDoge, InfinityGame, SpaceX, MUFC (themed after Manchester United), and Elona Musk. Altogether, the rug pulls have drawn in $5.1 million.</p>
<p>Total loss estimated at $5,100,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.certik.com/resources/blog/decrypting-muskswap-a-web-of-scams-and-tracking-funds-through-tornado-cash</breach:sourceUrl><breach:dateOfBreach>2024-04-08</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-08</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>MuskSwap exit</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>5100000</breach:financialLossUsd></item><item><title>Tweet by Long Beach County</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_bored-hungry-shuts-down/</link><pubDate>Sun, 07 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_bored-hungry-shuts-down/</guid><description>It's hard to believe that the hamburger joint themed around the owner's Bored Ape NFT failed to take off. Although there was novelty value in the themed restaurant, which for a time boasted that it accepted cryptocurrency payments, the excitement seemed to wear off quickly after a few early news …</description><content:encoded><![CDATA[It&rsquo;s hard to believe that the hamburger joint themed around the owner&rsquo;s Bored Ape NFT failed to take off. Although there was novelty value in the themed restaurant, which for a time boasted that it accepted cryptocurrency payments, the excitement seemed to wear off quickly after a few early news articles. After a while, the restaurant&rsquo;s crypto payments became spotty, with employees saying the system was unwieldy and unpopular among customers.Some more recent Yelp reviews described fairly mediocre food, which &ldquo;[t]he NFTs don&rsquo;t make up for&rdquo;.The restaurant opened in April 2022, a month after owner Andy Nguyen purchased Bored Ape #6184 for $268,000, along with three Mutant Apes for an additional combined  $187,000. #6184 became the restaurant&rsquo;s logo, and the others were incorporated into the restaurant&rsquo;s branding. The NFTs haven&rsquo;t been resold since, although it&rsquo;s unlikely they could recoup close to their original purchase prices — Bored Apes have been averaging a little under $50,000 in recent sales, and Mutants around $8,500 each.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/longbeachcounty/status/1777043411490746835</breach:sourceUrl><breach:dateOfBreach>2024-04-07</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-07</breach:dateOfDisclosure><breach:initialAttackVector>Protocol collapse / insolvency</breach:initialAttackVector><breach:vendorProduct>Bored &amp; Hungry</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Terraform Labs and founder Do Kwon found liable in US civil fraud trial"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_do-kwon-and-terraform-labs-found-liable-for-40-billion-fraud/</link><pubDate>Fri, 05 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_do-kwon-and-terraform-labs-found-liable-for-40-billion-fraud/</guid><description>After hearing arguments that Terraform Labs was "built on lies" during a two-week-long trial, the jury in the civil case against the company and its founder Do Kwon found that both were liable for fraud.Kwon and his company were behind the algorithmic stablecoin, Terra, which dramatically collapsed …</description><content:encoded>After hearing arguments that Terraform Labs was &amp;ldquo;built on lies&amp;rdquo; during a two-week-long trial, the jury in the civil case against the company and its founder Do Kwon found that both were liable for fraud.Kwon and his company were behind the algorithmic stablecoin, Terra, which dramatically collapsed in May 2022, sending huge ripple effects throughout the ecosystem. He and his company had lied about the stability of the token, ultimately causing massive financial damage to the tune of around $40 billion.Kwon is in custody in Montenegro after attempting to flee criminal cases in both the United States and South Korea. The civil case in the US proceeded without him.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.reuters.com/legal/terraform-labs-make-final-pitch-jury-civil-fraud-trial-wraps-2024-04-05/</breach:sourceUrl><breach:dateOfBreach>2024-04-05</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-05</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>Do Kwon and Terraform Labs found liable for $40 billion fraud</breach:vendorProduct><breach:blockchain>terra</breach:blockchain></item><item><title>Web3 Is Going Great</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_rug-pull-token/</link><pubDate>Wed, 03 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_rug-pull-token/</guid><description>A project describing itself as "The world's first memecoin pre-announced as a rugpull" was explicit in its marketing: "do not buy this coin, as it will go to zero."Despite that, people sent the creator over 8.8 ETH (almost $29,000) for the project's "pre-sale", even as they repeated on Twitter that …</description><content:encoded><![CDATA[<p>A project describing itself as &ldquo;The world&rsquo;s first memecoin pre-announced as a rugpull&rdquo; was explicit in its marketing: &ldquo;do not buy this coin, as it will go to zero.&ldquo;Despite that, people sent the creator over 8.8 ETH (almost $29,000) for the project&rsquo;s &ldquo;pre-sale&rdquo;, even as they repeated on Twitter that the project was a scam and that no one should buy it.</p>
<p>Total loss estimated at $28,878.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.web3isgoinggreat.com/?id=2024-04-03-0</breach:sourceUrl><breach:dateOfBreach>2024-04-03</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-03</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Rug pull token</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>28878</breach:financialLossUsd></item><item><title>Tweet by FixedFloat</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-04_fixedfloat-hack-2/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-04_fixedfloat-hack-2/</guid><description>The FixedFloat cryptocurrency exchange was exploited again, this time for around $2.8 million. This follows shortly after a February 18 hack in which attackers made off with $26 million.FixedFloat acknowledged the theft in a Twitter post, and blamed the same thieves. They claimed that this theft was …</description><content:encoded>The FixedFloat cryptocurrency exchange was exploited again, this time for around $2.8 million. This follows shortly after a February 18 hack in which attackers made off with $26 million.FixedFloat acknowledged the theft in a Twitter post, and blamed the same thieves. They claimed that this theft was enabled by a vulnerability in a third-party service.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/FixedFloat/status/1775172224216875223</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-01</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>FixedFloat</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>Tweet by Solareum Project</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_solana-drain-attacks/</link><pubDate>Sat, 30 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_solana-drain-attacks/</guid><description>The Solana ecosystem is grappling with a spate of drained wallets. A cause has yet to be definitively determined, but some of the thefts were linked to the use of trading bots like Solareum. Solareum speculated that the exploits may have been linked to compromised Telegram bot tokens, which could …</description><content:encoded><![CDATA[<p>The Solana ecosystem is grappling with a spate of drained wallets. A cause has yet to be definitively determined, but some of the thefts were linked to the use of trading bots like Solareum. Solareum speculated that the exploits may have been linked to compromised Telegram bot tokens, which could have allowed the attackers to obtain private keys from message history.Solareum later wrote that they would be closing the project, and deleted their website. This drew some criticism from users who accused them of doing nothing to investigate the hack, or even being responsible themselves. The project wrote on Twitter, &ldquo;We at #SOLAREUM team can clarify that we DO NOT steal money.&rdquo; Ah, well, in that case.Other bots may have been involved in the theft, though it&rsquo;s not clear at this point. Though there was some speculation that a trading bot called BonkBot was to blame, that seems to have been unfounded.The total theft amount is not clear, but exceeds $500,000.</p>
<p>Total loss estimated at $500,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/SolareumProject/status/1773745573234983021</breach:sourceUrl><breach:dateOfBreach>2024-03-30</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-30</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Solana drain attacks</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>500000</breach:financialLossUsd></item><item><title>On-chain messages</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_prisma-finance-hack/</link><pubDate>Thu, 28 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_prisma-finance-hack/</guid><description>The defi protocol Prisma Finance was hacked for 3,257 ETH ($11.5 million). An attacker was able to take advantage of a flaw in the project's smart contracts, allowing them to manipulate users' positions and steal some of their collateral. Two other watchful attackers observed the attack strategy and …</description><content:encoded><![CDATA[<p>The defi protocol Prisma Finance was hacked for 3,257 ETH ($11.5 million). An attacker was able to take advantage of a flaw in the project&rsquo;s smart contracts, allowing them to manipulate users&rsquo; positions and steal some of their collateral. Two other watchful attackers observed the attack strategy and replicated it, stealing a combined additional 173 ETH (~$610,000).Plasma paused the protocol after detecting the attack.The first attacker, who stole the bulk of the assets, sent an on-chain message to Prisma claiming that they had performed a &ldquo;whitehat rescue&rdquo;, and inquired about returning the funds. In later messages, however, they asked the project to answer questions about their security practices and projects&rsquo; responsibilities to users to prevent attacks. The attacker then transferred the stolen funds to Tornado Cash — indicating their return is unlikely.In another message, the attacker was angry that Prisma had not expressed gratitude to them or remorse to their users, and was angry they had used terms like &ldquo;exploit&rdquo; and &ldquo;attack&rdquo; in their description of the incident. They demanded that the team reveal their identities, apologize, and thank the attacker in an online press conference.</p>
<p>Total loss estimated at $12,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://etherscan.io/idm?addresses=0x2d413803a6ec3cb1ed1a93bf90608f63b157507a,0xd8531a94100f15af7521a7b6e724ac4959e0a025&amp;type=1</breach:sourceUrl><breach:dateOfBreach>2024-03-28</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-28</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Prisma Finance</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>12000000</breach:financialLossUsd></item><item><title>"Crypto game ‘Munchables’ on Blast exploited for $63M"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_munchables-hack/</link><pubDate>Tue, 26 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_munchables-hack/</guid><description>The "Munchables" crypto game explains: "Schnibbles grow on every realm across the Munchable's world. Each realm has their own unique and distinctive schniblet, and the Munchables react differently based on their compatibility to the schniblets fed to them. When creating an account for the …</description><content:encoded><![CDATA[The &ldquo;Munchables&rdquo; crypto game explains: &ldquo;Schnibbles grow on every realm across the Munchable&rsquo;s world. Each realm has their own unique and distinctive schniblet, and the Munchables react differently based on their compatibility to the schniblets fed to them. When creating an account for the Munchables, you must choose the location of your snuggery.&rdquo; Right then.Things went awry in the land of the schnibbles and snuggeries when an attacker siphoned around 17,400 ETH ($62.5 million). Various descriptions of the attack circulated, with blockchain sleuth zachxbt attributing it to a recently hired developer, and crypto developer 0xQuit claiming the theft appeared to have been &ldquo;planned since deploy&rdquo;.Some began discussing the possibility that the Blast layer-2 blockchain might forcibly roll back the chain to &ldquo;undo&rdquo; the hack. Some have argued this is contra to the crypto ethos or would set a bad precedent, while others have argued that as a blockchain focused more on gaming and experimentation and less on decentralization and other facets of crypto ideology, it would be a reasonable step.Some hours after the attack, the exploiter was convinced to return the funds.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/nft-game-munchables-blast-exploited-62-million</breach:sourceUrl><breach:dateOfBreach>2024-03-26</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-26</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>Munchables</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialRecoveredUsd>62500000</breach:financialRecoveredUsd></item><item><title>"Unexplained transfers on LENX protocol spark rug pull concerns"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_lenx-rug-pull/</link><pubDate>Tue, 26 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_lenx-rug-pull/</guid><description>The LENX cross-chain bitcoin liquidity protocol has recently been accused of a $10 million rug pull after community members observed massive withdrawals of treasury funds which were then sent to Binance accounts.One of the co-founders, known only as "Paul", claimed on Discord that he was "trying to …</description><content:encoded><![CDATA[<p>The LENX cross-chain bitcoin liquidity protocol has recently been accused of a $10 million rug pull after community members observed massive withdrawals of treasury funds which were then sent to Binance accounts.One of the co-founders, known only as &ldquo;Paul&rdquo;, claimed on Discord that he was &ldquo;trying to investigate&rdquo; the movement of funds, which have been blamed on the project&rsquo;s other co-founder, John Kim.Conversations on Discord suggest that a remaining $3 million in treasury funds were protected, and that the remaining LENX team may have been able to convince Binance to freeze the account that received stolen funds. However, little has been verifiably confirmed to date.LENX is backed by the Frax Finance lending protocol.</p>
<p>Total loss estimated at $10,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/unexplained-transfers-lenx-protocol-spark-rug-pull-concerns</breach:sourceUrl><breach:dateOfBreach>2024-03-26</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-26</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>LENX</breach:vendorProduct><breach:blockchain>bitcoin, ethereum</breach:blockchain><breach:financialLossUsd>10000000</breach:financialLossUsd></item><item><title>"Hacker mints 1B tokens in $16M Curio smart contract exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_curio-hack/</link><pubDate>Mon, 25 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_curio-hack/</guid><description>Curio, a crypto project that creates tokens based on "real-world assets" (RWAs) like cars, watches, wine, and other goods, has suffered an attack that saw around $16 million drained from the project's funds.A bug in the project's Ethereum smart contract enabled an attacker to mint 1 billion of the …</description><content:encoded><![CDATA[<p>Curio, a crypto project that creates tokens based on &ldquo;real-world assets&rdquo; (RWAs) like cars, watches, wine, and other goods, has suffered an attack that saw around $16 million drained from the project&rsquo;s funds.A bug in the project&rsquo;s Ethereum smart contract enabled an attacker to mint 1 billion of the project&rsquo;s CGT governance token. Although the tokens were notionally priced at around $40 million, the loss to the project was estimated at closer to $16 million.Curio DAO announced that they intended to compensate users affected by the theft over a year-long period.</p>
<p>Total loss estimated at $16,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/curio-smart-contract-exploit-hacker-mints-1-billion-tokens</breach:sourceUrl><breach:dateOfBreach>2024-03-25</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-25</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Curio</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>16000000</breach:financialLossUsd></item><item><title>Tweet by CertiK</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_lucky-star-currency-rug-pull-2/</link><pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_lucky-star-currency-rug-pull-2/</guid><description>The astrology-based Lucky Star Currency project rug-pulled for $1.1 million in October 2023. You'd think that might be the end of it, but on March 22, 2024, ownership of the project was transferred to a malicious smart contract that then drained tokens priced at almost $300,000 from those who still …</description><content:encoded><![CDATA[<p>The astrology-based Lucky Star Currency project rug-pulled for $1.1 million in October 2023. You&rsquo;d think that might be the end of it, but on March 22, 2024, ownership of the project was transferred to a malicious smart contract that then drained tokens priced at almost $300,000 from those who still held them.You almost have to admire the tenacity.</p>
<p>Total loss estimated at $297,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/CertiKAlert/status/1771220881261355512</breach:sourceUrl><breach:dateOfBreach>2024-03-22</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-22</breach:dateOfDisclosure><breach:initialAttackVector>Exit scam / rug pull</breach:initialAttackVector><breach:vendorProduct>Lucky Star Currency</breach:vendorProduct><breach:blockchain>bsc</breach:blockchain><breach:financialLossUsd>297000</breach:financialLossUsd></item><item><title>Web3 Is Going Great</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_solana-racist-memecoins/</link><pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_solana-racist-memecoins/</guid><description>Solana memecoin trading has been booming lately, with people making money by speculating on tokens themed around various memes and jokes. Amid an explosion in trading innocuously-named meme tokens like dogwifhat has also been a rise in blatantly racist tokens, named after racial slurs, featuring …</description><content:encoded><![CDATA[Solana memecoin trading has been booming lately, with people making money by speculating on tokens themed around various memes and jokes. Amid an explosion in trading innocuously-named meme tokens like dogwifhat has also been a rise in blatantly racist tokens, named after racial slurs, featuring racist caricatures, or named after antisemitic conspiracy theories.The tokens became so popular that projects showing newly-released tokens, like DEXScreener, became full of such tokens. DEXScreener released a statement on Twitter to say that &ldquo;We&rsquo;ll be reviewing our token profile moderation policy in the coming days. We won&rsquo;t be the gatekeepers of what happens on-chain, but we&rsquo;re definitely not here to spread hate.&rdquo; The replies to the tweet were, predictably, full of people accusing DEXScreener of &ldquo;censorship&rdquo; and &ldquo;going woke&rdquo;.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.web3isgoinggreat.com/?id=2024-03-22-1</breach:sourceUrl><breach:dateOfBreach>2024-03-22</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-22</breach:dateOfDisclosure><breach:vendorProduct>Solana racist memecoins</breach:vendorProduct><breach:blockchain>solana</breach:blockchain></item><item><title>On-chain message</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_super-sushi-samurai-exploit/</link><pubDate>Thu, 21 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_super-sushi-samurai-exploit/</guid><description>Super Sushi Samurai, a new blockchain game on the Blast layer-2 blockchain was exploited for $4.6 million when an attacker discovered a vulnerability in its smart contract. A bug in the mint functionality caused users who transferred their $SSS balance to themselves to receive twice as many tokens. …</description><content:encoded><![CDATA[<p>Super Sushi Samurai, a new blockchain game on the Blast layer-2 blockchain was exploited for $4.6 million when an attacker discovered a vulnerability in its smart contract. A bug in the mint functionality caused users who transferred their $SSS balance to themselves to receive twice as many tokens. An attacker took advantage of this to drain $4.6 million from the project, causing the $SSS token to plummet by 99%.The attacker contacted the project shortly after the theft, claiming to be a whitehat. They wrote, &ldquo;Hi team, this is a whitehat rescue hack. Let&rsquo;s work on reimbursing the users.&rdquo; Super Sushi Samurai later confirmed that the funds had been returned, minus a 5% &ldquo;bounty&rdquo;. The team also gave the whitehat an additional 2.5% in SSS tokens and land, and brought them on to the project team as a tech adviser.</p>
<p>Total loss estimated at $345,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://blastscan.io/tx/0xda2ca81e2b89ce1ac5d1faeb331cd715af3902246d62195f7d9a95bd20e2abc1</breach:sourceUrl><breach:dateOfBreach>2024-03-21</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-21</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract vulnerability exploit</breach:initialAttackVector><breach:vendorProduct>Super Sushi Samurai</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>345000</breach:financialLossUsd><breach:financialRecoveredUsd>4255000</breach:financialRecoveredUsd></item><item><title>Tweet thread by zachxbt</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_ticker-rug-pull/</link><pubDate>Thu, 21 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_ticker-rug-pull/</guid><description>A developer brought on to run a presale for the $TICKER token stole $900,000 from the project. 15% of the token supply was sent to the developer to distribute via an airdrop, but instead of doing so, the developer sold the majority of the tokens for around $900,000.After the thief was identified by …</description><content:encoded><![CDATA[<p>A developer brought on to run a presale for the $TICKER token stole $900,000 from the project. 15% of the token supply was sent to the developer to distribute via an airdrop, but instead of doing so, the developer sold the majority of the tokens for around $900,000.After the thief was identified by blockchain sleuth zachxbt, they posted a long message on Twitter, writing, &ldquo;im not sorry for any of you, tbh. you are all morons if you believe all it needs to make it here is to send your money to a custodial address and get rich&rdquo;. The thief later spent some of the money on Milady NFTs and memecoins.zachxbt stated that he had identified the developer, including his full name, location, and other details. He encouraged those who were scammed to contact him if they were interested in pursuing legal action.</p>
<p>Total loss estimated at $900,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/zachxbt/status/1770821182838763998</breach:sourceUrl><breach:dateOfBreach>2024-03-21</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-21</breach:dateOfDisclosure><breach:initialAttackVector>On-chain theft (attributed by zachxbt)</breach:initialAttackVector><breach:vendorProduct>TICKER</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>900000</breach:financialLossUsd></item><item><title>"Old Dolomite exchange contract suffers $1.8M loss from approval exploit"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_dolomite-exchange-hack/</link><pubDate>Wed, 20 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_dolomite-exchange-hack/</guid><description>The Dolomite DEX suffered a $1.8 million theft as an exploiter was able to take advantage of a vulnerability in a smart contract that had been deployed in 2019. Although most contemporary users of the exchange use a version deployed on the Arbitrum layer-2 network, the old contracts were still …</description><content:encoded>&lt;p>The Dolomite DEX suffered a $1.8 million theft as an exploiter was able to take advantage of a vulnerability in a smart contract that had been deployed in 2019. Although most contemporary users of the exchange use a version deployed on the Arbitrum layer-2 network, the old contracts were still usable on Ethereum.An attacker apparently discovered a reentrancy bug allowing them to drain user funds from those who had approved the old contract. Altogether, around $1.8 million was taken before the team disabled the contract. The attacker quickly tumbled the stolen funds through Tornado Cash.&lt;/p>
&lt;p>Total loss estimated at $1,800,000.&lt;/p>
</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://cointelegraph.com/news/old-dolomite-exchange-contract-suffers-1-8-million-loss-from-approval-exploit</breach:sourceUrl><breach:dateOfBreach>2024-03-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-20</breach:dateOfDisclosure><breach:initialAttackVector>Reentrancy attack on smart contract</breach:initialAttackVector><breach:vendorProduct>Dolomite exchange</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain><breach:financialLossUsd>1800000</breach:financialLossUsd></item><item><title>"SEC probing crypto companies in Ethereum investigation as hopes for ETF dim"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_sec-ethereum-foundation-investigation/</link><pubDate>Wed, 20 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_sec-ethereum-foundation-investigation/</guid><description>Fortune reported that the U.S. Securities and Exchange Commission has targeted the Swiss-based Ethereum Foundation for investigation, apparently in an effort to classify its ETH token a security. The report came out shortly after CoinDesk reported that a warrant canary had been removed from the …</description><content:encoded>Fortune reported that the U.S. Securities and Exchange Commission has targeted the Swiss-based Ethereum Foundation for investigation, apparently in an effort to classify its ETH token a security. The report came out shortly after CoinDesk reported that a warrant canary had been removed from the Ethereum Foundation&amp;rsquo;s website.Although the SEC has agreed that bitcoin is a commodity and not a security, it has been hesitant to make similar explicit statements about ETH. Designation as a security could be devastating to the Ethereum project and to ETH, which is the second most popular cryptocurrency to bitcoin.</content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://fortune.com/crypto/2024/03/20/sec-gary-gensler-ethereum-security-commodity-crypto-foundation/</breach:sourceUrl><breach:dateOfBreach>2024-03-20</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-20</breach:dateOfDisclosure><breach:initialAttackVector>Regulatory / legal action</breach:initialAttackVector><breach:vendorProduct>SEC Ethereum Foundation investigation</breach:vendorProduct><breach:blockchain>ethereum</breach:blockchain></item><item><title>"Exchange Investigates Flash Crash That Sent Bitcoin to $8,900"</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_bitcoin-flash-crashes-on-bitmex/</link><pubDate>Tue, 19 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_bitcoin-flash-crashes-on-bitmex/</guid><description>A "very small number of accounts" were able to crash the bitcoin price on the BitMEX exchange from its roughly $66,000 price to as low as $8,900. BitMEX attributed the incident to "aggressive selling behavior" by that small group.The incident underscores the thinness of the bitcoin markets on some …</description><content:encoded><![CDATA[A &ldquo;very small number of accounts&rdquo; were able to crash the bitcoin price on the BitMEX exchange from its roughly $66,000 price to as low as $8,900. BitMEX attributed the incident to &ldquo;aggressive selling behavior&rdquo; by that small group.The incident underscores the thinness of the bitcoin markets on some cryptocurrency exchanges, and the ease with which a few whales can manipulate token prices.BitMEX used to be among the largest cryptocurrency trading platforms, though its popularity diminished after its founders were hit with criminal charges in 2020 for violations of the Bank Secrecy Act.]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://www.bloomberg.com/news/articles/2024-03-19/exchange-investigates-flash-crash-that-sent-bitcoin-to-8-900</breach:sourceUrl><breach:dateOfBreach>2024-03-19</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-19</breach:dateOfDisclosure><breach:vendorProduct>Bitcoin flash crashes on BitMEX</breach:vendorProduct><breach:blockchain>bitcoin</breach:blockchain></item><item><title>Tweet thread by Slerf</title><link>https://breachnotes.vulnetix.com/cryptocurrency/2024-03_slerf-memecoin-meltdown-only-adds-to-mania/</link><pubDate>Mon, 18 Mar 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cryptocurrency/2024-03_slerf-memecoin-meltdown-only-adds-to-mania/</guid><description>People have gotten really into memecoin trading on Solana recently. Like really into it. Someone decided they'd hop on the bandwagon with "Slerf", a sloth-themed memecoin they said would launch with a 50% presale.Thanks to the aforementioned frenzy, the project managed to raise $10 million in the …</description><content:encoded><![CDATA[<p>People have gotten really into memecoin trading on Solana recently. Like really into it. Someone decided they&rsquo;d hop on the bandwagon with &ldquo;Slerf&rdquo;, a sloth-themed memecoin they said would launch with a 50% presale.Thanks to the aforementioned frenzy, the project managed to raise $10 million in the presale. However, things went sideways when the developer accidentally burned the $10 million by sending them to an address where they would be permanently inaccessible. &ldquo;oh fuck&rdquo;, the developer wrote ominously on Twitter, before explaining their mistake.Some speculated that the screwup may have been a marketing ploy, in which case it was very successful, because the token went on to post more than $2.7 billion in trading volume over a 24-hour period — more than the entire ETH trading volume in that period. The monumental error by the developers seemed to have no damper on the overall frenzy around memecoins, or even produced the opposite effect.Surely this trend won&rsquo;t end badly.</p>
<p>Total loss estimated at $10,000,000.</p>
]]></content:encoded><category>cryptocurrency</category><breach:sourceUrl>https://twitter.com/Slerfsol/status/1769628588809031864</breach:sourceUrl><breach:dateOfBreach>2024-03-18</breach:dateOfBreach><breach:dateOfDisclosure>2024-03-18</breach:dateOfDisclosure><breach:vendorProduct>Slerf memecoin meltdown only adds to mania</breach:vendorProduct><breach:blockchain>solana</breach:blockchain><breach:financialLossUsd>10000000</breach:financialLossUsd></item></channel></rss>