Cetus lost over $220 million after an attacker exploited a flaw in a smart contract math library. The attacker used spoof tokens and overflow bugs to trick the system into giving away real assets.
Venus Protocol, a BNB Chain lending platform, was hit by a suspected $3.7 million flash loan exploit on March 15. Security researchers said the attacker used a large position in THE token as ...
Decentralized finance (DeFi) protocol Blueberry has managed to pause its protocol after a mad dash to limit potential damage from an “ongoing exploit” on Friday. In a Feb. 23 post on X, the Blueberry ...
Multi-chain liquid staking protocol Meta Pool suffered a smart contract exploit on Tuesday, resulting in the loss of $27 million. Blockchain security firm PeckShield reported that a bug in the ...
The attacker currently holds $1.8M worth of crypto including 32.5 million NXRA tokens. Nexera has paused the smart contract and trading on decentralized exchanges; the token fell 40%. The attacker is ...
Alex Lab Foundation said it will fully reimburse users affected by the $8.3 million exploit, with compensation issued in USDC following a structured claims process. Alex Protocol, a Bitcoin ...
Loopscale, a decentralized finance (DeFi) protocol built on Solana, has suspended its lending operations following a $5.8 million exploit. The incident occurred on April 26, when a hacker drained 5.7 ...
Decentralized finance (DeFi) platform LI.FI protocol has been hit by a roughly $11 million exploit following a series of suspicious withdrawals, on-chain data shows. "Please do not interact with any ...
Nemo Protocol released a comprehensive post-mortem blaming a rogue developer for deploying unaudited code containing critical vulnerabilities that enabled a $2.59 million exploit on September 7. The ...
A couple of weeks ago, the cryptocurrency community witnessed a “peculiar” and complex exploit within the Raft Protocol, which is described as a decentralized finance (DeFi) platform operating on the ...
It happens all too often that the first time a vulnerability becomes known is when a forensic investigation is under way to find out how a system was broken into, or when a virus that’s already ...