Visualização normal

Antes de ontemBlockchain Threat Intelligence
  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 4, 2026 Peter Kacherginsky
    Greetings!More than $28M was stolen this week across eight incidents. From arbitrary call vulnerabilities to infinite mint bugs, it was a particularly rough week. Let’s break down a few of the most notable hacks.HypuurFi, SwapNet, and Aperture Finance were hit by arbitrary external call exploits, draining users of roughly $17 million in a single day. Notably, the last two had no source code and were exploited shortly after deployment. We’ve long observed that attackers are becoming increasingly
     

BlockThreat - Week 4, 2026

27 de Janeiro de 2026, 13:42

Greetings!

More than $28M was stolen this week across eight incidents. From arbitrary call vulnerabilities to infinite mint bugs, it was a particularly rough week. Let’s break down a few of the most notable hacks.

HypuurFi, SwapNet, and Aperture Finance were hit by arbitrary external call exploits, draining users of roughly $17 million in a single day. Notably, the last two had no source code and were exploited shortly after deployment. We’ve long observed that attackers are becoming increasingly sophisticated with onchain vulnerability scanners. Now, we see they not only can detect bugs in raw EVM code but also wait patiently for the most opportune moment to strike exactly as I discussed in my recent DSS talk on watering hole contracts.

If you are not familiar with this attack vector, below is a snippet from the vulnerable HypuurFi contract:

function swapAndDeposit(
    address swapRouter,      // arbitrary call address
    bytes calldata swapData, // malicious input
    address vault,
    address tokenIn,
    uint256 amountIn,
    address tokenOut,
    address receiver
) public payable {
    // Execute swap (tokens come to gateway)
    if (!_isNativeToken(tokenIn)) {
        IERC20(tokenIn).safeTransferFrom(msg.sender, address(this), amountIn);
        IERC20(tokenIn).safeIncreaseAllowance(swapRouter, amountIn);
    }

    // VULNERABILITY:      v----- Tainted user input  ----v
    (bool success,) = swapRouter.call{value: msg.value}(swapData);
    require(success, "Swap failed");

    // Deposit swapped tokens
    uint256 balance = IERC20(tokenOut).balanceOf(address(this));
    _deposit(vault, tokenOut, balance, receiver);
}

The easiest way for developers to catch this bug class is to consider all user input malicious and never pass it along without any constraints to call() or equivalent.

It’s hard to blame users for this hack as they were using DeFi protocols exactly as we encourage them including infinite allowances without any mechanism to revoke them. Perhaps it should be up to wallets to step up and help users clean up these long-lasting approvals just like our password managers frequently remind us to change compromised or weak passwords. In the meantime, bookmark http://revoke.cash and try to visit it on a quarterly/monthly basis.

There’s some hope that the attackers behind these incidents will eventually slip up and face swift justice. It happens to all of them sooner or later. In the meantime, check out this week’s sponsor and the good guys behind Anchain.ai, who are working hard to track down bad actors and help make our ecosystem a bit safer for us all.


AI-native Crypto Intelligence Data

AnChain.AI Data delivers institution grade cryptocurrency data API and MCP for AML, fraud compliance, growth analytics and beyond.

$200 Promo Code (By 2/28): AINATIVECRYPTODATA

https://www.anchain.ai/data


Cosmos ecosystem is know for some of the nastiest blockchain-level bugs including infinite minting, reentrancy, and others. This week, SagaEVM became the victim to one such critical vulnerability. Attackers exploited an infinite-mint bug to generate assets out of thin air, stealing over $7M. Although the chain was halted, the attackers had already bridged out the available liquidity.

In other news, son of a company owner tasked with managing US Marshal Service’s seized crypto assets (including from Bitfinex hack) managed to steal $40M. ZachXBT was able to pin down the perp after he leaked his wallets on Telegram.

Let’s dive into the news!

News

Crime

Policy

Phishing

Malware

Media

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 3, 2026 Peter Kacherginsky
    Greetings!The first week in awhile with no major incidents (that we know of) this week. This will be a great time to catch up on all of the great research, sharpen the saw, before we are once again thrown into battle. Be careful out there!Let’s dive into the news!NewsVitalik Buterin condemns criminalization of code in appeal for Tornado Cash developer.Mempool bots battle over compromised BTC.2026 Crypto Crime Report Key Insights: TRM Identifies Record USD 158 Billion in Illicit Crypto Flows in 2
     

BlockThreat - Week 3, 2026

24 de Janeiro de 2026, 11:01

Greetings!

The first week in awhile with no major incidents (that we know of) this week. This will be a great time to catch up on all of the great research, sharpen the saw, before we are once again thrown into battle. Be careful out there!

Let’s dive into the news!

News

Crime

Policy

Phishing

Malware

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 2, 2026 Peter Kacherginsky
    Greetings!Nearly $30M was stolen this week across ten incidents. Quite a way to start the year with exchanges and DeFi protocols alike getting compromised, while users lost hundreds of millions more to well known support scams. Let’s take a closer look at a few of the most impactful cases.The TrueBit protocol hack continues a troubling trend of older smart contracts being exploited. More than $26M was drained through a classic integer overflow bug, triggering a wave of copycat attacks. The hard
     

BlockThreat - Week 2, 2026

23 de Janeiro de 2026, 18:18

Greetings!

Nearly $30M was stolen this week across ten incidents. Quite a way to start the year with exchanges and DeFi protocols alike getting compromised, while users lost hundreds of millions more to well known support scams. Let’s take a closer look at a few of the most impactful cases.

The TrueBit protocol hack continues a troubling trend of older smart contracts being exploited. More than $26M was drained through a classic integer overflow bug, triggering a wave of copycat attacks. The hard lesson here is longevity does not equal safety. This vulnerability sat undiscovered in a Solidity v0.5.3 contract for nearly four years before being exploited, likely as part of a broader campaign targeting legacy deployments. If you are still hesitant about re auditing older onchain code, now is the time. Otherwise, attackers will be happy to perform that audit for you.

Exchange hacks are relatively rare, which made the compromise of Kontigo particularly notable. The incident occurred just two days after US captured Venezuelan president Maduro. While there is no evidence linking the two events, the timing raised eyebrows given Kontigo’s previously reported ties to Maduro and Venezuela. It is another reminder that real world politics can sometimes spill into the crypto ecosystem in unexpected ways.

Let’s dive into the news!

News

Crime

Phishing

Scams

Malware

Media

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 1, 2026 Peter Kacherginsky
    Greetings!We are starting the new year with nearly $4 million in losses across four incidents, with the majority stemming from the Unleash Protocol hack on the Story chain.Thanks to a detailed incident report published by the Unleash Protocol team, we now have visibility into a familiar phishing attack pattern:Compromise of a privileged user via Telegram.Distribution of a link to a look-alike Safe interface to other multisig signers.A specially crafted transaction that reduced the consensus thre
     

BlockThreat - Week 1, 2026

10 de Janeiro de 2026, 18:15

Greetings!

We are starting the new year with nearly $4 million in losses across four incidents, with the majority stemming from the Unleash Protocol hack on the Story chain.

Thanks to a detailed incident report published by the Unleash Protocol team, we now have visibility into a familiar phishing attack pattern:

  • Compromise of a privileged user via Telegram.

  • Distribution of a link to a look-alike Safe interface to other multisig signers.

  • A specially crafted transaction that reduced the consensus threshold to just 1.

  • Profit!

The critical control that could have detected this earlier beyond the initial account compromise was a multisig transaction verification. Such verification may have flagged the malicious proposal before execution. It is a painful lesson, but one the broader DeFi industry will hopefully adopt quickly.

You can find post-mortems, indicators, and other details for Unleash Protocol, PRXVT, Valinity, and other compromises in the premium section below.

Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Contests

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 52, 2025 Peter Kacherginsky
    Greetings!We are closing out the year with nearly $13M stolen across five incidents. The most severe was the complete compromise of the Trust Wallet browser extension.According to the recently published post mortem, Trust Wallet’s GitHub repository had been compromised since November(!) by the infamous Shai Hulud worm. After sitting on stolen GitHub secrets and Chrome Web Store API key the attackers finally struck, uploading a malicious extension that exfiltrated users’ private keys. More than $
     

BlockThreat - Week 52, 2025

31 de Dezembro de 2025, 11:03

Greetings!

We are closing out the year with nearly $13M stolen across five incidents. The most severe was the complete compromise of the Trust Wallet browser extension.

According to the recently published post mortem, Trust Wallet’s GitHub repository had been compromised since November(!) by the infamous Shai Hulud worm. After sitting on stolen GitHub secrets and Chrome Web Store API key the attackers finally struck, uploading a malicious extension that exfiltrated users’ private keys. More than $8.5M has already been stolen from thousands of victims. Supply chain attacks of this nature are likely to become a recurring theme in 2026. As I have warned before, it is long past time to lock down repositories and, critically, to rotate compromised credentials immediately rather than weeks later.

Another particularly rare exploit happened this week involving Flow blockchain. An attacker waited until the very end of the year to exploit an infinite mint vulnerability in chain’s execution layer, draining $3.9M. Flow operators later chose to roll the chain back to a pre-hack checkpoint. This is a blunt and largely ineffective mitigation, as it negatively impacts every legitimate user who transacted after the attack while the attacker had already bridged the stolen funds out of the ecosystem. A far more effective response would have been to isolate or filter attacker’s transactions, as demonstrated in the recent Balancer incident, where chains such as Polygon, Gnosis, Berachain, and others assisted in recovery without disrupting normal network activity. This incident highlights the need for Flow to develop a comprehensive and well rehearsed incident response plan.

In the premium section of the newsletter, you will find detailed coverage of the Polymarket compromise, Trust Wallet post mortems and backdoor analysis, the Flow blockchain infinite mint vulnerability, and more.

As we are quickly approaching the end of the year with about $2.8B stolen across 363 incidents from various DeFi protocols, blockchains, and centralized exchanges it’s easy to call 2025 one of the more challenging years that I’ve seen in about 8 years of following this industry. And yet, we must continue fighting the good fight and make this industry succeed for every family out there that can’t afford basic needs because their savings were devalued by failed economies, assets stolen by corrupt institutions with no chance of lifting themselves out of poverty without access to global financial markets. Crypto has a chance of solving this and many more hardships by enveloping the world in an unstoppable global financial network where people can safely transact with anyone anywhere. As a blockchain security industry we can pave the road for this future to arrive sooner by creating a safe and trustworthy environment for billions of users that will be coming onchain soon.

Have a safe new year and many more adventures together. Let’s dive into the news!

News

Crime

Phishing

Media

Research

Tools

  • heimdall-eval by Jon Becker. A structured approach to evaluating and benchmarking Heimdall's decompilation accuracy and CFG generation quality.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

Polymarket

Date: December 24, 2025
Attack Vector: Authentication Bypass
Chain: Polygon

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 51, 2025 Peter Kacherginsky
    Greetings!Roughly $3.7M was stolen this week across eight incidents. The winter holidays remain one of the most dangerous periods for defenders, as attackers intensify their activity while relying on reduced staffing and slower response times.The most severe incident this week stemmed from a user falling victim to an address poisoning attack, resulting in a $50M loss. While this does not surpass last year’s record $71M WBTC address poisoning hack, successful compromises of this kind continue to
     

BlockThreat - Week 51, 2025

30 de Dezembro de 2025, 20:30

Greetings!

Roughly $3.7M was stolen this week across eight incidents. The winter holidays remain one of the most dangerous periods for defenders, as attackers intensify their activity while relying on reduced staffing and slower response times.

The most severe incident this week stemmed from a user falling victim to an address poisoning attack, resulting in a $50M loss. While this does not surpass last year’s record $71M WBTC address poisoning hack, successful compromises of this kind continue to incentivize attackers to flood the blockchain with malicious transactions. What’s frustrating is that this class of attack is largely solvable. Wallets and blockchain explorers could defeat most address poisoning attacks with stronger heuristics. What are the odds that a user legitimately interacts with multiple addresses that share similar prefixes and suffixes? We can do better!

The troubling trend of attacks against older contracts also persists. Yearn was compromised yet again, losing $300K due to a misconfiguration exploit, while Rari’s multisig was taken over, allowing attackers to drain approximately $2M.

Let’s dive into the news!

Events

News

Crime

Policy

Phishing

Scams

Malware

Media

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

NX Finance

Date: December 15, 2025
Attack Vector: Price Oracle Manipulation
Impact: $400,000
Chain: Solana

Indicators:

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 50, 2025 Peter Kacherginsky
    Greetings!Almost $3.5M were stolen this week across eight projects. Unfortunately, the week also marked the appearance of all three emerging threat classes I discussed in my talk at DSS 2025.Watering Hole Contracts are particularly dangerous because they target not the protocols themselves, but their users. Victims are users who previously approved their funds to a vulnerable or compromised contract, often long forgotten. That was the case this week with Jill Gunter, who had an old unlimited tok
     

BlockThreat - Week 50, 2025

15 de Dezembro de 2025, 11:01

Greetings!

Almost $3.5M were stolen this week across eight projects. Unfortunately, the week also marked the appearance of all three emerging threat classes I discussed in my talk at DSS 2025.

Watering Hole Contracts are particularly dangerous because they target not the protocols themselves, but their users. Victims are users who previously approved their funds to a vulnerable or compromised contract, often long forgotten. That was the case this week with Jill Gunter, who had an old unlimited token approval to a ThirdWeb contract containing an insidious msgSender spoofing vulnerability from nearly two years ago. Attackers patiently waited for a user with a sufficiently large balance to appear, then exploited the vulnerability to drain the funds.

What makes this incident especially unfortunate is that Thirdweb could have prevented the loss by disabling the vulnerable contract, but it appears this step was overlooked. As I mentioned in my talk, users should regularly review and revoke token approvals that are no longer needed. Even better, they should avoid infinite approvals altogether for the massive security risk that it is.

Speaking of predicted threats, another legacy contract was attacked this week. Ribbon Finance lost $2.7M after an attacker successfully forged an update to its price oracle feed. This was a subtle and sophisticated exploit, emblematic of a new generation of attackers who specialize in uncovering deep vulnerabilities hidden in older codebases.

If we can’t reaudit every legacy project, then at the very least we should apply modern tooling capable of analyzing older codebases against latest attack patterns. This week’s sponsor, Ackee, has built exactly such a tool with Wake Arena, designed to hunt down deep and hard to find vulnerabilities. Be sure to check them out!


Wake Arena identified 43 of 94 high-severity vulnerabilities in benchmark tests on historical audit competitions. In 3 production Ackee audits in November 2025 for Lido, Printr, and Everstake, it discovered 26/79 (33%) of all findings, including 5/10 (50%) of the critical findings in Printr, and six unique vulnerabilities. Read the full report.


Let’s dive into the news!

News

Crime

Policy

Phishing

Malware

Media

Contests

Research

Tools

  • Tornado Cash Withdrawal Viewer by IOCOfficial. Analyse withdrawals from Tornado Cash ETH pools using the Etherscan API. View recipient addresses with withdrawal counts, totals, and date ranges across all three ETH pools.

  • Slotscan. Human readable storage viewer.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 49, 2025 Peter Kacherginsky
    Greetings!Almost $11M were stolen this week across four incidents. The majority of losses came from the Yearn Finance compromise where an attacker exploited an integer underflow to steal $9M. The key lesson is that this was yet another legacy codebase that had not been audited for years and contained a deep vulnerability in its math logic. As I mentioned in my recent talk, this is emerging as a real threat to many protocols and to the broader ecosystem that relies on them. Simply isolating or de
     

BlockThreat - Week 49, 2025

11 de Dezembro de 2025, 21:19

Greetings!

Almost $11M were stolen this week across four incidents. The majority of losses came from the Yearn Finance compromise where an attacker exploited an integer underflow to steal $9M. The key lesson is that this was yet another legacy codebase that had not been audited for years and contained a deep vulnerability in its math logic. As I mentioned in my recent talk, this is emerging as a real threat to many protocols and to the broader ecosystem that relies on them. Simply isolating or derisking these codebases may not always be feasible, so the practical path forward may require reauditing them with modern tools, improved techniques, and highly experienced auditors that simply did not exist when much of this code was written.

Another incident this week involved an exploit class I also highlighted in the same DSS talk. The USDP initialization hijacking allowed attackers to insert a malicious backdoor, resulting in a one million dollar theft. Attackers are becoming more sophisticated in how they place these backdoors, which is creating ideal conditions for a future watering hall contract scenario.

And just as we were getting a break from two mass supply chain attacks, the web2 world delivered another reminder of its fragility. The mass React compromise is one of the most severe exploitation campaigns in recent memory. Please patch your instances immediately!


Enjoy reading BlockThreat? Each edition takes more than ten hours of careful research and preparation every week. Consider sponsoring an upcoming issue or becoming a paid subscriber to unlock the premium section with detailed analyses of hacks, vulnerabilities, special reports, and a fully searchable newsletter archive.


Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Media

Contests

Research

Tools

  • coq-of-solidity - a tool to automatically translate Solidity smart contracts to the Rocq proof system. This allows to formally verify the correctness of the smart contracts.

  • Antidrain by Zun. Claim airdrops, recover staked tokens & rescue NFTs from compromised wallets. Powered by EIP-7702, execute atomic batch operations before sweeper bots can react.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 48, 2025 Peter Kacherginsky
    Greetings!Just one major compromise this week involving Upbit, resulting in the theft of $36.8M. The compromise happened on November 27, which was the same date the exchange was hacked for $50M in 2019. Lazarus, which was responsible for both incidents, appears to be sending a message exactly six years later.Shai Hulud returned with a revised and more effective mass compromise campaign. The attack spread across more than 25,000 repositories and hundreds of npm packages. By moving its execution i
     

BlockThreat - Week 48, 2025

11 de Dezembro de 2025, 18:37

Greetings!

Just one major compromise this week involving Upbit, resulting in the theft of $36.8M. The compromise happened on November 27, which was the same date the exchange was hacked for $50M in 2019. Lazarus, which was responsible for both incidents, appears to be sending a message exactly six years later.

Shai Hulud returned with a revised and more effective mass compromise campaign. The attack spread across more than 25,000 repositories and hundreds of npm packages. By moving its execution into preinstall flows, it penetrated CI and CD environments such as GitHub Actions, enabling large scale theft of credentials and secrets. As attackers review the stolen data we should be prepared for follow on compromises that may involve major projects.

Speaking of supply chains, the Mixpanel breach resulted in user data leaks across several crypto platforms including CoinTracker, CoinDCX and others. Prepare for the next wave of phishing campaigns similar to the ones that followed the Ledger and Kroll breaches.

Let’s dive into the news!

News

Crime

Policy

Phishing

Malware

Media

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 47, 2025 Peter Kacherginsky
    Greetings!As many of us were out enjoying the warm weather and people of Buenos Aires, the DeFi ecosystem was hit with four exploits totaling nearly $4M in losses. The biggest impact came from GANA, which lost more than $3M in a private key theft. Close behind was the DNS hijacking attack on Aerodrome/Velodrome, resulting in roughly $700K stolen from users who unknowingly signed malicious transactions delivered through a compromised front-end. It’s a stark reminder of the persistent centralizati
     

BlockThreat - Week 47, 2025

7 de Dezembro de 2025, 01:23

Greetings!

As many of us were out enjoying the warm weather and people of Buenos Aires, the DeFi ecosystem was hit with four exploits totaling nearly $4M in losses. The biggest impact came from GANA, which lost more than $3M in a private key theft. Close behind was the DNS hijacking attack on Aerodrome/Velodrome, resulting in roughly $700K stolen from users who unknowingly signed malicious transactions delivered through a compromised front-end. It’s a stark reminder of the persistent centralization risks across DeFi, where critical infrastructure still depends on components never designed to withstand the high-risk environment we’ve grown accustomed to onchain.

Speaking of 3rd party infrastructure risk, the entire internet including blockchain infrastructure were hit by Cloudflare outage. A simple database mistake on the part of some 3rd party company and suddenly all of our RPC servers and wallet front-ends were out. Between hacks and outages, may be it’s time to start moving to more resilient tech such as IPFS and Lava network (or similar) for hosting critical onchain infrastructure.

DeFi Security Summit was simply outstanding this year. From the venue to the quality of the talks, it is clear that the blockchain security community is thriving. I have added links to the published recordings in the Media section.

Be sure to check out The State of DeFi Security 2025 Edition, which goes beyond the now customary discussion of Top 10 DeFi attack vectors. This year I focused more on emerging threats, the kinds of potential billion dollar failure modes we have narrowly avoided one too many times. These are the areas we need to prioritize before they turn into something more than a dodged bullet.

One topic I had too little time to cover is competitive incident response. The idea comes from the massive success of competitive bug hunting, including bug bounties, competitions, and similar community driven efforts. Why can’t we adapt the same approach for incident response?

Some tasks are difficult to crowdsource, such as incident management, mitigations, communications, coordination with law enforcement, and other responsibilities traditionally handled by an incident commander. These should remain within a tight group of warroom participants. But there are other tasks that, when outsourced, could become a real asset to already stressed and overstretched incident responders.

Even before an incident unfolds there is always a race to detect, triage, and assign severity to potential problems. Teams must deal with constant noise and false positives from onchain monitoring systems, no matter what their marketing claims suggest. In practice many projects rely on third party companies like Peckshield to publicly or privately notify them with an exploit transaction hash. These companies are motivated to be the first to announce a hack because early visibility brings clients, a form of ambulance chasing. Instead of this dynamic, why not create incentives for a wider community to share confirmed incidents through an incident response bounty platform? Crowdsourcing challenges remain such as low quality submissions and high volume, but those could be addressed with the same reputation and triage processes used in mature bug bounty programs.

During an ongoing incident there is a race to identify the root cause. This is an extremely time sensitive task and can be the difference between successful containment or a complete disaster. Researchers already compete on social media to publish the first accurate root cause, so why not incentivize a bounty for the first correct analysis and allow the impacted team to focus on containment and managing the incident. Imagine a well motivated security community diving into an incident with the same energy we see during top security competitions. Every minute saved in analysis could prevent millions in stolen assets.

After an incident the onchain tracking effort often becomes a multi month or even multi year process that many projects eventually abandon. Yet as cases like the Oasis recovery show, it often pays to follow stolen funds and intervene as early as possible. More projects are beginning to offer bounties for help with tracking and asset recovery, so why not formalize this and unleash an army of onchain sleuths without waiting for a public plea.

Below are some of the bounties we could offer at different stages of an incident:

I have seen many pieces of competitive incident response emerge in the incidents I track week after week. The recent Balancer recovery is one example where well aligned incentives helped the defenders succeed. I believe we are now at the point where a new uniquely DeFi security discipline is forming. Imagine a world where we make it significantly harder for attackers not only to find bugs but also to successfully execute attacks and escape with stolen funds. Competitive incident response may be the path that gets us there.

Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Contests

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 46, 2025 Peter Kacherginsky
    Greetings!A relatively quiet week with just three exploits resulting in $657K in losses. A good week to catch up on research and podcasts just before the week of DeFi Security Summit (DSS) conference which I will cover in the next edition.Let’s dive into the news!News‘Fat-Finger’ Fail? Cardano Whale Torches $6M After Hitting Illiquid USDA Pool.X Login Outage: Security Key Switch to X.com Locks Out Users as Twitter.com Finally Dies.Blockchain Freezing Exposed by Bybit. A nice survey of chains wit
     

BlockThreat - Week 46, 2025

5 de Dezembro de 2025, 18:47

Greetings!

A relatively quiet week with just three exploits resulting in $657K in losses. A good week to catch up on research and podcasts just before the week of DeFi Security Summit (DSS) conference which I will cover in the next edition.

Let’s dive into the news!

News

Crime

Phishing

Malware

Scams

Media

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 45, 2025 Peter Kacherginsky
    Greetings!More than $132M were stolen this week across seven incidents. Smart contract exploits, systemic stablecoin depegs and liquidity crunches, kidnappings, and much more happened last week. However, this edition focuses on the largest smart contract exploit this year - the Balancer hack.On November 3, 2025, Balancer experienced a highly coordinated attack across seven chains. A bad actor exploited a subtle rounding error to steal more than $128M. There are plenty of excellent writeups on th
     

BlockThreat - Week 45, 2025

17 de Novembro de 2025, 03:34

Greetings!

More than $132M were stolen this week across seven incidents. Smart contract exploits, systemic stablecoin depegs and liquidity crunches, kidnappings, and much more happened last week. However, this edition focuses on the largest smart contract exploit this year - the Balancer hack.

On November 3, 2025, Balancer experienced a highly coordinated attack across seven chains. A bad actor exploited a subtle rounding error to steal more than $128M. There are plenty of excellent writeups on the exploit itself and you can find much more in the premium section below. Instead, I want to focus on something positive amid all of this destruction. The story of how the community, blockchain security companies, chain and protocol operators worked together with remarkable coordination to fight back against the attacker and in many instances win!

Here are just some of the incident response actions by Balancer and many affected chains and protocols:

  • Balancer paused affected pools, gauges, incentives across chains in 20min.

  • Stakewise executed emergency multisig to claw back $20.7M in osETH and osGNO tokens.

  • Monerium froze attacker’s 1.3M EURe.

  • Berachain quickly disabled affected pools while coordinating gradual shutdown of bridges and eventually halting the chain.

  • Sonic immediately froze* attacker’s addresses using a built-in safety mechanism.

  • Polygon chain started to sensor attackers’ addresses.

  • Gnosis chain partially halted canonical bridge.

*Simply freezing ERC20 transfers was not sufficient since attackers were able to bypass them with permit approvals.

Balancer responded within a twenty minute window by pausing pools. It slowed the attacker a bit, but they were still able to redeploy and continue a second wave almost an hour after the first attack. Protocols with centralized control over their tokens such as osETH, osGNO, and EURe were able to intervene and freeze specific stolen tokens. And that was when the nuclear option was activated. Multiple chains patched their validators to either censor the attacker’s transactions or halt their chain entirely. This level of control is normally frowned upon since the original Dao hack. However, these were exceptional measures for an exceptional scenario.

While the protocols were busy defending themselves, whitehats stepped in and began actively attacking the attacker:

  • Bitfinding bot frontran exploiter on Base chain to recover almost $1M.

  • A frontrunning bot operator on Berachain was able to intercept $12M worth of stolen funds and agreed to return funds.

  • Another frontrunning bot operator on Base returned $150K.

  • Yet another frontrunning bot operator on Arbitrum returned about $82K.

  • SEAL/Certora rescue operation recovered $4.1M across Ethereum, Optimism (Beets), Arbitrum chains a few days after the hack.

Just as the attacker was trying to execute their exploit on different chains, various financial and a dedicated defensive bots activated to immediately intercept $13M. In one case, a Bitfinding bot was able to deploy an exploit contract on Base minutes before the attacker. SEAL and Certora teamed up to execute a separate $4.1M rescue for the yet unexploited vulnerability in Balancer.

After the dust settled, almost $18M were intercepted or returned relative to the $128M stolen. A disastrous incident, yet it offers ideas for what worked or could work in the future.

  • Balancer had an emergency action script ready. If only it had triggered immediately after the first exploit on mainnet. There is an opportunity for projects to improve automation and perhaps err on the side of caution, pausing first and asking questions later.

  • Warrooms worked perfectly with chains, protocols, and security researchers all coordinating the best possible actions to slow the exploit and fight back. Protocols should regularly practice fictional warroom scenarios to build up their incident response muscle.

  • The real winners in this incident were the bots and Bitfinding’s bot in particular. Building dedicated defensive bots is truly the next frontier which is barely explored in our industry and yet already shows how effective it can be. The Berachain bot alone intercepted the majority of the attacker’s funds, an astounding $12.6M!

It is a dark day for the industry and Balancer in particular. But we will take time to patch ourselves up and most importantly learn valuable lessons from these incidents that will ultimately make the industry stronger and more resilient for the fights ahead.


Enjoy reading BlockThreat? Each edition takes more than ten hours of careful research and preparation every week. Consider sponsoring an upcoming issue or becoming a paid subscriber to unlock the premium section with detailed analyses of hacks, vulnerabilities, special reports, and a fully searchable newsletter archive.


In other news, a mistrial was declared in the case against Anton and James Peraire Bueno after the jury failed to reach a unanimous verdict and reported sleepless nights and crying. As you recall, the brothers used their validator to send a specially crafted block that exploited a vulnerability in a relay which tricked it into revealing normally hidden block transactions. They then used those transactions to sandwich other bots. The defense, and surprisingly Coin Center, chose to omit the small detail that a software flaw was exploited and instead framed the issue as nothing more than greedy MEV operators who should accept a bad trade. In other words, the classic Code is Law argument.

Unsurprisingly, all of this overwhelmed the jurors. Now we may end up with a legal precedent that could legitimize blockchain exploits. This is a case the entire industry should watch closely, since the wrong precedent could blur the line between fair trades and intentional exploitation in ways that would introduce significant long-term risks.

Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Contests

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

Balancer, Beets Finance, Beethoven X

Date: November 03, 2025
Attack Vector: Rounding Error
Impact: $128,640,000
Chain: Ethereum, Arbitrum, Base, Polygon, Sonic, Optimism, Berachain

Indicators:

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 44, 2025 Peter Kacherginsky
    Greetings!More than $11.2M were stolen this week across eleven incidents. Among the more notable exploits was the 0xc0ffee MEV bot hack which lost $218K due to an exposed uniswapV3SwapCallback method. These have been popping up a few times this year so be sure to check out Giovanni Di Siena’s article on hook security in the Research section on how to lock down these callbacks.Garden Finance lost almost $11M after one of its solvers was compromised and private keys stolen. The irony here is that
     

BlockThreat - Week 44, 2025

3 de Novembro de 2025, 19:18

Greetings!

More than $11.2M were stolen this week across eleven incidents. Among the more notable exploits was the 0xc0ffee MEV bot hack which lost $218K due to an exposed uniswapV3SwapCallback method. These have been popping up a few times this year so be sure to check out Giovanni Di Siena’s article on hook security in the Research section on how to lock down these callbacks.

Garden Finance lost almost $11M after one of its solvers was compromised and private keys stolen. The irony here is that Garden Finance was previously implicated as a laundering venue for multiple Lazarus-linked hacks like Bybit, SwissBorg, and others. In a classic moment of frontier justice, ZachXBT refused to offer any support and even discouraged attackers from returning any of the illicitly obtained funds.

Oh an be on a lookout for phishing emails from LastPass!


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Let’s dive into the news!

News

Crime

Phishing

Scams

  • House Of Cards by Rekt. A story of two stablecoins caught in the mutual backing loop. What could go wrong?

Malware

Media

Contests

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

VaultManager

Date: October 27, 2025
Attack Vector:
Impact: $3,710
Chain: Ethereum

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 43, 2025 Peter Kacherginsky
    Greetings!A relatively quiet week with under $1 million in losses is a welcome relief. Weeks like these often keep me up at night as calm often precedes big events, so let us hope that pattern does not repeat. To help you enjoy the lull, I have assembled a curated collection of research, with a focus on off-chain and multisig security, interviews with industry leaders, and the latest entries in the criminal chronicles.Paid subscribers will get the deep dives on the price oracle exploit at Sharwa
     

BlockThreat - Week 43, 2025

27 de Outubro de 2025, 11:02

Greetings!

A relatively quiet week with under $1 million in losses is a welcome relief. Weeks like these often keep me up at night as calm often precedes big events, so let us hope that pattern does not repeat. To help you enjoy the lull, I have assembled a curated collection of research, with a focus on off-chain and multisig security, interviews with industry leaders, and the latest entries in the criminal chronicles.

Paid subscribers will get the deep dives on the price oracle exploit at Sharwa Finance, the key compromise at Doodi Pals, and other incidents. I am also tracking an attacker probing older contracts across multiple chains, which has pulled a handful of five-figure wins here and there.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Let’s dive into the news!

Events

  • Ultimate Security Games by RareSkills. November 20, 2025. The Ultimate Security Games brings the world of smart contract auditing to the main stage turning web3 security into an esport.

News

Crime

Phishing

Scams

Malware

Media

Research

Tools

  • Ethereum Context Copilot - a purpose trained LLM on all aspects of Ethereum code, operations, bugs, etc.

  • Local Safe by Patrick Collins. A completely local version of Safe UI.

  • Solana VS Code Extension - security-focused development tools by Ackee.

  • Jetstreamer - a high-throughput Solana backfilling and research toolkit designed to stream historical chain data live over the network from Project Yellowstone’s Old Faithful archive, which is a comprehensive open source archive of all Solana blocks and transactions from genesis to the current tip of the chain.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

Sharwa Finance

Date: October 20, 2025
Attack Vector: Price Oracle Manipulation
Impact: $147,000 (Recovered $40,000)
Chain: Arbitrum

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 42, 2025 Peter Kacherginsky
    Greetings!Just a few hacks this week, but bad actors still managed to steal $3.7M. The biggest story, however, is the update on the largest hack in blockchain history the Lubian Miner. It appears the U.S. government managed to seize the stolen funds from the hack, which are now worth $15B. More details are in the news section below.In other news, the Code is Law documentary is going live. I had the chance to preview it recently, and it’s absolutely outstanding with an in-depth look at The DAO, I
     

BlockThreat - Week 42, 2025

23 de Outubro de 2025, 18:50

Greetings!

Just a few hacks this week, but bad actors still managed to steal $3.7M. The biggest story, however, is the update on the largest hack in blockchain history the Lubian Miner. It appears the U.S. government managed to seize the stolen funds from the hack, which are now worth $15B. More details are in the news section below.

In other news, the Code is Law documentary is going live. I had the chance to preview it recently, and it’s absolutely outstanding with an in-depth look at The DAO, Indexed Finance, KyberSwap, Mango Markets, and other landmark hacks where the “code is law” argument kept resurfacing. The film feels especially timely as the MEV bot hacking case from 2023 by two MIT brothers heads to trial, with the defendants reportedly planning to use the same defense to justify exploiting a privacy flaw in the Flashbots protocol and deceiving other MEV bots.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Let’s dive into the news!

Events

News

Crime

Policy

Phishing

Malware

Media

Contests

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

Xtradespro

Date: October 13, 2025
Attack Vector: Logic Error
Impact: $130,000
Chain: BSC

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 41, 2025 Peter Kacherginsky
    Greetings!More than $22M were stolen this week across 9 incidents. The majority of losses came from a single Hyperliquid user compromise which cost them $21M. A devastating loss and a continued trend of user attacks across the ecosystem.A more concerning event was an ecosystem-wide meltdown sparked by tariff panic. Binance was among the platforms affected when a relatively small $60M USDe sell-off caused its price feed to misreport values, triggering a chain reaction of forced liquidations acros
     

BlockThreat - Week 41, 2025

14 de Outubro de 2025, 14:42

Greetings!

More than $22M were stolen this week across 9 incidents. The majority of losses came from a single Hyperliquid user compromise which cost them $21M. A devastating loss and a continued trend of user attacks across the ecosystem.

A more concerning event was an ecosystem-wide meltdown sparked by tariff panic. Binance was among the platforms affected when a relatively small $60M USDe sell-off caused its price feed to misreport values, triggering a chain reaction of forced liquidations across collateral assets such as wBETH and BNSOL. The flawed oracle relied too heavily on Binance’s own orderbook without sufficient cross-exchange validation or time weighting, turning a localized price move into a $19B cascade of liquidations. Binance later compensated users for roughly $230M in losses, acknowledging that this was an internal systemic failure rather than user error.

We usually focus on security exploits, but market-wide incidents like these can be just as destructive when circuit breakers fail, prices are misreported, and traders are unfairly liquidated. It is a strong reminder that financial safeguards are just as critical as security controls, since their failure can just as easily destroy a protocol.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Let’s dive into the news!

News

Crime

Phishing

Malware

Media

Research


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

TokenHolder

Date: October 07, 2025
Attack Vector: Insufficient Function Access Control
Impact: $26,000
Chain: BSC

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 40, 2025 Peter Kacherginsky
    Greetings!Almost $5M were stolen this week across 6 incidents. On the DeFi side, Abracadabra suffered its third exploit which cost them $1.8M. It’s particularly unfortunate as the protocol did not practice defensive coding where a single missed else statement resulted in an unwanted state.Yet another mining pool exploitation surfaced and was discovered weeks after it happened. The centralized nature of pools, combined with their large routine transfers, often obscures signs of compromise. This t
     

BlockThreat - Week 40, 2025

13 de Outubro de 2025, 20:36

Greetings!

Almost $5M were stolen this week across 6 incidents. On the DeFi side, Abracadabra suffered its third exploit which cost them $1.8M. It’s particularly unfortunate as the protocol did not practice defensive coding where a single missed else statement resulted in an unwanted state.

Yet another mining pool exploitation surfaced and was discovered weeks after it happened. The centralized nature of pools, combined with their large routine transfers, often obscures signs of compromise. This time $24M vanished from SBI Crypto were only noticed a week later when stolen funds began flowing to the usual laundering targets. As a reminder, the massive $3.5B Lubian miner hack went undetected for nearly five years, raising the question of how many other CeFi breaches remain unknown.

One of the more interesting exploits this week was a vulnerable 7702 wallet where attackers were able to drain more than $300K. The contract had a an unprotected pancakeV3SwapCallback function which allowed anyone to ask for a “repayment” which is exactly what the attacker for a USDT.C token:

pancakeV3SwapCallback(366,671,873,699, -1, 0x96fb784986284cb6d4a8da6dd50dd7e85ef38f5d)

The exploit was simple and the damage limited, but it’s a warning shot. A single vulnerable smart wallet could one day trigger multimillion losses across the ecosystem. Be careful which 3rd party smart wallet contracts you trust.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

Unkn_dc8275

Date: September 29, 2025
Attack Vector: Bad Randomness
Impact: $143,000
Chain: Ethereum

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 39, 2025 Peter Kacherginsky
    Greetings!This week felt like a bucket of cold water after last week’s relative calm. More than $51M was stolen across 10 incidents, many of them entirely preventable had projects paid closer attention to the well known attack vectors that threat actors continue to exploit time and time again.The most severe incident this week was the multisig hijacking of UXLINK, where attackers stole a massive $44.4M after taking control of the project’s contracts across multiple chains. The multisig had been
     

BlockThreat - Week 39, 2025

29 de Setembro de 2025, 15:02

Greetings!

This week felt like a bucket of cold water after last week’s relative calm. More than $51M was stolen across 10 incidents, many of them entirely preventable had projects paid closer attention to the well known attack vectors that threat actors continue to exploit time and time again.

The most severe incident this week was the multisig hijacking of UXLINK, where attackers stole a massive $44.4M after taking control of the project’s contracts across multiple chains. The multisig had been configured with a 2/x threshold but lacked basic safeguards such as guardians, timelocks, or any kind of governance review process. On September 22, the attackers exploited this weak setup to reassign themselves as owners with a threshold of 1 and proceeded to pillage the protocol.

In an ironic twist, the attackers themselves later fell victim to an Inferno Drainer attack, losing 542M freshly stolen UXLINK. No honor among thieves, indeed.

Some critical lessons from the compromise:

  • Avoid weak thresholds. A 2/x setup is far too low. For anything beyond a few hundred thousand dollars, raise the threshold to at least 5/x.

  • Add timelocks. There’s no reason to allow immediate upgrades or parameter changes on multisigs. A multi-day timelock provides a critical buffer to detect and stop malicious activity.

  • Use guardians. Guardians serve as the last line of defense, even if all core developers are compromised and a malicious transaction is about to be executed.

Speaking of preventable hacks, Griffin AI fell victim to yet another LayerZero OFT hijack. If that sounds familiar, it’s because just two weeks ago Yala suffered the exact same fate where a temporary bridge deployment was configured with a malicious token.

Just because you aren’t paying attention to active attack vectors doesn’t mean attackers aren’t. They absolutely are and they will reuse the same techniques until projects finally close the door. So pretty please with a sugar on top, lock down your OFTs and don’t give attackers the keys to print money.

The premium portion of the newsletter contains detailed write ups and indicators for the remainder of 10 hacks this week including UXLINK, Griffin AI, Hyperdrive, Linea, Seedify, Ideal Protocol, dTrinity, Cool, and others.

Amid all these stories of hacks, it’s worth highlighting the unsung heroes and sponsors of this week’s edition - ChainPatrol. The good folks at ChainPatrol are doing simply amazing work protecting protocols’ brands, fighting the barrage of X phishing attacks, and quickly taking down scammers before they can do real damage.



Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


An important update about the newsletter. I will be adjusting the paid subscription rates to better support the ongoing research and time that goes into every issue. Starting next month, the premium tier will be increased to $99 per month or $999 per year. I’m deeply grateful to the sponsors and paid subscribers who have made it possible to keep this newsletter running for so many years.

Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Research

Tools

  • Introducing V12 by Zellic. An autonomous Solidity auditor designed to find critical bugs consistently and automatically.


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

UXLINK

Date: September 22, 2025
Attack Vector: Multisig Hijacking
Impact: $44,400,000
Chain: Arbitrum, Ethereum, BSC

Indicators:

Ethereum: 0x6385eb73faE34bF90Ed4c3d4c8aFBC957FF4121C
Ethereum: 0xeff9cefdedb2a34b9e9e371bda0bf8db8b7eb9a7
Ethereum: 0x7277c705b5b1963b602cb4e3ab8e188d925bed00
Ethereum: 0xac77b44a5f3acc54e3844a609fffd64f182ef931
Ethereum: 0x64ab9377a2b3bbb61dd79f8997e7f8c1cc1a4de8
Ethereum: 0x5210bfdf0cfe6471322d597d16cf440f5ac59309
Ethereum: 0x714dda349ef43326791f923e8389a21d11378c67
Ethereum: 0xd7aa2bd9e9407f682a379bed346088b0849b6434
Ethereum: 0xdde8cb0c5b05784093c9027519ba3d1f0326d303
Ethereum: 0xf35dde49a1bbe7a8883a8f35d48fb33c20a69b39
Ethereum: 0xa3ce95ac672b62ed75afbe6f50285c28ef717a44
Ethereum: 0x0313706aabffef64fa7168c1f272f4fc15bec8b1
Ethereum: 0x7e1f34418e2da204a8eabdb29eddf7c09a494a3f
Ethereum: 0xaade027d63ea859a4993961a8a8cc5aae3f020f3
Ethereum: 0x2ef43c1d0c88c071d242b6c2d0430e1751607b87
Ethereum: 0x000086ed37d35c731553fe7e85e6535d320d0000

References:

https://x.com/lookonchain/status/1970330298568319083
https://x.com/CyversAlerts/status/1970167036002132425
https://x.com/exvulsec/status/1970187483498553732
https://x.com/UXLINKofficial/status/1970181382107476362
https://x.com/UXLINKofficial/status/1970318681931669825
https://x.com/UXLINKofficial/status/1970323705856495980
https://x.com/P3b7_/status/1970209897129353546
https://x.com/tayvano_/status/1971296769167515992
https://research.blockscope.co/uxlink-exploit-analysis
https://rekt.news/uxlink-rekt

Phished:

https://x.com/realScamSniffer/status/1970322013597450609
https://x.com/evilcos/status/1970332831890248173
https://arbiscan.io/tx/0xa70674ccc9caa17d6efaf3f6fcbd5dec40011744c18a1057f391a822f11986ee
https://protos.com/uxlink-goes-from-bad-to-worse-to-weird-after-hacker-loses-stolen-tokens/

Exploit:

https://arbiscan.io/tx/0x35edac40767f65d4d1382f0f55cda2f4db321313e16fe059079f0113f9cb5696
https://etherscan.io/tx/0x618e914f8c0afccaaf9be2d502730aa9c89f6cb0cc63aa6e700ef7e1d659b093

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 38, 2025 Peter Kacherginsky
    Greetings!Over $3M was stolen across three incidents this week, a relative breather compared to last week’s ecosystem pillaging. Let’s take the moment to shore up our defenses, dive into a strong set of research articles, and highlight some positive news.A stage four cancer patient was drained of $32K after downloading a malicious Steam game. Fortunately, a group of security researchers noticed an absolutely appalling crime and got together to track down the malware operator, and enabled a promp
     

BlockThreat - Week 38, 2025

24 de Setembro de 2025, 15:06

Greetings!

Over $3M was stolen across three incidents this week, a relative breather compared to last week’s ecosystem pillaging. Let’s take the moment to shore up our defenses, dive into a strong set of research articles, and highlight some positive news.

A stage four cancer patient was drained of $32K after downloading a malicious Steam game. Fortunately, a group of security researchers noticed an absolutely appalling crime and got together to track down the malware operator, and enabled a prompt arrest with likely deportation. Interestingly, Valentin Lopez, aka “The Pope” has been linked to the same cryptocurrency theft ring behind the $230M crypto heist last year. Every single person who played a role in uncovering the crime, coordinating the investigation, and bringing the operator to justice deserves enormous respect and admiration. You are true heroes!

The big lesson here is to separate your banking/crypto machine from a daily driver where you play games and interact on social media.

Amid all these stories of hacks, it’s worth highlighting the unsung heroes and sponsors of this week’s edition - ChainPatrol. The good folks at ChainPatrol are doing simply amazing work protecting protocols’ brands, fighting the barrage of X phishing attacks, and quickly taking down scammers before they can do real damage.



Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


An important update about the newsletter. I will be adjusting the paid subscription rates to better support the ongoing research and time that goes into every issue. Starting next month, the premium tier will be increased to $99 per month or $999 per year. I’m deeply grateful to the sponsors and paid subscribers who have made it possible to keep this newsletter running for so many years.

In other news, happy 30th anniversary of the movie Hackers!

Let’s dive into the news!

News

Crime

Policy

Phishing

Malware

Media

Contests

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

LyraDepositWrapper

Date: September 16, 2025
Attack Vector: Function Parameter Validation
Impact: $1,000,000
Chain: Ethereum

Indicators:

Ethereum: 0x62005500af4cfb0077ac0090002f630055ba001d

References:

https://x.com/TenArmorAlert/status/1968138774551969874

Exploit:

https://etherscan.io/tx/0xc2bab117b6cb95e12c14eb57deb2cdd592370e2eb614e6d37502dea1480db0ba

Read more

  • ✇Blockchain Threat Intelligence
  • BlockThreat - Week 37, 2025 Peter Kacherginsky
    Greetings!This week was a bloodbath. More than $57.5M was stolen across nine incidents with breached custodial staking providers, hacked frontends, backdoored supply chains, phished of individuals, chain reorged, bridges exploited, and plenty of DeFi protocol drained. All elements of our ecosystem were hit in one of the worst weeks this year.But one exploit in particular could have caused losses in the billions were it not for an early discovery by the community. An NPM supply chain attack that
     

BlockThreat - Week 37, 2025

22 de Setembro de 2025, 18:05

Greetings!

This week was a bloodbath. More than $57.5M was stolen across nine incidents with breached custodial staking providers, hacked frontends, backdoored supply chains, phished of individuals, chain reorged, bridges exploited, and plenty of DeFi protocol drained. All elements of our ecosystem were hit in one of the worst weeks this year.

But one exploit in particular could have caused losses in the billions were it not for an early discovery by the community. An NPM supply chain attack that compromised several extremely popular packages (billions of downloads per week) allowed attackers to inject a backdoor designed to drain users’ wallets. By sheer luck and plenty of onchain mockery the attack was detected early enough and community mobilized which left attackers with under $1k in profit from what could easily have been a Safe/Bybit-scale exploit. The biggest takeaway is that they will be back. So please implement proper package freezing and review into your dev pipelines.

Speaking of near catastrophes, the massive $41.5M Kiln/SwissBorg compromise is a stark reminder of the risks of trusting a third-party managed treasury or staking provider. In general, it’s sensible to let professional teams manage assets; however, it does not absolve one of prudent monitoring and in depth discussions about what security controls can be added to minimize risk. Since the incident, Kiln initiated an exit of all of its Ethereum validators.

Another interesting exploit this week was the Yala LayerZero OFT bridge hijack, which took advantage of a temporary deployment that used a known “local key.” Attackers raced to configure a recently deployed bridge on Solana to a malicious OFT contract on Polygon and started minting legitimate $YU tokens.

The last but not least, mass bridge compromises are back with the $3M Shibarium Bridge hack. One positive outcome was that a large portion of the attackers’ funds were blacklisted or locked out. However, how do you compromise 10(!) of 12 signer keys unless they’re stored and managed in the same place defeating the whole point?

Amid all these stories of hacks, it’s worth highlighting the unsung heroes and sponsors of this week’s edition - ChainPatrol. The good folks at ChainPatrol are doing simply amazing work protecting protocols’ brands, fighting the barrage of X phishing attacks, and quickly taking down scammers before they can do real damage.



Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


An important update about the newsletter. I will be adjusting the paid subscription rates to better support the ongoing research and time that goes into every issue. Starting next month, the premium tier will be increased to $99 per month or $999 per year. I’m deeply grateful to the sponsors and paid subscribers who have made it possible to keep this newsletter running for so many years.

Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Research

Tools


Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.


Premium Content

The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.

Hacks

Kiln, SwissBorg

Date: September 08, 2025
Attack Vector: API Key Theft
Impact: $41,500,000
Chain: Solana

Indicators:

Solana: tyfwg3hvvxwms2kxek8cdujcsxeyks65eeqpd9p4mk1

References:

https://x.com/SolanaFloor/status/1965116689907089782
https://x.com/swissborg/status/1965123506477359471
https://x.com/CertiKAlert/status/1965122507687755803
https://x.com/shoucccc/status/1965126091334713838
https://swissborg.com/blog/joint-statement-kiln-x-swissborg-regarding-sol-incident
https://www.kiln.fi/post/kiln-responds-to-infrastructure-issue-with-validator-exit-funds-remain-protected
https://protos.com/swissborg-ceo-blames-41m-loss-on-staking-partner-kiln/
https://www.theblock.co/post/370141/kiln-exits-ethereum-validators
https://rekt.news/swissborg-rekt

Exploit:

https://solscan.io/tx/5DCPDEVrnVdM4jHgxYGtuuzvSubg15sSpkBCxexfuApRAfXEmNfokiTyj6bxE52QNGVbPnwm9L3YzcEoMHHEpLV

Read more

❌
❌