In orbit accident I was wondering how keys compromised. This is post-mortem:
https://medium.com/orbit-chain/official-statement-regarding-orbit-bridge-exploit-551928f3dc52
And MIM hack analysis
https://x.com/kankodu/status/1752581744803680680?s=61
@EthSecurity1
https://medium.com/orbit-chain/official-statement-regarding-orbit-bridge-exploit-551928f3dc52
And MIM hack analysis
https://x.com/kankodu/status/1752581744803680680?s=61
@EthSecurity1
Medium
Official Statement Regarding โOrbit Bridge Exploitโ
Hello, Orbit Chain Community.
๐ฅ4
Forwarded from Investigations by ZachXBT
It appears a Ripple insider was hacked for ~213M XRP ($112.5M)
Source address
rJNLz3A1qPKfWCtJLPhmMZAfBkutC2Qojm
So far the stolen funds have been laundered through MEXC, Gate, Binance, Kraken, OKX, HTX, HitBTC, etc
Update: Confirmation of the hack from Chris Larsen (Ripple Co-Founder & Executive Chairman)
Theft addresses
rGhR13XyM43WdDaSMznHd5rZ4cJatybvEg
rHQVKntyfkDCPhEBL2ctryuEAkDZgckmmV
rLsUemhuBZtF44rqqzneb2F9JgyrRYYd4t
rKPERax7t9iFvT3RHXn5nifyNpzp9a4hBa
rpjs4HLX1gJoEenH69PsQmXaXY22QhCYAT
rLRhugR4ysNa2xkt4E6fKN8krs9jatCp6w
rnCyeUNvfDbtTagGEPjBfTCBz6EqJjf2Uj
rHVjfYzTaB8MzSoQGqpzH9barZr85QsZW7
Source address
rJNLz3A1qPKfWCtJLPhmMZAfBkutC2Qojm
So far the stolen funds have been laundered through MEXC, Gate, Binance, Kraken, OKX, HTX, HitBTC, etc
Update: Confirmation of the hack from Chris Larsen (Ripple Co-Founder & Executive Chairman)
Theft addresses
rGhR13XyM43WdDaSMznHd5rZ4cJatybvEg
rHQVKntyfkDCPhEBL2ctryuEAkDZgckmmV
rLsUemhuBZtF44rqqzneb2F9JgyrRYYd4t
rKPERax7t9iFvT3RHXn5nifyNpzp9a4hBa
rpjs4HLX1gJoEenH69PsQmXaXY22QhCYAT
rLRhugR4ysNa2xkt4E6fKN8krs9jatCp6w
rnCyeUNvfDbtTagGEPjBfTCBz6EqJjf2Uj
rHVjfYzTaB8MzSoQGqpzH9barZr85QsZW7
๐3๐คฏ2
Forwarded from Crypto Goodreads
Vitalik wrote about risks of restaking in this article from May 2023.
Good to take a step back sometimes and look at the safety too
๐
https://vitalik.eth.limo/general/2023/05/21/dont_overload.html
Good to take a step back sometimes and look at the safety too
๐
https://vitalik.eth.limo/general/2023/05/21/dont_overload.html
Warpcast is strange! Get approves account keys onchain and store eth keys on it's server :(
Eth keys : hold asset(EOA)
@Ethsecurity1
Eth keys : hold asset(EOA)
@Ethsecurity1
๐10๐คฌ2
- PlayDapp Heist: Attackers minted 200M PLA tokens, valuing a massive $31M loss. A significant portion, $5.9M worth, found its way to the Gate platform. The exploit was due to a security vulnerability. @EthSecurity1
๐ฅ3๐2๐ฑ2
considering Blast as clone of optimism ToB found only 1 Low on Blast, when Spearbit found 6 Crit, 6 H, 11 M and 14 L https://github.com/trailofbits/publications/blob/master/reviews/2024-01-metalayerblast-securityreview.pdf
https://github.com/spearbit/portfolio/blob/master/pdfs/report-blast-contracts-review-draft.pdf
Blast source code deep dive:
https://twitter.com/jarrodWattsDev/status/1727584394796323042?s=20
@EthSecurity1
https://github.com/spearbit/portfolio/blob/master/pdfs/report-blast-contracts-review-draft.pdf
Blast source code deep dive:
https://twitter.com/jarrodWattsDev/status/1727584394796323042?s=20
@EthSecurity1
GitHub
publications/reviews/2024-01-metalayerblast-securityreview.pdf at master ยท trailofbits/publications
Publications from Trail of Bits. Contribute to trailofbits/publications development by creating an account on GitHub.
๐9
#Scam
1- Create Github PR with scam massage
2- Tag targets
3- Scam message will be emailed to targets from Github
@Ethsecurity1
1- Create Github PR with scam massage
2- Tag targets
3- Scam message will be emailed to targets from Github
@Ethsecurity1
๐5
Affine Defi Hack explained https://medium.com/@0kage/hack-series-deep-dive-chapter-2-affine-da2d7b0bbefd and POC: https://github.com/0kage-eth/hacks-poc-database/blob/main/test/02-AffineExploit0224.t.sol Plonky2x Audit Report https://hackmd.io/qS36EcIASx6Gt_2uNwlK4A @EthSecurity1
Medium
0Kage Diaries Chapter 2 โ Affine
Disclaimer: The opinions expressed here are solely my own and do not reflect the views or opinions of organizations I am affiliated withโฆ
๐ฅ3
Seneca Protocol has a critical approval exploit (open external call). $6m+ lost so far across eth/arb ADDRESSES TO REVOKE: 0xbc83f2711d0749d7454e4a9d53d8594df0377c05 (MAINNET)
0x2d99e1116e73110b88c468189aa6af8bb4675ec9 (ARBITRUM)
NOTE: contract was pausable but written in internal functions there is no way to call them.
@EthSecurity1
0x2d99e1116e73110b88c468189aa6af8bb4675ec9 (ARBITRUM)
NOTE: contract was pausable but written in internal functions there is no way to call them.
@EthSecurity1
๐จ4๐ฅ1๐1
the "EVM from scratch" book. https://evm-from-scratch.xyz/intro.html ZK proofs ELI5. A fun way to understand circuits and even play with them directly in your browser. eli5.zksync.io @EthSecurity1
โค6๐1
why TWAP oracle is unsuitable for the vast majority of DeFi use case https://smartcontentpublication.medium.com/twap-oracles-vs-chainlink-price-feeds-a-comparative-analysis-8155a3483cbd @EthSecurity1
Medium
TWAP Oracles vs. Chainlink Price Feeds: A Comparative Analysis
The announcement of Uniswap V3 has given rise to various questions regarding how Uniswapโs Time Weighted Average Price (TWAP) oraclesโฆ
๐ฅ4
some smartcontract Red Flags: -out of scope vulnerability -more comments than code -require(msg.sender == tx.origin); -Lot of typos => Lot of Criticals -Itโs a minimal proxy but deployed straight from the command line with injected state. -Over complicated -Most of it being admin restricted -Uniswap v2 with 0 min amount -NO Test -safeMath & Division you can add too @EthSecurity1
โค10๐ฅ3๐ฏ2
WOOFi
got taken for a $8.5 Million ride, after a flash loan attack on Arbitrum.
The attacker exploited Woofiโs novel oracle design and low liquidity.
https://rekt.news/woo-rekt/ @EthSecurity1
got taken for a $8.5 Million ride, after a flash loan attack on Arbitrum.
The attacker exploited Woofiโs novel oracle design and low liquidity.
https://rekt.news/woo-rekt/ @EthSecurity1
rekt
Rekt - Woofi - Rekt
DeFi / Crypto - WooFi got taken for a $8.5 Million ride on March 5th, after a flash loan attack on Arbitrum.
Happy noroz and new year 2583 achaemenid
To all kurdish and persians
To all kurdish and persians
โค4๐พ4๐ฅ3๐3๐คฌ1๐คฎ1
Munchables keys on Blast was compromised. 62 m$ lost but Blast controls the bridge. attacker address : https://blastscan.io/address/0x6e8836f050a315611208a5cd7e228701563d09c5 @EthSecurity1
Blast Mainnet Network Explorer
Munchables Exploiter | Address: 0x6e8836f0...1563d09c5 | Blastscan
Address (EOA) | Balance: $1.19 across 1 Chain | Transactions: 20 | As at Nov-29-2025 10:24:00 AM (UTC)
Forwarded from Vladimir S. | Officer's Channel (officercia)
๐โ๏ธ unizen_io, a crypto exchange and trading platform, experienced a security breach on March 8 that resulted in the loss of more than $2.1 million.
The attack technique involved authorizing a trading aggregator running on the Ethereum ( $ETH ) blockchain network. The hacker exploited an open external challenge vulnerability in the contract.
Detailed analysis: https://x.com/amlbothq/status/1770102963521867916
#offtopic #security #investigations
The attack technique involved authorizing a trading aggregator running on the Ethereum ( $ETH ) blockchain network. The hacker exploited an open external challenge vulnerability in the contract.
Detailed analysis: https://x.com/amlbothq/status/1770102963521867916
#offtopic #security #investigations
X (formerly Twitter)
AMLBot (@AMLBotHQ) on X
Detailed visualization ๐๐
https://t.co/5wzgFYBymE
https://t.co/5wzgFYBymE
๐ฏ4๐1
1)Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators 2)Another Solidity Attack Vectors https://github.com/Quillhash/Solidity-Attack-Vectors @EthSecurity1
arXiv.org
Understanding Rug Pulls: An In-Depth Behavioral Analysis of...
The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an...
๐ฅ4
Prisma Hack post-mortem https://hackmd.io/@PrismaRisk/PostMortem0328 @EthSecurity
๐2โค1๐ค1
A 5y/o Explanation of Ethereum Validation https://mirror.xyz/0xffE49cEe81e8CCa632C000588278eD9c3FeFf205/J0z2S06q7DdFYE6X9TXqjTKCEOBIfbSQSr-olXJbXD8 List of eigenlayer Risks https://x.com/hanni_abu/status/1742976353660531177?s=20 Emerging web3 attack vector: Restake Farming https://x.com/blockaid_/status/1752847514393522260?s=20 @EthSecurity1
๐3