unilend exploited 197.6 $k. https://etherscan.io/tx/0x44037ffc0993327176975e08789b71c1058318f48ddeff25890a577d6555b6ba @EthSecurity1
π7
- Blockchain Bribing Attacks and the Efficacy of Counterincentives. - Undetectable Selfish Mining
- Bribe & Fork: Cheap Bribing Attacks via Forking Threat
- Optimism superchain audit report
@EthSecurity1
- Bribe & Fork: Cheap Bribing Attacks via Forking Threat
- Optimism superchain audit report
@EthSecurity1
arXiv.org
Blockchain Bribing Attacks and the Efficacy of Counterincentives
We analyze bribing attacks in Proof-of-Stake distributed ledgers from a game theoretic perspective. In bribing attacks, an adversary offers participants a reward in exchange for instructing them...
π8
odosprotocol on ETH and Base, hacked for ~$50k . The root cause is arbitrary call vulnerability. attack tx: https://app.blocksec.com/explorer/tx/base/0xd10faa5b33ddb501b1dc6430896c966048271f2510ff9ed681dd6d510c5df9f6 @EthSecurity1
π₯3π1
- Generating unit tests from broken stateful invariant tests - The Fuzzing Book: Tools and Techniques for Generating Software Tests @EthSecurity1
Substack
Generating unit tests from broken stateful invariant tests
In this post, we analyze different solutions to generate unit tests from broken stateful invariant tests
π4
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
DeepSeek has been hacked: all of their data in the public domain - secret keys, unencrypted chats, logs, and even the backend.
Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fully open, allowing anyone to obtain access.
I cannot confirm or deny their conclusions at this time. But I think it's interesting enough news to share: x.com/officer_cia/status/1884740598579540060
#ai #news #security
Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fully open, allowing anyone to obtain access.
I cannot confirm or deny their conclusions at this time. But I think it's interesting enough news to share: x.com/officer_cia/status/1884740598579540060
#ai #news #security
π₯6β€1π1
Vladimir S. | Officer's Channel
DeepSeek has been hacked: all of their data in the public domain - secret keys, unencrypted chats, logs, and even the backend. Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fullyβ¦
1 Million Deepseek Data Breach
DeepSeek AI Data Breach Exposes Over 1 Million Logs and Sensitive Secrets - Chinese AI startup DeepSeek left a database exposed online, leaking over 1 million log lines, chat histories, API keys, and sensitive backend details
Seems service had backdoor
@EthSecurity1
DeepSeek AI Data Breach Exposes Over 1 Million Logs and Sensitive Secrets - Chinese AI startup DeepSeek left a database exposed online, leaking over 1 million log lines, chat histories, API keys, and sensitive backend details
Seems service had backdoor
@EthSecurity1
- Uniswap V4: Hooks Security Considerations
- kyberswap hacker arrested - crypto losses in janurary 2025 @EthSecurity1
- kyberswap hacker arrested - crypto losses in janurary 2025 @EthSecurity1
Certik
Uniswap V4: Hooks Security Considerations - CertiK
This article discusses some of the new features of Uniswap V4, and explores the security considerations related to Uniswap V4 hooks.
β€12
New Patrick Collins course
https://m.youtube.com/watch?v=nWsLw_1OpE0&pp=ygUMRnJlZWNvZGVjYW1w
@EthSecurity1
https://m.youtube.com/watch?v=nWsLw_1OpE0&pp=ygUMRnJlZWNvZGVjYW1w
@EthSecurity1
YouTube
Vyper and Python Smart Contracts on Blockchain β Full Course for Beginners
If you're interested in learning how to write software that runs on a blockchain distributed ledger database, this comprehensive course will teach you everything from scratch using Python and Vyper, even if you're a complete beginner.
The course will enableβ¦
The course will enableβ¦
π₯7
250 LBTC hacked form ionicmoney. why? because ionic listed fake LBTC on mode chain
Thus, the attacker can call mint() with fabricated inputs and pass the check. @EthSecurity1
Thus, the attacker can call mint() with fabricated inputs and pass the check. @EthSecurity1
π€―8π2π±1
Web3 Security Auditor's 2024 Rewind - The Highlights https://blog.openzeppelin.com/web3-security-auditors-2024-rewind @EthSecurity1
π7
Zklend been hacked for ~3600 ETH on starknet @EthSecurity1
π€¬14π₯3β‘1
ZKlend Hack rootcause: The attacker manipulated the "lending_accumulator" to be very large at 4.069297906051644020, then took advantage of the rounding error during ztoken mint() and withdraw() to repeatedly deposit 4.069297906051644021 wstETH getting 2 wei then withdraw 4.069297906051644020*1.5 -1 = 6.103946859077466029 wstETH to expend just 1 wei. @EthSecurity1
π13
an issue found by zellic in the Cairo VM during a recent audit of Starknet OS.
This bug has been fixed as an immediate patch to Starknet's current version 0.13.3.
https://community.starknet.io/t/remediating-a-potential-sequencer-prover-inconsistency-in-the-cairo-vm/115313
@EthSecurity1
This bug has been fixed as an immediate patch to Starknet's current version 0.13.3.
https://community.starknet.io/t/remediating-a-potential-sequencer-prover-inconsistency-in-the-cairo-vm/115313
@EthSecurity1
Starknet Community Forum
Remediating a potential sequencer-prover inconsistency in the Cairo VM
This post presents the disclosure process of a subtle issue in the Cairo VM which was discovered during the Starknet OS audit. The transaction execution in SN is done in 2 phases: Sequencing and proving. During a Starknet OS audit done by @fcremo from @Zellic_ioβ¦
π6β€2
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
SlowMist founder: we discovered that the hacker who attacked zkLend has a close connection to the hacker who attacked EraLend in July 2023, and we suspect they are the same person: x.com/officer_cia/status/1890132436589445291?12
#security #privacy #investigation
#security #privacy #investigation
X (formerly Twitter)
Vladimir S. | Officer's Notes (@officer_secret) on X
. @SlowMist_Team founder @evilcos : we discovered that the hacker who attacked @zkLend has a close connection to the hacker who attacked @Era_Lend in July 2023, and we suspect they are the same person.
π₯7π3π1
Urgent Update for Geth Users!
Attention validators! If you are running Geth v1.15.1, upgrade to v1.15.2 immediately to prevent potential financial loss! @EthSecurity1
Attention validators! If you are running Geth v1.15.1, upgrade to v1.15.2 immediately to prevent potential financial loss! @EthSecurity1
β‘5π₯2
π5π€―5
If you are running LND older than 0.18.5 and/or LITD older than 0.14.1, upgrade immediately. Apparently, affected Lightning nodes can be completely drained by attackers. #Bitcoin @EthSecurity1
π3
the Lazarus hackers first found the targeted employees through social engineering, added private GitHub repository access to the victims or victimized employees through live chat tools, and tricked the users into running the code that contained the backdoor.
π§΅
https://x.com/im23pds/status/1892767073605931065?s=61
High level Attack flow
https://x.com/dhkleung/status/1893073663391604753?s=61
@EthSecurity1
π§΅
https://x.com/im23pds/status/1892767073605931065?s=61
High level Attack flow
https://x.com/dhkleung/status/1893073663391604753?s=61
@EthSecurity1
X (formerly Twitter)
23pds (ε±±ε₯) (@im23pds) on X
π§Lazarus Hacker, i know you can see my X posting, I've caught you on the trail and we'll be posting a related tracking article disclosing the details of this attack. @SlowMist_Team @evilcos
π«‘10π€―2