Ethereum exploits. Learn the key lessons from this ETH hack.

Ethereum exploits. In this paper, we propose a cross Sep 28, 2021 · Immunefi — A Guide to Reproducing Ethereum Exploits: Fei Protocol There are also some great video tutorials on youtube for using Hardhat. Reentrancy attacks highlighted critical smart contract flaws, prompting blockchain projects to prioritize security and code audits. But what exactly is MEV, and how do these mev bot work? In this blog post, we will dive deep into the concept of Miner Extractable Value (MEV), the strategies employed by various types of mev bot Sep 8, 2025 · Connect met Like-minded Crypto Enthusiasts! Connect op Discord! Check onze Discord Phishing-aanvallen op Ethereum-gebruikers namen in augustus flink toe. Jul 3, 2025 · The core idea behind Quimera is to use feedback-driven exploit generation for Ethereum smart contracts, leveraging LLMs and Foundry traces. Anton Peraire-Bueno, 24, and James Peraire-Bueno, 28, allegedly stole $25 million in crypt… May 15, 2024 · Through the Exploit, which is believed to be the very first of its kind, ANTON PERAIRE-BUENO and JAMES PERAIRE-BUENO manipulated and tampered with the process and protocols by which transactions are validated and added to the Ethereum blockchain. Dec 3, 2024 · Discover today's top 10 smart contract security vulnerabilities and effective mitigations to protect your digital agreements from financial and operational risks. Sep 4, 2025 · Hackers use Ethereum smart contracts to hide malware in NPM packages, launching a stealthy crypto-themed supply chain attack. May 11, 2025 · Ethereum’s latest network upgrade, Pectra, introduced powerful new features aimed at improving scalability and smart account functionality — but it also opened a dangerous new attack vector that could allow hackers to drain funds from user wallets using only an offchain signature. Aug 20, 2017 · Exploits, hacks, phishing and Ponzi The common cybercrimes on Ethereum can be categorized into four categories: exploits, hacks, phishing and Ponzi schemes. One might ask themselves what the benefits of doing this might be - especially as the hacks are already documented through post mortems. May 16, 2024 · Two brothers accused of stealing $25 million worth of crypto The heist took just 12 minutes to execute, prosecutors claim. To put Jun 13, 2023 · Ethereum “hard fork” and the community response In response to the DAO Hack and the subsequent loss of funds, the Ethereum community faced a critical decision on how to address the situation. This focus and the role of Sep 8, 2025 · There was a sharp rise in phishing scams involving cryptocurrency during August, with losses exceeding $12 million as hackers began to leverage Ethereum EIP-7702-based exploits. May 15, 2024 · Two brothers have been charged with wire fraud for manipulating transactions for their own benefit on the Ethereum blockchain. - ETH Vulnerabilities and Exploits Jul 24, 2025 · Two MIT-educated brothers accused of orchestrating the largest MEV bot exploitation in cryptocurrency history will face trial after a federal judge their attempts to dismiss fraud and money laundering charges. Jul 9, 2025 · GMX has reportedly suffered a suspected exploit, with over $42 million drained from its vaults and transferred from Arbitrum to Ethereum, according to DeBank. Oct 27, 2021 · Cream Finance Exploited in Flash Loan Attack Netting Over $100M An attacker has gained over $130 million of assets in an exploit that appears to have drained Cream’s coffers. This decision ultimately led to a significant event known as the Ethereum hard fork. We perform a large-scale analysis of all 38,757 unique Ethereum contracts, 815 out of which our tool finds working exploits for--completely automated. Explore top picks, features, and strategies for smarter decentralized investing. Bybit CEO Ben Zhou immediately shared news Jul 10, 2025 · Discover the full list of crypto hacks in 2025, from scams and exploits to vulnerabilities. Dec 26, 2024 · Blockchain Protocol: Ethereum Exploit Amount: $197 Million Platform Type: Lending Protocol In March 2023, Euler Finance suffered the largest flash loan attack in history, with a whopping $197 million stolen. Learn about the biggest flash loan attacks to date in our guide. " U. Ethereum is the most targeted network Ethereum and BNB Chain were again the most targeted networks, accounting for 60% of April's losses onchain. Jun 2, 2025 · Wintermute warns that Ethereum's Pectra upgrade may open the door to auto-theft risks via EIP-7702 smart wallets. This evolution Mar 10, 2025 · Ethereum’s Pectra upgrade hit an exploit on Sepolia, leading to empty block mining due to a deposit contract bug. May 16, 2024 · Two brothers alleged stole $25 million from the Ethereum blockchain after exploiting a flaw in a popular cryptocurrency software. Numerous Sep 2, 2025 · The exploit technique has matured rapidly since Ethereum’s Pectra upgrade launched May 7, with over 97% of EIP-7702 delegations linked to identical wallet-draining contracts designed to automatically sweep funds. S. Oct 31, 2024 · The crypto industry lost a further $55. Aug 25, 2023 · Dive into blockchain security with Klever: understand vulnerabilities and historical breaches, and learn how to safeguard your digital assets. Sep 15, 2025 · Hacker Exploits Bitcoin-based Yala Protocol’s Yu Token on Polygon The hacker minted 120 million YU tokens on Polygon and swapped 7. Sep 2, 2025 · Hackers are using Ethereum's EIP-7702 upgrade to steal WLFI tokens through pre-planted malicious contracts in compromised wallets. No, not this one … but like this one. For instance, during a successful attack on the Coindash ICO in 2017, a modification to the Coindash Ethereum address made victims send their Ether to the hacker’s address. Mar 22, 2020 · A list of trusted Roblox exploits. May 25, 2025 · Inferno Drainer, a known phishing group, is leveraging Ethereum’s EIP-7702 to silently drain wallets. However, despite risks, trading volumes remain high, boosted by a new partnership with Alt5 Sigma May 18, 2021 · Two Ethereum security researchers -- Hubert Ritzdorf and Matthias Egli -- teamed up with one of the authors behind the paper; Daniel Perez, and 'weaponized' an exploit which they submitted to the Ethereum bug bounty in. Losses from crypto phishing schemes soared past $12 million in August, fueled by new exploits targeting Ethereum’s EIP-7702 standard. Ethereum heavily extends the way consensus proto-cols handle transactions: While Bitcoin allows to specify simple checks that are to be performed when processing a transaction, Ethereum allows these rules to be specified in a Turing-complete language. The total profit for the attacker across three blockchains (Ethereum, Base, and BSC) is approximately $1 million USD. The attacker targeted Euler’s DonateToReserve function, creating a token imbalance that allowed them to misrepresent their collateral. Sep 2, 2025 · Explore common Ethereum exploits and learn essential security best practices to protect your assets in the evolving blockchain landscape. 5M Infini exploit shook the Ethereum ecosystem, exposing critical vulnerabilities in DeFi protocols. Jul 31, 2022 · TL;DR On February 02, 2022 at 5:58 PM +UTC, a malicious actor launched multiple attacks aiming to bypass the verification process of the Wormhole bridge on Solana. The malicious ttackers used a delegated MetaMask wallet and batch authorizations to steal $150,000. charges that they carried out a cutting-edge scheme to exploit the Ethereum blockchain's Sep 2, 2025 · The post WLFI – How Ethereum’s EIP-7702 exploit sparked investor panic appeared on BitcoinEthereumNews. First, it creates a private key d Sep 3, 2025 · According to Cointelegraph, threat actors have developed a sophisticated method to deliver malicious software through Ethereum smart contracts, circumventing traditional security scans. Department of Justice has learned how to make sense of extremely complex blockchain attacks and track down their perpetrators. This attack used the reentrancy exploit to compromise a DAO (decentralized autonomous organization Sep 13, 2025 · OpenAI’s latest update to ChatGPT was meant to make the AI assistant more useful by connecting it directly to apps like Gmail, Calendar, and Notion. Reorgs and finality delays were explored for attackers with increasing proportions of the total staked ether. 5 million across 15 hacks in April, with Ethereum, BNB Chain, and Base among the hardest hit. As a consequence, security exploits and attacks on Ethereum are most typically directed at acquiring ownership of Ether by initiating a transfer from the target’s wallet to the adversary’s. It generates addresses in parallel by exploiting GPU power with OpenCL through a simple algorithm. 7 million with USDC on Ethereum and Solana. Hackers can exploit this vulnerability by sending specifically crafted addresses to potential victims. The attacker carried out the second-largest crypto theft from a DeFi protocol ever, which resulted in the loss of roughly 120,000 Wormhole Ethereum (WeETH) worth over $320M. May 16, 2024 · Anton and James Peraire-Bueno could face up to 20 years in prison if proven guilty of netting $25M worth of tokens using MEV-Boost, a move that they have allegedly planned since December 2022. Sep 4, 2025 · Hackers are now exploiting vulnerabilities in widely-used NPM coding libraries to inject malware into Ethereum smart contracts, according to cybersecurity research by blockchain compliance firm Reversing Labs (RL). Ethereum Unveils 'Lean Ethereum' Initiative for Long-Term Resilience Ethereum's 10th anniversary has sparked a bold new vision for the network's future. A project building a set of repositories reconstructing selected Ethereum vulnerabilities and exploits. 4 billion from Bybit. The attackers infiltrated the ecosystem using malicious npm packages, exfiltrating sensitive data such as private keys, mnemonics and configuration files Mar 10, 2025 · An unknown attacker disrupted Ethereum’s Pectra upgrade on Sepolia, causing empty blocks and forcing a quick fix. 1 day ago · The attacker behind the Shibarium Bridge exploit has completed the sale of all BAD tokens, swapping them for Ethereum in a final move. Key Takeaway World Liberty Financial (WLFI), the token backed by Donald Trump, is facing serious security threats due to phishing exploits linked to Ethereum’s EIP-7702 upgrade. Jan 6, 2025 · A supply chain attack targeting key components of the Ethereum development ecosystem has affected the Nomic Foundation and Hardhat platforms. 5 million at the time. Jun 17, 2016 · An attack has been found and exploited in the DAO, and the attacker is currently in the process of draining the ether contained in the DAO into a child DAO. Sophisticated Exploit: The brothers exploited the Ethereum blockchain’s transaction validation protocols, controlling and altering pending transactions to divert funds within 12 Jul 19, 2017 · Summary Analysis of the major exploits that took place on Ethereum Each exploit has a more detailed analysis in its own folder, with the vulnerabilities of the contract (s), the addresses involved and the exploit itself with the transactions the hacker made to exploit the contract. Aug 15, 2018 · We develop a generic definition of vulnerable contracts and use this to build TEETHER, a tool that allows creating an exploit for a contract given only its binary bytecode. The Penpie team, Pendle Finance, and other security partners exchanged messages. Feb 2, 2022 · Wormhole, one of the most popular bridges linking the ethereum and solana blockchains, lost about $320 million in an apparent hack Wednesday afternoon. Feb 26, 2025 · On February 21, 2025, Bybit, one of the world’s largest cryptocurrency exchanges, suffered an unprecedented cyberattack, resulting in the theft of approximately USD 1. Launched in 2015, the Ethereum blockchain builds on the decentralized and distributed architecture of Bitcoin. Essentially, the tool provides iterative feedback to an LLM to help it construct smart contract exploits in Solidity, mimicking how a real security researcher would approach the task. ETHPLOIT adopts static taint analysis to generate exploit-targeted transaction sequences, a dynamic seed strategy to pass hard constraints and an instrumented Ethereum Virtual Machine to simulate blockchain behaviors. Aug 21, 2025 · Discover why the Radiant Capital hack Ethereum incident amplified stolen funds to $95 million. Ethereum edged BNB Chain, suffering five versus four individual attacks, respectively. Oct 13, 2023 · Welcome to the fascinating world of mev bots! In the ever-evolving cryptocurrency landscape, mev bots have emerged as an innovative way to exploit profitable opportunities on the Ethereum blockchain. We perform a large-scale analysis of all 38,757 unique Ethereum contracts, 815 out of which our tool finds working exploits for—completely automated. Learn the key lessons from this ETH hack. Explore the exploit, its impact on DeFi security, and Ethereum's role. 5 billion in Ethereum at the hands of what’s believed to be, North Korea’s Lazarus Group. Prior works have explored automated exploit generation for vulnerable Ethereum contracts. However, by introducing smart contracts — which support an ecosystem of decentralized applications (dApps) — Ethereum expands well beyond Bitcoin’s core functionality as a payments Etherscan allows you to explore and search the Ethereum blockchain for transactions, addresses, tokens, prices and other activities taking place on Ethereum (ETH) Apr 30, 2025 · Funds stolen from the KiloEx and ZKsync exploits were both later recovered, Immunefi noted. Sep 2, 2025 · The post WLFI – How Ethereum’s EIP-7702 exploit sparked investor panic appeared on BitcoinEthereumNews. Smart contracts, just like other computer programs, are prone to a variety of vulnerabilities, which lead to severe consequences including massive token and coin losses. May 15, 2024 · Prosecutors allege the two used highly specialised skills that they learned at "one of the most prestigious universities in the world" to exploit Ethereum's process for validating transactions. CeFi platforms remained unaffected. ChainSwap froze its Ethereum-Binance Smart Chain bridge while it investigated. Aug 5, 2022 · The exploit also affected Antimatter, Optionroom, Umbrellabank, Nord, Razor, Peri, Unido, Oro, Vortex, Blank, and Unifarm tokens. Aug 29, 2025 · Discover how Ethereum treasuries empower companies with financial flexibility and innovation. A Sharp Rise in Crypto Phishing Abstract—Smart contracts, just like other computer programs, are prone to a variety of vulnerabilities, which lead to severe consequences including massive token and coin losses. Learn how to prevent future exploits. Apr 24, 2025 · ZKsync Hacker Accepts Bounty, Returns Nearly $5M in Stolen Crypto Ethereum Layer-2 project ZKsync confirms resolution after exploit drains millions from airdrop contract; final report pending. Volgens data van securitybedrijven raakten meer dan 15. Nov 7, 2024 · The DAO hack of 2016 exposed critical vulnerabilities in Ethereum’s smart contract code. Feb 24, 2025 · Ethereum was the hardest-hit crypto asset in the exploit as per Nansen data Bybit has launched a recovery campaign in hopes of getting back the stolen funds Demos Find exploit and execute it Scan a smart contract, find exploits, exploit it: Start Ganache as our local Ethereum node Deploy the vulnerable contract (happens in a different window) Scan for exploits Run exploit Our paper teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts was published at the 27th USENIX Security Symposium (Usenix Security 18) (slides, video). This was on October 4, 2019. Ethereum’s hard fork created Ethereum (ETH) and Ethereum Classic (ETC), dividing the community over immutability. May 15, 2024 · Two brothers have been arrested by the U. com. 1 million in October due to exploits — down 56. This event now stands as the largest exploit on record, surpassing previous high-profile exchange breaches and raising serious concerns about the increasing sophistication of cybercriminals. Scam Sniffer Apr 15, 2025 · Ethereum (ETH) Layer-2 scaling solution ZKsync has suffered a significant exploit, resulting in the loss of $5 million worth of ZK tokens. The aim is to build a vulnerable smart contract using solidity, an exploit contract and a truffle test suit with test cases written in javascript to verify, the vulnerability can be exploited successfully and mitigations placed are thwarting the attack. Zelfs grote Feb 18, 2021 · This is the start of a new series called “Replaying Ethereum Hacks” where we take a closer look at past Ethereum exploits and end up re-implementing the attacks. 9 million. Aug 22, 2025 · The DAO was a decentralized autonomous organization on the Ethereum blockchain that suffered a source code vulnerability now known as The DAO hack. The Ethereum Improvement Proposal EIP-7702, part of the Pectra upgrade introduced earlier this year, is drawing scrutiny across the crypto industry after numerous exploits have been observed on chain. 5 ETH ($106,200), prompting server migrations and security upgrades. Under the Pectra u… Flashbots’ Hasu discusses the recent MEV Boost exploit, emphasizing the ongoing MEV challenges and the need for decentralized solutions. Hackers maakten daarbij gebruik van een kwetsbaarheid in de nieuwe EIP-7702-standaard. " Then there was "Unblinding the block," followed by "The Search," and ultimately "The Propagation. The two largest hacks following Bybit were the $71 million Phemex heist in January and the $49. To overcome the problems, we design and implement ETH-PLOIT, a smart contract exploit generator based on fuzzing. Last week’s Bybit exploit was the biggest crypto hack in history. Sep 30, 2022 · Profanity is an Ethereum vanity address generation tool. Criminals Lazarus targeted the centralized exchange and took control of an Ethereum cold wallet during a routine transfer operation. Why it matters: It shows the U. Mar 6, 2025 · Wallet provider Safe said that a developer's laptop was compromised ahead of the exploit used to swipe $1. Find out more on our website. May 7, 2025 · DeFi protocols lost $92. Jul 19, 2017 · Analysis of the major exploits that took place on the Ethereum blockchain - jeanbemeo/ethereum-exploits Jun 2, 2025 · Ethereum’s Pectra upgrade faces security issues as attackers exploit EIP-7702, draining $150K from wallets using malicious smart contracts. Pendle halted its Ethereum platform at 6:45 PM UTC in order to stop additional losses, and shortly after, identical measures were implemented on Arbitrum. Jan 17, 2025 · The top three biggest Web3 hacks of 2024 included the $305 million DMM Bitcoin exploit, the $290 million PlayDapp breach, and the $235 million WazirX attack. We evaluate ETHPLOIT on 45,308 smart contracts and discovered May 15, 2024 · Authorities with the United States Department of Justice have unsealed an indictment alleging that two individuals stole $25 million in cryptocurrency in a scheme that “exploit[ed] the very . Feb 28, 2023 · A comprehensive and updated timeline of the recorded and documented Decentralized Finance (DeFi) exploits. Mar 6, 2024 · To contain the damage caused by the exploit, the INR and crypto withdrawals have been temporarily paused. May 22, 2024 · In a landmark legal case, two brothers were charged with fraudulently draining funds from MEV bots on Ethereum, and this is how they allegedly did it. Jun 5, 2025 · Summary Ethereum has the potential to serve as the framework for a new decentralized Internet. Jan 10, 2025 · Threat actors are employing a new tactic called "transaction simulation spoofing" to steal crypto, with one attack successfully stealing 143. The campaigns, active Aug 31, 2022 · Reentrancy attacks, like the one used in The DAO hack, are made possible by vulnerabilities in the way we structure Solidity code. charges that they carried out a cutting-edge scheme to exploit the Ethereum blockchain’s May 17, 2024 · First there was "The Bait. However, despite risks, trading volumes remain high, boosted by a new partnership with Alt5 Sigma Sep 4, 2025 · A recent cybersecurity incident has revealed how attackers combined blockchain technology with traditional software repositories to execute a supply chain attack. Get the full breakdown of April 2025 exploits. Reveals Fraud Charges This story originally appeared on Coindesk Aug 13, 2025 · OKX United States - Discover how the $49. However, the scopes of prior works are limited in both vulnerability types and contract platforms. Jul 15, 2025 · Over $476M has been stolen in approval hacks since 2020. The attack is a recursive calling vulnerability, where an attacker called the “split” function, and then calls the split function recursively inside of the split, thereby collecting ether many times over in a single transaction. The exploiter’s address involved in the exploit is reportedly funded by Tornado Cash. This makes Ethereum the number one platform for so-called smart contracts. Dive into real-world flash loan exploits like PancakeBunny & Cream Finance. Aug 6, 2025 · SentinelLABS has exposed a sophisticated series of cryptocurrency scams where threat actors distribute malicious smart contracts masquerading as automated trading bots, resulting in the drainage of user wallets exceeding $900,000 USD. May 15, 2024 · Brothers Accused of $25M Ethereum Exploit as U. GitHub Gist: instantly share code, notes, and snippets. Mar 19, 2025 · A hacker exploited AI crypto bot AIXBT’s dashboard to steal 55. 35 billion stolen. Last week, Bybit suffered a loss of $1. Learn about notable incidents, including Cetus, and how to protect your digital assets. We recommend you to read the submission in full, it's a well-written report. prosecutors detailed an incredibly complicated Ethereum exploit Aug 13, 2025 · OKX - Discover how the $49. Department of Justice for attacking the Ethereum blockchain and stealing $25 million of cryptocurrency during a 12-second exploit, according to an Mar 19, 2024 · If we step back from social engineering, malicious software, and phishing attempts, there is one particular type of hack that has been at the core of numerous private key exploits: brute force Apr 18, 2022 · Ethereum-based stablecoin "Bean," from the Beanstalk Farms DeFi platform, proved not-so-stable this week as an attacker exploited code in a flash loan contract to siphon off around $182 in value. Reveals Fraud Charges The alleged 12-second attack related to the controversial practice known as MEV, or maximal extractable value. According to Scam Sniffer, more than 15,000 users were affected last month—a 67% increase compared to July. Jun 2, 2025 · Concerns continue to mount over Ethereum’s latest protocol upgrade as security risks attract malicious actors aiming to drain user wallets. 6% month-over-month — according to Immunefi. The Ethereum Virtual Machine (EVM) is quasi-Turing complete, and though it is therefore capable of a variety of functions, its most common uses involve financial instruments. Click to read more. Despite their potential, the security of smart contracts remains a critical concern due to their immutability and transparency, which expose them to malicious actors. 4 days ago · A high-value Ethereum wallet lost $6M in a phishing attack, showing how attackers exploit gas-free approvals to steal staked ETH and wrapped tokens. Dive into The Coin Bureau's guide for insights on the top corporate holders of ETH. Ethereum futures traders saw mass liquidations, with $76 million wiped out in four hours Jun 25, 2016 · A closer look into the DAO attack, what happened when The DAO collapsed and why it's important for the press to get the story right. Each of these incidents stemmed from vulnerabilities in access control mechanisms. Jul 9, 2025 · This guide will teach you all about common vulnerabilities in Solidity. Feb 2, 2022 · Blockchain Bridge Wormhole Suffers Possible Exploit Worth Over $326M The popular bridge for connecting Ethereum, Solana and more is now attempting to negotiate on-chain with the hacker. The core function responsible for exfiltration, transmit(), encrypts the private key and sends it within an Ethereum transaction. You'll first solidify your understanding of smart contract security in theory, then examine specific Solidity vulnerabilities and how to fix them to keep your smart contracts safe. The articles will cover basic principles and advanced techniques, such as testing security properties, proving invariants, analyzing multi-contract systems and auto-looting ETH from vulnerable contracts on the Ethereum network. May 16, 2024 · Read more: Brothers Accused of $25M Ethereum Exploit as U. Check if you are affected. May 16, 2024 · Key Takeaways: Landmark Legal Action: Anton Peraire-Bueno and James Pepaire-Bueno face charges including wire fraud and money laundering for manipulating Ethereum’s blockchain, leading to a $25 million theft. Apr 2, 2025 · Aside from that, CertiK analyzed 197 hacking incidents in Q1, 98 of which occurred on Ethereum. May 16, 2024 · In an indictment, U. Jul 9, 2025 · Crypto Exchange GMX Drained of Bitcoin, Ethereum in $40 Million Exploit GMX has offered the attacker a 10% "white-hat" bounty after some $40 million worth of assets were swiped from the crypto protocol. Two npm packages hide downloader commands via Ethereum smart contracts; uploaded July 2025; targeting crypto developers. Sep 14, 2025 · Public blockchains, like Ethereum, further complicate the issue of securing smart contracts. The Aug 16, 2025 · The stolen assets were swiftly laundered into wrapped Ether, demonstrating the persistent challenges of fund recovery in blockchain exploits. prosecutors detailed the incredibly complicated Ethereum exploit – in which attackers targeted the controversial area of "maximal extractable value," known as MEV. As a result of the hack, Bitcoin dipped below $95,000, and Ethereum dropped to $2,641, as market volatility soared. Mar 18, 2025 · Let's dive into the world of Ethereum MEV and explore how block producers exploit DeFi transactions, impacting decentralization and network fairness. 4 billion drained from its wallets. Jul 21, 2025 · Flash loan attacks exploit vulnerabilities in DeFi protocols, resulting in staggering losses. Feb 21, 2025 · The world's second-largest crypto exchange Bybit suffered an exploit Friday that saw it drained of about $1. May 15, 2024 · Two brothers who studied at the Massachusetts Institute of Technology were arrested on Wednesday on U. Sep 10, 2025 · Kiln Exits Ethereum Validators in ‘Orderly’ Move Following SwissBorg Exploit Kiln described the ETH validator exits as a precautionary step to safeguard client assets in the wake of the Jun 7, 2021 · A Guide to Reproducing Ethereum Exploits: Fei Protocol This guide, written by whitehat Lucash-dev for Immunefi, will help you set up a local environment and reproduce the Fei Protocol exploit … Feb 12, 2025 · Decentralized money lender zkLend suffered a breach where threat actors exploited a smart contract flaw to steal 3,600 Ethereum, worth $9. 2 days ago · Discover the best DeFi platforms of 2025 to maximize your crypto returns. 5 We develop a generic definition of vulnerable contracts and use this to build teEther, a tool that allows creating an exploit for a contract given only its binary bytecode. 4 billion worth of Ethereum and staked ether. Mar 26, 2024 · Munchables, an NFT game built on Ethereum layer 2 network Blast, suffered a $62 million exploit. Dec 2, 2024 · Smart contracts are self-executing programs on blockchain platforms like Ethereum, which have revolutionized decentralized finance by enabling trustless transactions and the operation of decentralized applications. 5 billion in Ethereum tokens. Feb 24, 2025 · Biggest crypto hack The Infini hack comes on the heels of the biggest exploit in the crypto market. To obfuscate the stolen funds trail, the exploiter has transferred stolen assets to multiple addresses before swapping them for Ethereum (ETH) using Sep 8, 2025 · Crypto phishing surges 72% as EIP-7702 exploits drain funds, hitting whales and users with major losses - IcoHolder. Sep 3, 2025 · A malicious campaign targeting developers through npm and GitHub repositories has been uncovered, featuring an unusual method of using Ethereum smart contracts to conceal command-and-control (C2) infrastructure. Learn defensive Solidity patterns like TWAP oracles and reentrancy guards to prevent DEX hacks. These scams leverage obfuscated Solidity code deployed on platforms like the Remix Solidity Compiler, targeting Ethereum-based ecosystems. Apr 9, 2025 · A MEV bot lost $180,000 in Ethereum after exploiting a vulnerability, highlighting the need for better access control in crypto bots. Feb 12, 2025 · This page explored some of the ways attackers might attempt to exploit Ethereum’s proof-of-stake consensus protocol. May 16, 2024 · Two brothers who studied at the Massachusetts Institute of Technology were arrested on Wednesday on U. This is a valid objection, but I still think it’s very valuable for these reasons: To learn Nov 13, 2018 · In this article I explain how to use Mythril to find and exploit security bugs in Ethereum smart contracts. The campaign first came to light in early July when ReversingLabs researcher Karlo Zanki Feb 21, 2025 · Bybit has suffered the largest hack in cryptocurrency history, with $1. Jun 8, 2021 · This guide, written by whitehat Lucash-dev for Immunefi, will help you set up a local environment and reproduce the Fei Protocol exploit described in the bug fix postmortem here, so that you can get up to speed on setting up a proper tooling environment for finding bugs and claiming the Dec 28, 2023 · Ethereum protocols accounted for the majority of DeFi hacks in 2023, resulting in $1. Dec 30, 2024 · On December 29, 2024 at 5:00 AM UTC, the FEG token bridge system was exploited, which permitted the attacker to withdraw FEG tokens from the bridge contract without depositing them in the source chain. 45 Ethereum, worth approximately $460,000. Mar 10, 2025 · Ethereum's Pectra upgrade faced a setback on the Sepolia testnet because of an exploit that resulted in empty block mining. In this paper, we propose Apr 28, 2023 · Boring Security takes you through the Ethereum network's most common exploits and scams, plus the best security practices to avoid them. Mar 7, 2025 · The malicious code embeds an attacker-controlled RSA public key and Ethereum wallet address, which are used for encrypting and transmitting the stolen private keys. 000 wallets samen ruim $12 miljoen kwijt, een stijging van 72% ten opzichte van juli. Deployed contract code usually cannot be changed to patch security flaws, while assets stolen from smart contracts are extremely difficult to track and mostly irrecoverable due to immutability. This marks a shift in phishing tactics as scammers begin integrating new features into their May 15, 2024 · Through the Exploit, which is believed to be the very first of its kind, Anton Peraire-Bueno and James Pepaire-Bueno manipulated and tampered with the process and protocols by which transactions are validated and added to the Ethereum blockchain. Feb 27, 2025 · It added that losses in February were 20x more than they were in January, when hackers got away with $73. May 15, 2024 · What the DOJ’s First MEV Lawsuit Means for Ethereum In a highly technical overview of an exploit that has since been patched, government prosecutors find that exploiting code is a crime New reports reveal that an on-chain investigator has raised allegations connecting Ethereum founder Vitalik Buterin to the Gatecoin hack in 2016. In this blog, we will explore one of the most infamous Solidity hacks of all time, which happened in the formative years of Ethereum smart contract development. biy rkdn nvyln urcf xfsuc gdhz uvatd swugnpwlb rpukcpg zjyur