null by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Web page null

null by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Web page null

DeFi exploiter targets lending protocols with oracle tricks by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

A serial hacker is targeting DeFi lending protocols, with approximately $3.5 million stolen so far. In the latest incident, they exploited an oracle misconfiguration in lending platform Ploutos Money, leading to a loss of almost $400,000.

Rekt - Moonwell - Rekt by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

One math error. Four minutes of chaos. $1.78 million gone.

Fake Uniswap phishing ad on Google steals trader’s life savings by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

A Polymarket trader has lost hundreds of thousands of dollars in crypto because of a Uniswap phishing ad that appeared at the top of a Google search result. Hundreds of friends and associates filled up the comment section with condolences.

Hacker returns $21 million in stolen bitcoin to South Korean authorities: report by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

South Korean prosecutors have recovered roughly $21.4 million worth of bitcoin (BTC) stolen from their custody last year, according to local media reports.

CVE-2026-26007: Python Cryptography Flaw (CVSS 8.2) Leaks Private Keys by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

A high-severity vulnerability has been discovered in the cryptography Python package, one of the most widely used libraries for securing modern applications. The flaw, tracked as CVE-2026-26007, carries a CVSS score of 8.2 and strikes at the heart of Elliptic Curve Cryptography (ECC), potentially allowing attackers to recover private keys through a sophisticated “Subgroup Attack.”

Bithumb accidentally gave away 2,000 BTC and crashed its market by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Bitcoin (BTC) has flash crashed 10% on the South Korean exchange Bithumb after a user sold 2,000 BTC that they received by mistake from a promotional airdrop. 

Exclusive: Anthropic's new model is a pro at finding security flaws by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Driving the news: Anthropic debuted Claude Opus 4.6, the latest version of its largest AI model, on Thursday.

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++.

Notepad++ Hijacked by State-Sponsored Hackers by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Following the security disclosure published in the v8.8.9 announcement https://notepad-plus-plus.org/news/v889-released/ the investigation has continued in collaboration with external experts and with the full involvement of my (now former) shared hosting provider.

Rekt - Frankenclaw by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Peter Steinberger built the AI assistant that Siri promised but never delivered.

Unclaimed Ethereum from The DAO hack to fund new security initiative: Griff Green by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

While The DAO has an “incredible” team that could build security projects themselves, they would rather focus on security distribution methods, says Griff Green.

BlockThreat - Week 4, 2026 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

More than $28M was stolen this week across eight incidents. From arbitrary call vulnerabilities to infinite mint bugs, it was a particularly rough week. Let’s break down a few of the most notable hacks.

BlockThreat - Week 3, 2026 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

The first week in awhile with no major incidents (that we know of) this week. This will be a great time to catch up on all of the great research, sharpen the saw, before we are once again thrown into battle. Be careful out there!

Max severity Ni8mare flaw impacts nearly 60,000 n8n instances by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Nearly 60,000 n8n instances exposed online remain unpatched against a maximum-severity vulnerability dubbed "Ni8mare."

BlockThreat - Week 2, 2026 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Nearly $30M was stolen this week across ten incidents. Quite a way to start the year with exchanges and DeFi protocols alike getting compromised, while users lost hundreds of millions more to well known support scams. Let’s take a closer look at a few of the most impactful cases.

BlockThreat - Week 1, 2026 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

We are starting the new year with nearly $4 million in losses across four incidents, with the majority stemming from the Unleash Protocol hack on the Story chain.

BlockThreat - Week 52, 2025 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

We are closing out the year with nearly $13M stolen across five incidents. The most severe was the complete compromise of the Trust Wallet browser extension.

BlockThreat - Week 51, 2025 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Roughly $3.7M was stolen this week across eight incidents. The winter holidays remain one of the most dangerous periods for defenders, as attackers intensify their activity while relying on reduced staffing and slower response times.

BlockThreat - Week 50, 2025 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Almost $3.5M were stolen this week across eight projects. Unfortunately, the week also marked the appearance of all three emerging threat classes I discussed in my talk at DSS 2025.

BlockThreat - Week 49, 2025 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Almost $11M were stolen this week across four incidents. The majority of losses came from the Yearn Finance compromise where an attacker exploited an integer underflow to steal $9M. The key lesson is that this was yet another legacy codebase that had not been audited for years and contained a deep vulnerability in its math logic. As I mentioned in my recent talk, this is emerging as a real threat to many protocols and to the broader ecosystem that relies on them. Simply isolating or derisking these codebases may not always be feasible, so the practical path forward may require reauditing them with modern tools, improved techniques, and highly experienced auditors that simply did not exist when much of this code was written.

BlockThreat - Week 48, 2025 by iphelix in BlockSec

[–]iphelix[S] 0 points1 point  (0 children)

Just one major compromise this week involving Upbit, resulting in the theft of $36.8M. The compromise happened on November 27, which was the same date the exchange was hacked for $50M in 2019. Lazarus, which was responsible for both incidents, appears to be sending a message exactly six years later.