Solana’s Investigation Indicates Wallet Exploit Tied to Slope Mobile App

Following the Solana wallet attack, the Solana Status team updated the public and detailed that the wallet addresses affected by the breach were tied to Slope mobile wallet applications. The team further stressed that “there is no evidence the Solana protocol or its cryptography was compromised.” Solana Status Report Says Affected Addresses Were at One … Read more

Hacker Selling 1 Billion Chinese Citizens’ Data for 10 BTC, Zuckerberg’s Meta Ends Novi Project, and More — Bitcoin.com News Week in Review

In this week’s bite-sized digest of the hottest stories from Bitcoin.com News, a hacker claims to have stolen a massive amount of Chinese citizens’ personal data from Shanghai police, and now wants to sell it for ten bitcoins. Also, Mark Zuckerberg’s Meta has ditched the Novi project, after unveiling a new metaverse wallet. These stories … Read more

Crema Finance Hacker Negotiates With Defi Project’s Team, Returns $8 Million in ETH and SOL

Following the hack on July 2, 2022, the team behind the decentralized finance (defi) protocol Crema Finance detailed that after some negotiation, the hacker returned roughly $8 million in crypto assets. According to the team, the hacker agreed to take a white hat bounty worth 45,455 solana. Hacker Returns $8 Million in Crypto to Crema … Read more

Hacker bungles DeFi exploit: Leaves stolen $1M in contract set to self destruct

A hacker apparently so thrilled by a successful theft left behind over $1 million in a smart contract that was set to destruct, permanently ensuring the crypto could never be moved. Go to Source Powered by WPeMatico

Attacker Hacks Arbitrum’s Treasure DAO for Over 100 NFTs by Leveraging Marketplace Exploit

A non-fungible token market platform built on top of Arbitrum called Treasure DAO was hacked on March 3 at 7:33 a.m. (EST), according to a post mortem analysis authored by the security-focused firm Certik. The company’s report notes that “over 100 NFTs were stolen in the attack,” as the attacker leveraged a vulnerability in the … Read more