Decrypt0

105 posts

Decrypt0 banner
Decrypt0

Decrypt0

@decrypt0com

Security & risk advisory for centralized exchanges and Web3 infrastructure Focused on pre-listening readiness, operational controls, and trust-critical systems.

가입일 Kasım 2023
12 팔로잉103 팔로워
고정된 트윗
Decrypt0
Decrypt0@decrypt0com·
Most Web3 Projects get serious about security after hack ⚠️ We flip that, Your AI powered defence is here 🧵👇🏻 (1/3)
Decrypt0 tweet media
English
6
7
18
6.5K
Decrypt0
Decrypt0@decrypt0com·
@imcryptofreak Incidents like this are a reminder that security extends beyond smart contracts. A single compromised endpoint can expose the entire system.
English
0
0
0
3
Mayank Dudeja || SPYONGEMS
Mayank Dudeja || SPYONGEMS@imcryptofreak·
🚨 Bitrefill confirms major hack The platform says it was targeted in a cyberattack likely linked to North Korea’s Lazarus Group. • Some crypto hot wallets were drained • Around 18,500 user records accessed • Attack started via a compromised employee device Bitrefill says no full database breach, but partial user data was exposed. Another reminder: security risks in crypto are still real. 👀
Bitrefill@bitrefill

March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!

English
1
0
4
290
Decrypt0
Decrypt0@decrypt0com·
@SyotoshiX Crypto doesn’t forgive mistakes, it just remembers them. That’s the scary part.
English
0
0
1
7
SYOTOSHI
SYOTOSHI@SyotoshiX·
One small mistake in crypto can erase everything you saved up Not a hack. Not a rug. Just… you 🫵 We talk about exploits & rugs in the crypto space all the time But there’s a quieter, yet also common way people lose thousands and sometimes millions of $ 💸 And it usually starts with one tiny mistake years ago that can hunt you for the rest of your life • Forget a simple PIN • Lose a seed phrase • Throw away the wrong piece of paper Sounds stupid... until it happens to you There’s a guy who makes a living recovering lost hardware wallets @joegrand He just posted part 2 of his series to recover $75million dollars in lost crypto For some people, he literally gives them their life back: $200k recovered $1M+ found Retirement money restored People crying on calls But not every story ends like that. One wallet. ~$66M. He does everything right: Cracks the PIN Recovers the seed Opens the wallet Nothing. No balance. No history. Someone wiped it before he got there. Gone forever. No hack. No bad trade. Just one mistake. A very painful mistake. Keep your wallets safe folks. No backups = no second chances
English
19
28
46
421
Decrypt0
Decrypt0@decrypt0com·
@Crypto_Jargon We call this a user mistake, but honestly if one signature can wipe out $1.7M… something’s broken in how this is designed.
English
0
0
0
1
Crypto Jargon
Crypto Jargon@Crypto_Jargon·
Someone just lost $1,770,000 in USDC after signing a phishing approval on Ethereum. No hack. No exploit. Just one bad signature. Be careful what you sign.
Crypto Jargon tweet media
English
3
0
9
1.3K
Decrypt0
Decrypt0@decrypt0com·
I publish breakdowns like this every week. If you run a protocol or CEX and want to talk about your security posture — DMs are open. Follow for daily Web3 security intelligence 🔐
English
0
1
1
19
Decrypt0
Decrypt0@decrypt0com·
What a real pre-launch security process looks like: Audit that includes integrations Critical findings fixed before deployment On-chain monitoring live on day 1 Incident response plan tested Bug bounty live before mainnet This is the bar.
English
1
1
1
36
Decrypt0
Decrypt0@decrypt0com·
In 2025, $2.3B was lost to crypto exploits. I broke down every major incident. Here's what they had in common that no one is saying 🧵
Decrypt0 tweet media
English
1
2
2
39
Decrypt0 리트윗함
Xphere
Xphere@Xphere_official·
Security isn't optional. It's infrastructure. 🏗️🔐 New partnership unlocked. 🔐 XPHERE has signed an MOU with @decrypt0com — a leading Web3 security firm dedicated to protecting the decentralized ecosystem. Together, we're building a more secure foundation for Web3. 🛡️ #XPHERE #Decrypt0 #Web3Security #Web3
Xphere tweet media
English
468
110
383
54.3K
Decrypt0
Decrypt0@decrypt0com·
@Truunik @xerberus A perfect example of how DeFi exploits aren't always code bugs. Governance design, timelocks, and flash-loan resistance are just as critical as smart contract audits.
English
0
0
1
21
Truu🐻‍❄️
Truu🐻‍❄️@Truunik·
Before you deposit in any DAO: ✓ Is there a timelock on proposals? ✓ Is there a bug bounty? ✓ Is there flash loan protection? If you can't answer these, you're gambling. @Xerberus risk governance scores tell you before you deposit.
English
1
0
2
180
Truu🐻‍❄️
Truu🐻‍❄️@Truunik·
$182 million stolen in 13 seconds. Not through a smart contract bug. Not through a reentrancy attack. Through... governance. The Beanstalk exploit is the most elegant theft in DeFi history. Here's how it worked: 🧵
Truu🐻‍❄️ tweet media
English
2
0
6
557
Simplicity Group
Simplicity Group@SimplicityWeb3·
Please welcome @decrypt0com to the cohort! Decrypt0 provides operational security audits, Proof-of-Reserves readiness, and risk monitoring for centralised crypto exchanges and web3 platforms. $100K+ in contracted security engagements, a red-team for a regulated bank, and recognition from Apple, Google, Meta, and GitHub. Active PoR discussions with centralised exchanges and a 65K+ audience via HackWithPratik, the technical depth and distribution are already there.
Simplicity Group tweet media
English
2
2
8
240
Decrypt0
Decrypt0@decrypt0com·
@SimplicityWeb3 If you're a Web3 founder in the Simplicity ecosystem and want a quick security review or PoR readiness check, let's connect.
English
0
0
3
20
Decrypt0
Decrypt0@decrypt0com·
Honoured to join the @SimplicityWeb3 Accelerator with Decrypt0. We started Decrypt0 with a simple mission: help crypto exchanges and Web3 platforms identify security risks before attackers do. Over the past few months, we’ve been working on: • Operational security audits for CeX infrastructure • Proof-of-Reserves readiness and verification • Red-team and penetration testing for financial platforms Now we’re building "AGNI", an AI-powered cybersecurity agent designed to help security teams detect vulnerabilities faster across Web3 systems. Grateful to the Simplicity team and excited to collaborate with builders in the cohort. If you're building an exchange, DeFi protocol, or Web3 infrastructure, let's make sure security scales with you. #Web3Security #CryptoSecurity #BlockchainSecurity #CyberSecurity #ProofOfReserves #Web3 #StartupAcceleratorN
Simplicity Group@SimplicityWeb3

Please welcome @decrypt0com to the cohort! Decrypt0 provides operational security audits, Proof-of-Reserves readiness, and risk monitoring for centralised crypto exchanges and web3 platforms. $100K+ in contracted security engagements, a red-team for a regulated bank, and recognition from Apple, Google, Meta, and GitHub. Active PoR discussions with centralised exchanges and a 65K+ audience via HackWithPratik, the technical depth and distribution are already there.

English
1
3
7
95
Decrypt0
Decrypt0@decrypt0com·
Appreciate that. Pattern recognition across audits is where the real security insights emerge. Tools that encode audit learnings can definitely accelerate detection, especially for recurring issues like Oracle design flaws and economic attack surfaces. We're actually building something similar in spirit with "AGNI," focused on turning real audit intelligence into actionable security checks for DeFi and exchanges. First module launching soon. Curious to see how different approaches converge on solving the same problem.
English
0
0
1
5
Wake
Wake@WakeFramework·
@decrypt0com Impressive to comb through 60+ audits. Patterns at that scale reveal what isolated reviews miss. Wake's detectors encode findings from 200+ audits. Might speed up your workflow.
English
1
0
1
15
Decrypt0
Decrypt0@decrypt0com·
We've reviewed 60+ smart contract audits and 20+ CEX security assessments. Here's the single most common vulnerability that almost no one is talking about — a thread 🧵
English
2
2
6
103
Decrypt0
Decrypt0@decrypt0com·
Security check: Which layer does your exchange need to strengthen? Reply with a number (1–6). We'll share resources for the most common answer.
English
0
0
1
30
Decrypt0
Decrypt0@decrypt0com·
Layer 6: Bug Bounty Program Security researchers should be incentivized to report vulnerabilities. A well-structured bug bounty program strengthens the platform before attackers find weaknesses.
English
1
0
1
53
Decrypt0
Decrypt0@decrypt0com·
The 6-layer CEX security model most exchanges are missing. If you're reviewing the security of a centralized exchange, these are the layers you should check first. Save this thread: your security review starts here. 🧵
English
1
2
4
59