AegisWeb3

1.4K posts

AegisWeb3 banner
AegisWeb3

AegisWeb3

@AegisWeb3

AegisWeb3• A @PeckShield Formation| Guard your assets with multi-dimensional protection

FREE extension👉 Katılım Aralık 2022
458 Takip Edilen30.9K Takipçiler
Sabitlenmiş Tweet
AegisWeb3
AegisWeb3@AegisWeb3·
🎉 We are thrilled to announce the commencement of testing for our new feature - Anti-RugPull - designed to protect users' assets. The novel functionality serves as a safeguard, shielding users from falling victim to RugPulls. 👉🏼Learn more: aegisweb3.com/anti-rugpull.h… Users can configure Anti-RugPull settings for their tokens. We monitor on-chain information and take action when necessary. In the event of a rug pull, our contract automatically executes transactions to assist users in selling at higher prices and minimizing potential losses. Join us in testing and give some feedback. Your assets deserve the utmost protection, and we are here to provide it!🛡️ Stay tuned for updates and more exciting features to come! #AegisWeb3 #AntiRugPull #CryptoSecurity
English
17
173
247
129.8K
AegisWeb3
AegisWeb3@AegisWeb3·
🚨 CRITICAL: LiteLLM PyPI Supply Chain Attack The LiteLLM Python library has been compromised. If you ran pip install litellm, your environment may be at risk — crypto wallets, API keys, and other sensitive data could be exposed.
Andrej Karpathy@karpathy

Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.

English
1
1
1
1.7K
AegisWeb3
AegisWeb3@AegisWeb3·
🚨 URGENT: @Neutrl_xyz Frontend Possibly Compromised Team is looking into it. ⚠️ Until further notice: • DO NOT interact with the Neutrl website • REVOKE approvals for related & suspicious addresses immediately Stay safe. Don't wait. #DeFi #Crypto #SecurityAlert #HackAlert
Neutrl@Neutrl

We’re currently investigating a potential malicious event affecting the Neutrl front end. Our team is actively investigating. Out of an abundance of caution, please do not interact with the website until further updates are provided.

English
0
2
5
1.4K
AegisWeb3
AegisWeb3@AegisWeb3·
🚨 WARNING: Old @BinanceLabs Account Compromised! YZi Labs just issued an alert: The legacy account @BinanceLabs is showing suspicious activity. • UNFOLLOW the old account • DO NOT interact with any posts, links, or DMs from it Stay safe. #Crypto #ScamAlert #Security
YZi Labs@yzilabs

🚨 GM all, we’re detecting unusual activities from our legacy account @binancelabs. For your safety, please unfollow the old account and avoid interacting with any posts, links, or DMs from that handle. ✅ @yzilabs and @easyresidency remain fully secure and are your verified sources for all comms & updates from us on X. Your security is our top priority. Stay SAFU everyone.

English
1
1
1
1.2K
AegisWeb3
AegisWeb3@AegisWeb3·
A KOL @sillytuna violently extorted — $23.6M in aEthUSDC stolen.😱😱😱 • Stolen funds → converted to 20.34M $DAI • Smaller portion bridging to #Arbitrum etherscan.io/tokentxns?a=0x… Attackers are mixing through privacy coins now. ⏳
AegisWeb3 tweet mediaAegisWeb3 tweet media
English
1
1
3
1.2K
AegisWeb3
AegisWeb3@AegisWeb3·
Another one. $388K drained in seconds. 💸 A victim just lost 388,038 USDT after signing a malicious approval. 🔗 Tx: etherscan.io/tx/0xa256154c2… 🚨 Always verify the source and purpose of any signature requests. Stay vigilant to protect your assets! #CryptoSecurity #Phishing
AegisWeb3 tweet mediaAegisWeb3 tweet media
English
1
0
1
921
AegisWeb3
AegisWeb3@AegisWeb3·
🚨 BREAKING: ZachXBT Drops Major Insider Trading Exposé on Feb 26 🕵️‍♂️ The legendary on-chain detective just teased what might be his biggest investigation yet—targeting employees at one of crypto's most profitable companies for long-term insider trading.
ZachXBT@zachxbt

NEW: Major investigation dropping February 26 on one of crypto’s most profitable businesses where multiple employees abused internal data to insider trade over a prolonged period of time.

English
0
0
0
492
AegisWeb3
AegisWeb3@AegisWeb3·
Predictable. They rugged $Animals and immediately spun up the next one. 🧵⛓️ Scammer swept 9,814 SOL (~$799K) into: solscan.io/account/GzYXYe… Then from a fresh wallet? Launched $HORSE. Then rugged one hour later. solscan.io/token/7sw6chiw… #RugPull #ScamAlert #Solana
AegisWeb3 tweet mediaAegisWeb3 tweet media
AegisWeb3@AegisWeb3

🚨 Scam Alert: $Animals — Same Rug Pull Factory as $Horse & $VC ⚠️ A new token called $Animals just popped up, and the on-chain fingerprints are obvious. 🔍 Here’s the link: solscan.io/token/98uAmduq…

English
2
0
1
1.1K
AegisWeb3
AegisWeb3@AegisWeb3·
Same initial funding source as previously rugged scam tokens $Horse and $VC Same cluster of wash-trading wallets spoofing volume and pumping price Both $Horse and $VC already rugged
AegisWeb3 tweet mediaAegisWeb3 tweet mediaAegisWeb3 tweet mediaAegisWeb3 tweet media
English
1
0
0
134
AegisWeb3
AegisWeb3@AegisWeb3·
🚨 Scam Alert: $Animals — Same Rug Pull Factory as $Horse & $VC ⚠️ A new token called $Animals just popped up, and the on-chain fingerprints are obvious. 🔍 Here’s the link: solscan.io/token/98uAmduq…
AegisWeb3 tweet media
English
2
1
2
1.5K
AegisWeb3 retweetledi
PeckShieldAlert
PeckShieldAlert@PeckShieldAlert·
#PeckShieldAlert In Jan. 2026, the crypto space saw 16 hacks totaling $86.01M in losses, representing a slight 1.42% YoY decrease compared to Jan. 2025 ($87.25M) but a notable 13.25% MoM surge from Dec. 2025 ($75.95M). Meanwhile, #phishing remains staggering with losses exceeding $300M. #Top5 Hacks: @StepFinance_: $28.9M @truebitprotocol: $26.4M #SwapNet: $13.3M @Sagaxyz__: $7M @makinafi: $4.13M ($2.7M recovered)
PeckShieldAlert tweet media
English
12
14
61
11.7K
AegisWeb3
AegisWeb3@AegisWeb3·
Partial Funds Recovered in @makinafi Exploit Approximately 920 ETH (of 1,023 ETH received) has been recovered, representing a significant portion of the total ~1,299 ETH exploit. etherscan.io/address/0xc22f… #CryptoSecurity #FundRecovery #DeFi #Ethereum
AegisWeb3 tweet mediaAegisWeb3 tweet media
Makina@makinafi

Jan 22, 2026, 13:15 UTC: Funds held by the MEV builder have been returned net of a 10% bounty awarded under the SEAL Whitehat Safe Harbor. This represents approximately 920 ETH of the 1,023 ETH received by the MEV builder, out of a total exploit amount of roughly 1,299 ETH. This is a very positive step toward recovery. etherscan.io/tx/0x0d23fea54… Recovered funds have been transferred to a dedicated recovery multi-sig: 0xc22F7346eaF4340f51513bF9f01e5d722E558AB9 Our priority remains to actively pursue recovery of the additional funds. We will announce the distribution method and timeline for any recovered funds as soon as practical. We are still working at establishing contact with 0x573Db3Aed219EfD4D2cDABC0D00366E7B80F910E, the @Rocket_Pool Validator that received approximately 276 ETH as a result of the exploit. If you possess any information on how to get in direct contact with this person/entity then please direct a message through official channels to the Makina Team or email us as security@makina.finance. This remains an ongoing process and additional updates will be shared as more information becomes available. Special thanks to the MEV builder (0xbed) for being prompt in communication and helping those affected in the DUSD/USDC Curve pool exploit.

English
0
1
3
879
AegisWeb3 retweetledi
PeckShieldAlert
PeckShieldAlert@PeckShieldAlert·
#PeckShieldAlert 2025 has witnessed a record-breaking year for crypto-related theft, driven primarily by systemic vulnerabilities in centralized infrastructure and a strategic shift toward targeted social engineering. The total loss in 2025 exceeded $4.04B, reflecting a ~34.2% increase 📈 from the $3.01B stolen in 2024. The breakdown includes: 📍$2.67B from crypto hacks (~24.2% YoY increase) 📍$1.37B from scams (~64.2% YoY increase) Notably, ~$334.9M worth of stolen crypto was recovered or frozen, compared to $488.5M in 2024.
PeckShieldAlert tweet media
English
14
31
90
38.2K
AegisWeb3
AegisWeb3@AegisWeb3·
🚨 Security Incident PMX’s Polycule bot was exploited due to a vulnerability, resulting in user fund losses. The root cause has been identified, and the team states that only ~$230K of user funds were affected. Impacted users on Polygon will be fully compensated.
PMX@pmx_trade

Update: Only $230k in user funds were affected. Patches and audits will be live by the weekend. Until then, the bot will be offline. Once the bot is online, affected users will see their balances return to pre-hack levels.

English
1
1
2
469