Elad Ernst

659 posts

Elad Ernst banner
Elad Ernst

Elad Ernst

@EladErnst

Cyber Security Researcher at @blockaid_

תל אביב Katılım Temmuz 2019
438 Takip Edilen824 Takipçiler
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨 Community alert: Blockaid's exploit detection system has identified an on-going exploit on the @veruscoin Verus-Ethereum Bridge (verus.io). ~$11.58M drained so far. More details in🧵
English
17
44
194
76.8K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨Community alert: Thorchain was likely exploited on Bitcoin, Ethereum, BSC, Base for $10M+. Exploiter addresses bc1ql4u94klk265lnfur2ujk9p6uh52f2a8jhf6f37 0x82fc0d5150f3548027e971ec04c065f3c93154eb 0xd477b69551f49C0519F9B18c55030676138890Bd More details in🧵
English
10
33
132
18.7K
Elad Ernst retweetledi
Idobn
Idobn@idobn·
Since December, @Blockaid_ has seen security incidents surge from a handful a month to several a day. The driver? AI. Threat actors are using AI to find and execute exploits faster than ever, at a fraction of the cost and skill it once required.
Idobn tweet media
English
2
8
32
2.7K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨 Community Alert! @ShapeShift FOX Colony (Colony Network) drained for ~$132.7K USDC + FOX on Arbitrum. More details in🧵
English
3
18
58
7.4K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
Introducing Blockaid's Risk Exposure: A real-time onchain compliance solution that lets organizations monitor addresses, transactions, and act the moment they're exposed to illicit funds. Powered by Blockaid’s first-party signals to make policies programmatically enforceable.
English
1
18
44
8.2K
Elad Ernst retweetledi
Richard Liu
Richard Liu@DrPayFi·
We’ve been working with @blockaid_ on investigating the legacy @humafinance v1 protocol exploit, and for transparency I’m sharing their excellent root cause analysis (link in the first reply). Here is a TL;DR and the key architectural learnings from the incident. 👇 TL;DR The Exploit: An attacker found a smart contract bug and drained ~$101K in leftover protocol and pool owner fees from three legacy v1 pools on Polygon. User Funds: Zero user funds were impacted. Isolation: This is strictly a v1 issue. It is completely unrelated to PayFi Strategy Tokens (PST), the permissioned v2 pools, or the permissionless programs (PST & Prime). Solana Programs: The Solana programs feature a fully redesigned architecture and do not contain the exploited functions or logic. Status: All v1 pools have been paused. Key Architectural Learnings On the surface, this was a smart contract bug in v1, launched in early 2023, but it highlights several critical protocol design and operational considerations where different paths should have been pursued: 1. Decouple state transitions from complex logic. Functions like _updateDueInfo() and _getDueInfo() carried high complexity to calculate dues and fees. Embedding state transitions within these complex functions is an anti-pattern. This complexity was recognized as unsatisfactory and was completely abandoned during the architecture of Huma v2 smart contracts. 2. Ruthlessly eliminate unused functions. requestCredit() was built to support future expansion but never actively utilized in operations. Non-critical functions inherently receive less testing and security scrutiny, creating an unnecessary attack vector. We even discussed removing it before launch, but kept it under the assumption that it doesn’t add much complexity. If a function isn't required for current operations, it shouldn't be in the contract. 3. Proactively migrate and close legacy pools. Leaving older contracts out on the blockchain creates unnecessary liabilities. With developers and attackers both leveraging AI extensively today, legacy contracts that haven't undergone AI-assisted audits are naturally more vulnerable. Older pools should be actively migrated and fully closed, rather than left running. We were in the process of sunsetting the v1 pools, but didn't have a chance to complete it. This is a hard lesson. But a hard lesson should never be wasted. Sharing these reflections to help the entire ecosystem in the joint defense against attackers. DeFi United, DeFi Strong! 🛡️
Huma Finance@humafinance

Earlier today a vulnerability in Huma’s legacy v1 contracts on Polygon was exploited for 101,400 USDC. No user funds at risk and PST is not impacted. Huma’s v2 system on Solana is a complete rewrite and this issue does not apply to v2 systems. The teams were already in the process of sunsetting all the legacy v1 pools, and have paused v1 completely now.

English
7
17
72
8.9K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨 Community Alert - Exploit on @Aurellion_Labs An unverified EIP-2535 Diamond proxy on Arbitrum was exploited a few minutes ago for ~$456K because of uninitialized Diamond / unprotected initialize(). More Details in 🧵
English
7
15
88
7.2K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨 Exploit Alert - @humafinance V1 (deprecated) ✅ No user funds at risk. Huma Finance's V1 BaseCreditPool deployments on Polygon were exploited a few minutes ago for ~$101K. Total drained: ~$101.4K (USDC + USDC.e) More Details:
English
12
14
106
24.5K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨 Community Alert @inkfinance's Workspace Treasury Proxy on Polygon was exploited a few minutes ago for ~$140K. More details in🧵
English
9
25
123
12.6K
Elad Ernst retweetledi
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
Today’s blockchain compliance tools are slow and reactive. @Blockaid_’s Risk Exposure is built for onchain teams that need proactive, always-on compliance. Coming soon.
English
3
8
25
3.6K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨 Blockaid's exploit detection system has identified an on-going exploit on TrustedVolumes (1inch market maker / resolver, @trustedvolumes ). Chain: Ethereum Victim contract: TrustedVolumes resolver — 0x9bA0CF1588E1DFA905eC948F7FE5104dD40EDa31 Exploiter: 0xC3EBDdEa4f69df717a8f5c89e7cF20C1c0389100 Exploit tx: 0xc5c61b3ac39d854773b9dc34bd0cdbc8b5bbf75f18551802a0b5881fcb990513 Total extracted so far: ~$5.87M (1,291.16 WETH + 206,282 USDT + 16.939 WBTC + 1,268,771 USDC). Same operator as the March-2025 1inch Fusion V1 incident; this is a different vulnerability, in a TrustedVolumes-controlled custom RFQ swap proxy (0xeEeEEe53033F7227d488ae83a27Bc9A9D5051756). More details will follow.
English
20
34
190
148.3K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨Blockaid's exploit detection system has identified an on-going exploit on an @EkuboProtocol custom extension contract on Ethereum. $1.4M drained so far. Ekubo users are not at risk. Only users who have approved this specific v2 contract as a spender (any token) are at immediate risk and should revoke now.
English
5
24
97
14.1K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨 Blockaid's exploit detection system identified an on-going admin-key compromise exploit on @wasabi_protocol across Ethereum and Base. The Wasabi: Deployer EOA was used to grant ADMIN_ROLE to an attacker helper contract, which then UUPS-upgraded the perp vaults and LongPool to a malicious implementation that drained balances.
English
36
49
237
171.9K
Elad Ernst retweetledi
Idobn
Idobn@idobn·
When working with onchain assets, you need to detect and respond to attacks in seconds and minutes, not hours. The need for speed is real. @Blockaid_ gives teams the speed and agility they need to act and contain the damage in real time.
Idobn tweet media
Blockaid@blockaid_

🚨 Blockaid's exploit detection system identified an on-going admin-key compromise exploit on @wasabi_protocol across Ethereum and Base. The Wasabi: Deployer EOA was used to grant ADMIN_ROLE to an attacker helper contract, which then UUPS-upgraded the perp vaults and LongPool to a malicious implementation that drained balances.

English
3
5
27
2.7K
Elad Ernst retweetledi
Aftermath Finance (🥚, 🥚)
Aftermath Finance (🥚, 🥚)@AftermathFi·
Update: Great news. Thanks to support from @Mysten_Labs and @SuiFoundation all users will be made whole ZERO losses for anyone. Aftermath will be up and running again soon. Thank you to both teams and to @blockaid_ for the rapid response. For clarity: this was not a Move contract-language security issue.
English
116
69
484
137.7K
Elad Ernst retweetledi
Blockaid
Blockaid@blockaid_·
🚨Community Alert: Ongoing exploit on @SweatEconomy on @NEARProtocol. Exploiter: 3be304b2151870b2be88b9de0b80acab921337ad152584138bd852fc6e9ae018 Largest exploit tx: DvrSMfY85Anc6AuLUmoEDkDdab7qX5NUZLu76HN8NoPn
English
72
61
358
400.5K
Elad Ernst retweetledi
Tangem
Tangem@Tangem·
~$15.5M funds saved. 1.2K sketchy dApps blocked. 83K malicious txs caught. One year ago, we integrated @blockaid_ into all @WalletConnect sessions on Tangem. Safer web3 isn’t the goal; it’s the baseline.
Tangem tweet media
English
12
21
114
20.5K