OnChainTrust

14 posts

OnChainTrust banner
OnChainTrust

OnChainTrust

@onchaintrust

Bringing Trust to Cryptocurrency Transactions.

Katılım Ekim 2023
105 Takip Edilen29 Takipçiler
OnChainTrust retweetledi
CoW DAO
CoW DAO@CoWSwap·
🚨🚨 We are currently experiencing an issue with the CoW Swap frontend (swap.cow.fi). While we are investigating, please DO NOT use CoW Swap.
English
77
231
575
271.2K
OnChainTrust retweetledi
Vladimir S. | Officer's Notes
Attention! It looks like @CoWSwap UI is compromised - pls share this info ASAP! Looks like a DNS hijacking (registrar related).
English
1
22
45
5.5K
OnChainTrust retweetledi
Aerodrome
Aerodrome@AerodromeFi·
We’re actively investigating a frontend compromise. Please do not access the site through any URL — primary domain or decentralized mirrors — until we confirm everything is safe. All smart contracts appear secure. Updates soon.
English
84
113
431
264.8K
OnChainTrust retweetledi
Vladimir S. | Officer's Notes
Vladimir S. | Officer's Notes@officer_secret·
This time, several old system JS packages were attacked – debug (357M installations per week) and chalk (299M installations per week), along with a bunch of others, through a Git hack of one of the previous maintainers. You can read the full report here (#issuecomment-3266868187" target="_blank" rel="nofollow noopener">github.com/debug-js/debug… ) from the owner of the hacked account. In short, the hack involved 2FA access to NPM through email. How could this affect you? With a regular wallet connection, nothing will happen without your knowledge. The script is injected into any page containing JS code and checks for the presence of Ethereum wallets (using the window.ethereum check). Then, when attempting to send any transaction through the wallet, it simply replaces the recipient's address. Literally any website that updated its dependencies and installed the hacked version in the last couple of hours could be vulnerable. As of now, the version with the bug has already been removed from NPM. It seems that for the next couple of days, it's better to avoid signing transactions or to be extremely cautious about the recipient's address. The hacker's address is 0xFc4a4858bafef54D1b1d7697bfb5c52F4c166976. What should developers do? Check your lock files, as the hacked packages are mostly utility packages and may not be used directly in the project. The obfuscated script is left here ( #file-npm-vulnerability-deobfusicated-js-L626" target="_blank" rel="nofollow noopener">gist.github.com/sindresorhus/2…), and here ( jdstaerk.substack.com/p/we-just-foun… ) are a few more details on how it works under the hood. Issues with warnings and more technical details: github.com/chalk/chalk/is… github.com/debug-js/debug… The hacker's wallet is currently completely empty.
Vladimir S. | Officer's Notes@officer_secret

HACKERS HIJACK NPM PACKAGES IN WHAT IS BEING CALLED THE LARGEST SUPPLY CHAIN ATTACK IN HISTORY IF YOU USE A HARDWARE WALLET, PAY ATTENTION TO EVERY TRANSACTION BEFORE SIGNING IF YOU DON'T USE A HARDWARE WALLET, REFRAIN FROM MAKING ANY ON-CHAIN TRANSACTIONS FOR NOW: @Ledger CTO The malicious code only impacts individuals accessing the compromised applications over the web, monitoring for cryptocurrency addresses and transactions that are then redirected to attacker-controlled wallet addresses. This causes the transaction to be hijacked by the attackers rather than being sent to the intended address. The malware operates by injecting itself into the web browser, monitoring Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash wallet addresses or transfers. On network responses with crypto transactions, it replaces the destinations with attacker-controlled addresses and hijacks transactions before they're signed. What makes it dangerous is that it operates at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users' apps believe they are signing: bleepingcomputer

English
35
93
287
120.9K
OnChainTrust retweetledi
Charles Guillemet
Charles Guillemet@P3b7_·
🚨 There’s a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk. The malicious payload works by silently swapping crypto addresses on the fly to steal funds. If you use a hardware wallet, pay attention to every transaction before signing and you're safe. If you don’t use a hardware wallet, refrain from making any on-chain transactions for now. It’s still unclear whether the attacker is also stealing seeds from software wallets directly at this stage. Excellent report here: jdstaerk.substack.com/p/we-just-foun…
English
2.9K
7K
18.4K
9.8M
OnChainTrust retweetledi
Vladimir S. | Officer's Notes
Vladimir S. | Officer's Notes@officer_secret·
HACKERS HIJACK NPM PACKAGES IN WHAT IS BEING CALLED THE LARGEST SUPPLY CHAIN ATTACK IN HISTORY IF YOU USE A HARDWARE WALLET, PAY ATTENTION TO EVERY TRANSACTION BEFORE SIGNING IF YOU DON'T USE A HARDWARE WALLET, REFRAIN FROM MAKING ANY ON-CHAIN TRANSACTIONS FOR NOW: @Ledger CTO The malicious code only impacts individuals accessing the compromised applications over the web, monitoring for cryptocurrency addresses and transactions that are then redirected to attacker-controlled wallet addresses. This causes the transaction to be hijacked by the attackers rather than being sent to the intended address. The malware operates by injecting itself into the web browser, monitoring Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash wallet addresses or transfers. On network responses with crypto transactions, it replaces the destinations with attacker-controlled addresses and hijacks transactions before they're signed. What makes it dangerous is that it operates at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users' apps believe they are signing: bleepingcomputer
English
57
218
875
749.8K
OnChainTrust retweetledi
1inch
1inch@1inch·
On Oct 30, 9:12 PM - 11:22 PM CET, 1inch dApp users may have encountered a malicious wallet connect and signature request. This signature allows an attacker to drain user's funds. Only the 1inch web dApp was affected; the 1inch Wallet, API, and protocols were never compromised.
English
28
46
160
71.9K
OnChainTrust retweetledi
Ethena
Ethena@ethena·
The Ethena domain registrar account was recently compromised and we have taken steps to deactivate the site until further notice. The protocol is unaffected and funds are safe. Please do not interact with any site or application purporting to be the Ethena frontend.
English
0
84
318
203.9K
OnChainTrust retweetledi
dYdX
dYdX@dYdX·
We just learned that dYdX v3 website (dYdX . exchange) has been compromised. Please do not visit the website or click any links until further notice. An update will be provided when available. This message does not relate to dYdX v4.
English
129
235
556
386.4K
OnChainTrust retweetledi
Compound Labs
Compound Labs@compoundfinance·
🚨 URGENT: The Compound Labs website (compound[.]finance) has been compromised. Please do not visit the website or clink any links until further notice. An update will be provided when available. This is our final message // end of tweet. 🚨
English
93
134
329
154K
OnChainTrust
OnChainTrust@onchaintrust·
Our founder Alexey speaking today the first time publicly about safety of Web3 Applications at Linea Voyage Waypoint in Munich. Exciting times ahead 🚀
OnChainTrust tweet media
English
0
0
0
56