

zeroShadow
210 posts

@zeroshadow_io
Web3 Cybersecurity Firm | $300M+ in Crypto Recovered Security Risk Management, Threat Intelligence, Incident Response




An open letter to US universities 1inch.com/assets/1inch-d… Signed by 1inch and @SolanaInstitute @BlockchainAssn @fund_defi @aave @mellowprotocol @DeFi @symbiosis_fi @zeroshadow_io @OriginProtocol @Dune @reown_ @symbioticfi @RecoverisTeam @beefyfinance @Kiln_finance @ETHGlobal @myetherwallet @Delphi_Digital @MessariCrypto @rep_hq



One Zoom update. $100+ million in stolen crypto. And against the odds - a chance to beat DPRK hackers. Today, we’ve teamed up with @zeroshadow_io to bring you the story of an attack that could happen to any of us - and the tokens they managed to get back. Why? 👇






We published our 2025 EVM Smart Contract Exploit Analysis to answer three questions: 🔹How preventable were last year’s exploits 🔹What systemic risk patterns emerged 🔹What the data reveals about the maturity of crypto security practices The review focused exclusively on Solidity-based smart contract failures within the EVM ecosystem, including logic, accounting, access control, and invariant violations, not key compromise or social engineering. Across the in-scope dataset, the findings were clear: Of 50 EVM exploits analyzed, 49 were preventable through deterministic security testing during development, representing approximately 98% of incidents and roughly $240M in preventable losses. The majority of losses in 2025 were not driven by novel attack techniques. They originated from vulnerable logic introduced earlier in development and left undiscovered until exploitation. This report documents those failures and outlines what enterprise security maturity must look like going forward. Full report, no sign-up required ↓ olympix.security/resources/2025…







🚨 WARNING (AGAIN) DPRK threat actors are still rekting way too many of you via their fake Zoom / fake Teams meets. They're taking over your Telegrams -> using them to rekt all your friends. They've stolen over $300m via this method already. Read this. Stop the cycle. 🙏


On January 10, 2026 at around 11 pm UTC a victim lost $282M+ worth of LTC & BTC due to a hardware wallet social engineering scam. The attacker began converting the stolen LTC & BTC to Monero via multiple instant exchanges causing the XMR price to sharply increase. BTC was also bridged to Ethereum, Ripple, & Litecoin via Thorchain. Theft addresses (2.05M LTC, 1459 BTC): bc1qluxw46r55wf3dnk9c652vrt4duadm3hpuktf86 bc1qpsmh26ja0fzzf286zulmt9eywujc2pggj40wzm ltc1qly43c2prj4c2e85dcspzpjd36jnapnenldnr70



