معاذ
460 posts

معاذ
@m3aadh
GCC; Crypto; hodler $Rune $Ruji 😎



🚨$7.6M gone from @rhea_finance Attacker deployed fake tokens, added liquidity to fresh pools, and fooled the oracle layer. ~$470M stolen YTD. We as whitehats aren't doing enough.




ETH PUT holder update. Available liquidity in Aave ETH dropped below the minimum liquidity threshold. All ETH was withdrawn. The system prioritizes liquidity above yield. No action required.


Hands up if you think Osmosis is going into the famous Cosmos Maintenance Only Mode? 🙋♂️




Pump and dump activity for $RAVE originated on @bitget @binance @Gate Call to action for both @heyibinance @GracyBitget to do better and launch internal investigation offboarding the responsible actors. Offering up to $10K bounty of my personal funds for whistleblowers to come forward privately to share evidence about parties involved We cannot allow this blatant market manipulation by insiders controlling >90% RAVE support to further extract from retail investors.







A security researcher just documented a large-scale counterfeit Ledger Nano S Plus operation selling compromised devices across multiple online marketplaces. The fake units look identical to the real thing but contain completely different hardware. Instead of Ledger's secure element chip, the counterfeits run an ESP32 microcontroller with modified firmware labeled "Nano S+ V2.1." Seeds and PINs are stored in plain text and transmitted to attacker-controlled servers. Any wallet initialized on the device is drained. The operation goes beyond the hardware. The sellers also distribute a fake version of Ledger Live built with React Native and signed with a debug certificate. It intercepts transactions and exfiltrates sensitive data to multiple command-and-control servers. The campaign spans five attack vectors: compromised hardware, Android APKs, Windows executables, macOS installers, and iOS apps distributed through TestFlight to bypass App Store review. This comes days after ZachXBT documented a separate fake Ledger Live app that made it through Apple's Mac App Store review process. That operation drained over $9.5 million from more than 50 victims, including musician G. Love, who lost 5.92 BTC after entering his recovery phrase into what he believed was the legitimate app. The pattern is clear: the attack surface for hardware wallet users has shifted from firmware exploits to supply chain and distribution fraud. The devices themselves remain secure. The problem is that users are being intercepted before they ever touch a real one. Ledger's own "genuine check" feature can be bypassed when the hardware itself is compromised at the source, which makes where you buy the device as important as how you use it. The rules haven't changed, but they've never been more important: buy hardware wallets only from the manufacturer. Never enter your recovery phrase into any software. If a companion app asks for your 24 words on a screen, it's a scam. Every time.









