Blockaid pfp

Blockaid

@blockaid

15 Following
146 Followers


Blockaid pfp
Blockaid
@blockaid
https://warpcast.com/blockaid/0xc1405301
0 reply
0 recast
1 reaction

Blockaid pfp
Blockaid
@blockaid
Pectra is officially live on mainnet, and the Blockaid Platform is ready to go with full support for EIP-7702, including wallet_sendCalls, session keys, and setCode scenarios with accurate transaction previews and enhanced security detection. Additionally, our security engine has been extended with new heuristics to catch new risks introduced by 7702, like malicious initCode and session key abuse, before they reach users. Check out our full breakdown: https://blocka.id/oqxp
3 replies
1 recast
4 reactions

Blockaid pfp
Blockaid
@blockaid
https://warpcast.com/blockaid/0x547a8fae
0 reply
0 recast
2 reactions

Blockaid pfp
Blockaid
@blockaid
The attackers had already started laundering the stolen funds. Example TX: https://arbiscan.io/tx/0xd95f5f2ce5f0310dbd8a13c184bd153ea8444be3b4e0210dbe4d5f135add433f
0 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
Victim https://arbiscan.io/address/0x271013fd6c1c2e5317af3e9db311a2d5c9e2d360 Attacker: https://arbiscan.io/address/0xbf4fe9c88660d628e11702ef780376dd16495b16 Example transaction: https://arbiscan.io/tx/0xc0ef229256b2a6bc076a2de136f00f6161c959e4c56240bdb580ae2fde177c0b
1 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
Attackers exploited a logical vulnerability in the contract's overPaper function, which allowed them to withdraw half the contract's balance.
1 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
🚨 Our exploit detection system had identified multiple malicious transactions targeting btcm.app contracts. The attack is still ongoing - over $1.3M had been drained so far. Updates in 🧵
1 reply
0 recast
1 reaction

Blockaid pfp
Blockaid
@blockaid
What really happened to Bybit, and what can be done to stop future attacks? Join Blockaid's @cyloncat on May 6th for a webinar to learn how to build a security strategy that actually prevents these attacks. https://blocka.id/7ks1
0 reply
0 recast
2 reactions

Rainbow pfp
Rainbow
@rainbow
Trade with confidence and speed. Aping into coins with Rainbow is easier than ever with swaps and bridging easily accessible in the Onchain Browser — it also has anti-scam protection built in with @blockaid transaction simulator so you can explore and connect to dapps without fear
1 reply
2 recasts
0 reaction

Blockaid pfp
Blockaid
@blockaid
Thanks for you patience!
1 reply
0 recast
1 reaction

Blockaid pfp
Blockaid
@blockaid
Hey @eggman.eth reached out via dm.
0 reply
0 recast
2 reactions

Blockaid pfp
Blockaid
@blockaid
After inspection, the dapp is safe to use. Thanks for reaching out.
1 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
🚨 layerswap’s website has been compromised 🚨 Blockaid enabled wallets are secure
0 reply
1 recast
7 reactions

Blockaid pfp
Blockaid
@blockaid
Proud to be the Official Security Sponsor of ETHDenver See you next week!
0 reply
0 recast
2 reactions

MetaMask 🦊 pfp
MetaMask 🦊
@metamask
🔐Security update time! After integrating privacy-preserving MetaMask Security Alerts powered by @blockaid in October, we are now turning them ON by default for all Extension users and across multiple MetaMask networks. They are not available by default on mobile yet, so please opt-in.
0 reply
1 recast
12 reactions

Blockaid pfp
Blockaid
@blockaid
(9/9) These attacks target active, high-value users who probably shouldn’t have to worry about dust transactions. While all Blockaid-protected users were proactively protected, it’s not enough – we need to protect every transaction in web3 full stop.
0 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
(8/9) About an hour later, the victim falls into scam https://etherscan.io/tx/0xd31b85e7148d840a5c4a5c4a8b125d69148bb9a88e29c23a5fdddec5fe936359 ultimately initiating a 50 ETH transaction, but mistakenly setting the destination as the dust address.
1 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
(7/9) Shortly thereafter we see a ‘dust transaction’ https://etherscan.io/tx/0x9660541a9ec5b504b2c6efe72b524ed1a0c51d9edea9923ef433ac169418c885 where a fake dust address (0x4f512487a746AB1638B5fFb0D8321dBDFA6Fb8eA) similar to the previous transaction destination sent a small amount of ETH to the victim address.
1 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
(6/9) We first see a Legitimate transaction https://etherscan.io/tx/0xfa832644aebf26ab93073d7dd019340634e09e7a301005535973971ea72de321 where the victim (0x16287a517499a467A349b70764A4ecAE56D1d2c9) sent 25.81 ETH to a legit destination (0x4f512126668388328EeA49732DE1249bf86Eb8Ea).
1 reply
0 recast
0 reaction

Blockaid pfp
Blockaid
@blockaid
(5/9) Here’s a live example of the user who was tricked into sending 50ETH to an attacker’s fake address:
1 reply
0 recast
0 reaction