Community

Contribute by sharing insights and tips to strengthen the community.

All52
search
UppSecEcho
UppSecEcho

June 24, 2025

Blockchain Insights
๐Ÿ’ฅ The Day CoinMarketCap Was Used to Drain Wallets: A Story of a Silent Phishing Breach

On an ordinary Thursday evening, thousands of crypto users did what they always do, visit CoinMarketCap to check token prices, track trends, and explore new projects. Everything seemed fine. The homepage loaded normally, complete with its signature doodle graphic at the top.But hidden behind that seemingly harmless doodleโ€ฆ was a trap.A highly targeted, well-executed supply-chain attack was underway, and most visitors had no idea.๐ŸŽญ A Familiar Prompt, A Dangerous IllusionAs users scrolled the CoinMarketCap homepage, something popped up:โ€œConnect your Wallet to Continue.โ€It looked legitimate. A clean interface mimicking WalletConnect.Many users, conditioned by countless previous wallet interactions, didnโ€™t think twice.They clicked.Within seconds, wallets were drained.SOL, XRP, obscure meme tokens, and more, gone.๐Ÿ” Unmasking the AttackThis wasnโ€™t a server breach. There were no leaks, no brute-force logins, and no malware downloads.Instead, the attackers found a smarter way in, through the frontend.They exploited a third-party image API used by CoinMarketCap to load its doodle. That API was silently compromised. When CoinMarketCap called it, it returned not just the imageโ€ฆ but also malicious JavaScript code.That code injected the fake wallet prompt right into the homepage, all within the browser.Users never left the site. But their crypto left their wallets.๐Ÿ’ธ The AftermathWithin 24 hours:โ€ข 110+ wallets were compromisedโ€ข At least $43,000 in funds were stolenโ€ข Tokens included $SOL, $XRP, $EVT, $PENGU, $SHDW, and othersโ€ข The attacker used a tool known as Inferno Drainer, a wallet-draining-as-a-service platform growing in popularityThis wasnโ€™t the first time Inferno Drainer was seen in action. But using CoinMarketCapโ€™s trusted brand and homepage as the delivery vector? That was bold.And most importantly:The funds were traced to the drainer wallet:โ€ข 0x8a2983f358a03c6DB9c47a70e944368D4De77820โ€ข 0x030703e1EB18355a794F3f034Fe63959F8640D33This address received tokens from victims across multiple chains. You can see the walletโ€™s on-chain activity, including token swaps and consolidation behavior โ€” classic drainer operation.Other IOCs involvedโ€ข 0x000037bB05B2CeF17c6469f4BcDb198826Ce0000โ€ข 0x0000553F880fFA3728b290e04E819053A3590000โ€ข www.cdnkit[.]ioโ€ข https://static.cdnkit[.]ioโ€ข blockassets[.]app๐Ÿ›ก๏ธ CoinMarketCapโ€™s ResponseTo their credit, CoinMarketCap reacted quickly:โ€ข โœ… The fake pop-up was immediately removedโ€ข ๐Ÿ”ง The third-party API was patchedโ€ข ๐Ÿ›‘ No backend servers or databases were breachedโ€ข ๐Ÿค Most importantly, CoinMarketCap committed to reimbursing affected usersThey also stated they are reinforcing internal controls and reviewing all external integrations.๐Ÿง  Lessons LearnedThis wasnโ€™t a smart contract exploit.It was an exploit of trust, using a familiar interface, a trusted website, and user habits as the entry point.The most dangerous scams arenโ€™t always flashy. This one worked because it looked normal.Even trusted platforms like CoinMarketCap can be used as vectors in supply-chain attacks.โœ… How to Protect Yourself Going ForwardHereโ€™s what you can do right now to reduce your risk:1. Donโ€™t approve wallet prompts you didnโ€™t expect.2. Review token approvals regularly with tools like Revoke.cash.3. Use browser extensions that detect wallet drainers (e.g., Wallet Guard, Scam Sniffer).4. Bookmark official dApps and avoid interacting with wallet pop-ups on informational sites.5. Always double-check transactions before signing.๐Ÿงต Final ThoughtsThe CoinMarketCap incident wasnโ€™t the biggest crypto exploit by dollar amountโ€”but it was one of the most deceptive.It showed us how fragile the frontend trust layer can be in Web3.As users and builders, we must recognize that security isnโ€™t just about smart contracts. Itโ€™s about interfaces. Dependencies. And habits.The drainer wallet may be just one address.But the lesson it leaves behind affects millions.Stay sharp.Stay sovereign.And never blindly click "Connect Wallet."If this helped you or your community, consider sharing it to raise awareness. Security is a shared responsibility in Web3.#CoinMarketCap #Web3Security #WalletDrainer #CryptoScams #InfernoDrainer #Phishing #CryptoNews

1 likesใƒป20 reads
intel_guy
intel_guy

June 20, 2025

Blockchain Insights
Nobitex Hack Blockchain Insights: What can we see from Blockchain data ?

On June 18th 2025, Iranian Exchange Nobitex was drained of over 100 million USD of assets including ETH, BSC, POL, AVAX, ARB, BTC, TRX among others. These are some facts obtained from blockchain analysis.1. The incident started with unauthorized access of Nobitex controlled wallets, which were drained and burned to the following vanity addresses. - TKFuckiRGCTerroristsNoBiTEXy2r7mNX - 0xffFFfFFffFFffFfFffFFfFfFfFFFFfFfFFFFDead - 1FuckiRGCTerroristsNoBiTEXXXaAovLX - DFuckiRGCTerroristsNoBiTEXXXWLW65t2. The reason why 100 million USD is as good as lost assets, is because in order to spend the assets from the above 4 vanity addresses, it would require the knowledge of it's private key and its calculation would requires years of brute force computation.Figure 1: Nobitex Compromised Wallets drained of ETHFigure 2: Nobitex Potentially Implementing Safety Procedure3. Using our proprietary tool CATV, that feeds from blockchain data, we are able to derive insights into the actions of the hacking group, and subsequent response from the Iranian Exchange. For instance, 262 ETH was burned from 2 compromised Nobitex wallets, and within a few hours Nobitex managed to restore approximately 6 ETH from the compromised wallets, and moved close to 10,000 ETH from its hot wallet to a potentially new wallet as safetymeasure. This was observed across other tokens and EVM chains too.Figure 3: More than 2000 Compromised Wallets drainedFigure 4: Nobitex Potentially Implementing Safety Procedure4. Similarly, more than 2,000 compromised Bitcoin addresses containing small amounts of BTC were drained a total of approximately 18 BTC. Similar to EVM chain, we saw that around 1800 BTC were moved by Nobitex to a new address potentially as part of its safety procedure.Figure 5: Zero Value Transactions from Vanity Address to VASPs.Figure 6: TransferFrom() function invoked5. Maximum losses were incurred from TRON blockchain, where more than 100,000 compromised wallets were drained, where each wallet held small USDT balances. The most interesting aspect from TRON is that on 20th June 2025, we observed attempts to withdraw funds from the vanity address using Tron's bonk Token TransferFrom() function. While TransferFrom allows another wallet to spend the vanity wallet's funds upon obtaining approval from the vanity address, in this case 0 value transactions were requested by another wallet to make it seem like funds were transferred to several exchanges. However, real spending from the vanity address would need its private key.

Nobitex Hack Blockchain Insights: What can we see from Blockchain data ?
5 likesใƒป205 reads
salaryman
salaryman

June 20, 2025

General Discussion
Total scam!

Mail scam are not send by randomly, but your mail actualy already sign up at several sites/airdrop/giveaway etc.This is my dump email for sign up and many thing not personal mail.

Total scam!
1 likesใƒป11 reads
UppSecEcho
UppSecEcho

June 19, 2025

Blockchain Insights
โš ๏ธ Beware of Address Poisoning: A Sneaky Crypto Scam You Shouldn't Ignore

When it comes to crypto, even the smallest mistake can lead to big losses, especially with your wallet address. Thereโ€™s a sneaky scam going around called address poisoning, and itโ€™s causing people to accidentally send their crypto to the wrong wallet.Itโ€™s cheap for scammers to do, hard to notice, and it works more often than youโ€™d think.In this post, weโ€™ll explain how the scam works, how to spot it, and what you can do to protect yourself.What is address poisoning?Address poisoning is a scam where a bad actor creates a wallet address that looks almost identical to yours, same beginning and ending characters, for example:Your real wallet: 0xA1B2...7890Scammerโ€™s address: 0xA1B3...7890Then they send a tiny or worthless token (like $0.00) to your wallet from their fake address. This harmless-looking transaction now shows up in your transaction history.Later, if you copy-paste your wallet address from your history (as many people do), you might accidentally copy the scammerโ€™s lookalike address instead, and unknowingly send your real funds to the wrong wallet.Itโ€™s simple, quiet, and devastating.Take this address for example:0x917f79bd9c4435179eb3c0c88e40951824580f99 (Binance Smart Chain Mainnet)https://bscscan.com/address/0x917f79bd9c4435179eb3c0c88e40951824580f99#tokentxnsThis wallet is part of an address poisoning campaign on Binance Smart Chain (BSC). It sends tiny token amounts to many other addresses, making it appear in wallet histories. If a user mistakenly selects this address instead of their own, they could end up sending real assets to the scammer.Weโ€™ll be tracking this address further and analyzing its flow of funds to understand how widespread its activity is.Image 1 captured from bscscanImage 2 captured from bscscanThe outgoing transactions shown in images 1 and 2 are part of an address poisoning attack carried out by the scammer.Now, letโ€™s take a closer look using a visual graph with CATVImage captured from the Crypto Analysis Transaction Visualization (CATV) Dashboard.Looking at the graph, we can see that the scammer used exchanges like Bybit, Phemex, MEXC Global, and Gate. Once someone falls for the scam, the stolen crypto gets sent to these VASP (Virtual Assets Service Provider).๐Ÿ” How to Spot Address PoisoningHere are common signs youโ€™re being targeted:โ€ข You receive a transaction from a wallet that looks very similar to yours.โ€ข The transfer is very small (often $0 or just a few cents).โ€ข It appears shortly after youโ€™ve made a real transaction.๐Ÿ›ก How to Stay SafeAvoiding this scam is easy if you follow a few good habits:โœ… Never copy your wallet address from your transaction history.โœ… Use a saved address book in your wallet app (e.g., MetaMask, Trust Wallet).โœ… Double-check the entire address, not just the first and last few characters.โœ… Send a small test transaction when dealing with a new address.โœ… Ignore dust tokens or unexpected airdrops, they're often part of the trick.About the Crypto Analysis Transaction Visualization (CATV) ToolThe Crypto Analysis Transaction Visualization (CATV), developed exclusively by Uppsala Securityโ€™s expert team, serves as a sophisticated yet seamless forensic tool that offers in-depth insights into cryptocurrency transaction flows. This tool is designed to trace both inbound and outbound transactions linked to a specific wallet. CATV empowers users to effectively track, analyze, monitor, and graphically visualize cryptocurrency transactions, highlighting the flow of tokens and their interactions with various entities like exchanges and smart contracts.Explore CATV in a brand new Avatar with easy to use credit system!!Pay for only what you need and use. Contact us at [email protected] for a free demo and more details!!

โš ๏ธ Beware of Address Poisoning: A Sneaky Crypto Scam You Shouldn't Ignore
1 likesใƒป37 reads
Mkammun
Mkammun

June 13, 2025

General Discussion
How can I find real crypto coin ?

I see lot of new new crypto project thay doing most of scaming . At first when lunch new price big pump than after some days price going almost 99% down ? How to find real coin and save my money

1 likesใƒป37 reads
jxsh3907
jxsh3907

June 13, 2025

General Discussion
์ด๋ฒคํŠธ ๋๋‚˜์„œ ๊ทธ๋Ÿฐ๊ฐ€ ์กฐ์šฉํ•˜๋„ค์š”

๋‹ค์Œ์— ๋˜ ์ด๋ฒคํŠธํ•˜๋ฉด ์ข‹๊ฒ ๋„ค์š”

1 likesใƒป14 reads
code2exit
code2exit

June 04, 2025

General Discussion
์œ„ํ˜‘ ์‹ ๊ณ  ํŽ˜์ด์ง€๋Š” ๋ฉ”๋‰ด์—์„œ ์ฐพ์„ ์ˆ˜๊ฐ€ ์—†๋„ค์š”.

๋งˆ์ดํŽ˜์ด์ง€ - ๋‚ด์œ„ํ˜‘ ์‹ ๊ณ  ๋ฉ”๋‰ด์— ๊ฐ€๋ฉด ๋ฆฌํฌํŠธ ์ž‘์„ฑํ•˜๊ธฐ ๋ฉ”๋‰ด๊ฐ€ ๋‚˜์˜ต๋‹ˆ๋‹ค. URL์€ https://community.chainbounty.io/ko/threats/create ์ด๊ตฌ์š”.ํ•˜์ง€๋งŒ ์ƒ๋‹จ nav ๋ฉ”๋‰ด์—์„œ๋Š” ์ง„์ž…๊ฒฝ๋กœ๊ฐ€ ์—†๋„ค์š”. ์‚ฌ๋ผ์ง„ ๋ฉ”๋‰ด์ธ๊ฐ€์š”?

3 likesใƒป32 reads
salaryman
salaryman

June 03, 2025

General Discussion
$BOUNTY

Talk event was ended i see at talken group there was many user did not getting paid, maybe it was cheating multiple her self for win couple penny!

1 likesใƒป23 reads
jxsh3907
jxsh3907

May 31, 2025

General Discussion
์Šค์บ  ์ œ๋ณดํ• ๊ฒŒ ์—†๋„ค์š”

๋Œ€์„ ๋ฌธ์ž๋Š” ์Šค์บ ์œผ๋กœ ๊ณ„์† ์‹ ๊ณ ํ•˜๊ธฐ์• ๋งคํ•ด์„œ ์‹ ๊ณ  ์•ˆ ํ•˜๊ณ ์žˆ๋„ค์š”ํ†กํฐ ์‹œ์ฆŒ4 ๋ฃฐ๋ › ์ข…๋ฃŒ ๋์œผ๋‹ˆ ์ฒด์ธ๋ฐ”์šดํ‹ฐ๋‹น์ฒจ์ž ์ถ”์ฒจ ๊ธฐ๋‹ค๋ ค์ง€๋„ค์š”

2 likesใƒป17 reads
jxsh3907
jxsh3907

May 25, 2025

Blockchain Insights
์ฒด์ธ๋ฐ”์šดํ‹ฐ ๋ธŒ๋ฆฟ์ง€์žˆ๊ตฐ์š”

ํ†กํฐ์•ฑ ๋ธŒ๋ฆฟ์ง€ ์ด์šฉํ•ด์„œ ๋ฐ”๊พธ๋ผ๋Š”๊ฑด์ค„์•Œ์•˜๋Š”๋ฐ ์•„๋‹ˆ์—ˆ๋„ค์š”๋งˆ์ดํŽ˜์ด์ง€์—์„œ ์Šคํฌ๋กค ์•„๋ž˜๋กœ๋‚ด๋ ค์„œ ๋ณด๋ฉด ๋ธŒ๋ฆฟ์ง€ ๋ณด์ด๋Š”๋ฐ ๋ˆ„๋ฅด๊ณ ์ ‘์†ํ•˜๋ฉด ๋ฉ๋‹ˆ๋‹ค์ด๋ฒคํŠธ ๋๋‚˜๋ฉด ๋ธŒ๋ฆฟ์ง€ ์ด์šฉํ•ด์„œ ์•„๋น„ํŠธ๋Ÿผ๊ธฐ๋ฐ˜ ์ฒด์ธ๋ฐ”์šดํ‹ฐ๋กœ ๋ฐ”๊ฟ”๋ด์•ผ๊ฒ ์–ด์š”์ถ”๊ฐ€ํ†กํฐ ์ง€๊ฐ‘์€ ํ˜„์žฌ ์ฒด์ธ๋ฐ”์šดํ‹ฐ ๋ฉ”์ธ๋„ท์ง€์› ์•ˆ ํ•ด์„œ ๋ธŒ๋ฆฟ์ง€ ์ด์šฉ ๋ถˆ๊ฐ€๋Šฅํ•˜๋„ค์š” ใ… 

์ฒด์ธ๋ฐ”์šดํ‹ฐ ๋ธŒ๋ฆฟ์ง€์žˆ๊ตฐ์š”
5 likesใƒป47 reads