Defend Against Cybercrime with the Power of Community

Many victims have already taken action through ChainBounty. Report now and join the effort to stop online crime

chainbounty
Risk assessment
Before you send, check wallet addresswallet address

Help protect others by sharing your scam experience

View More

Fake otp from exodus wallet

I believe i never use any service from exodus wallet, soo this mail 100% scam whith phising link included. Becareful double check! Stay Safe!

salaryman

13 reads

Scam mail with phising link!

The mail telling me to open link to reveal password, but i do beleive email was not trusted and link are suspicious so i'm not visit the link. Becareful mail like this maybe you also got it one. Stay safe!

salaryman

10 reads

Fake NFT offer!

Fake NFT offer with suspicious link, 100% phising link! Becareful if you got this one. Stay safe!

salaryman

12 reads

링크 클릭 유도하는 스팸 문자

자극적인 내용으로 링크 클릭 유도함

Jenn

16 reads

Fake giveaway with phising link.

The mesagge invite me to join bitcoin giveaway with phising link, and bunch of pdf file. This is absolutely fake and scam! Becareful and stay safe!

salaryman

20 reads

비트코인 사기

BTC 준다면서 가입 유도하네요

jxsh3907

24 reads

Contribute by sharing insights to strengthen the community

jxsh3907
jxsh3907

July 06, 2025

General Discussion
톡큰 체인바운티 브릿지 교환 성공

아비트럼 이더리움만 충분히보유하고 있으면 되네요

톡큰 체인바운티 브릿지 교환 성공
2 likes8 reads
jxsh3907
jxsh3907

July 06, 2025

General Discussion
톡큰에서 체인바운티 메인넷 지원하네요

브릿지 이용해봤는데 됩니다클레임까지 되는지는 봐야겠네요

2 likes9 reads
UppSecEcho
UppSecEcho

July 01, 2025

Blockchain Insights
🚨 How a Single Wei Broke ResupplyFi: Inside the $9.6M DeFi Price Manipulation Heist

On June 26, 2025, ResupplyFi—a decentralized stablecoin and lending protocol—became the latest victim in a string of DeFi price manipulation attacks, losing an estimated $9.6 million from its wstUSR lending market.But this wasn’t a typical exploit. This was a surgical, precision-driven manipulation that started with just 1 wei and ended in millions.Here’s how it happened, why it worked, and what this means for the future of DeFi.🧨 The Attack at a Glance• Target: ResupplyFi’s wstUSR market• Method: Oracle manipulation via ERC-4626 vault logic bug• Funds lost: ~$9.6 million in reUSD• Exploited function: _updateExchangeRate() in ResupplyPair contract• Timeline: Single transaction drain within minutes🛠️ How the Exploit WorkedAt the heart of the attack was a poorly designed exchange rate oracle within ResupplyFi’s vault contract. Specifically, the exchangeRate was derived using a value called pricePerShare, common in ERC 4626 vaults.But here’s the catch:➤ The attacker deposited 1 wei into an almost empty vault.This gave them control over how the vault's pricePerShare would respond to subsequent “donations.”➤ Then, they made a large “donation” to the vault.This artificially inflated the share price, skewing the oracle rate. Because of a logic flaw, the protocol calculated the exchangeRate as 0, tricking the system into thinking the collateral was worthless.➤ Result:The attacker borrowed $10 million worth of reUSD against 0 value collateral.⚠️ What Went Wrong?• Broken Oracle Assumptions: The system trusted pricePerShare as a real-world oracle without validation.• No Lower Bound Check: Allowing exchangeRate to drop to zero effectively bypassed the collateralization check.• Missing Guardrails: There were no sanity limits on extreme values coming from vault math.💸 The Drain & LaunderingThe attacker didn’t stick around.They quickly converted stolen reUSD into ETH Funds are now sitting at 0x886f786618623fffb2be59830a47661ae6492e160x31129a5c13306a48e827e851d44e19ca07d4928a🧠 Lessons for the DeFi WorldThis hack joins a growing list of oracle manipulation exploits where DeFi protocols underestimate how easily “trusted” math can be gamed in low-liquidity or edge-case scenarios.✅ Key takeaways for builders:• Never trust raw vault math without bounds.• Validate pricePerShare with a circuit breaker or floor value.• Use multiple oracles for redundancy.• Simulate edge cases with small deposits in testing environments.🗣️ Final ThoughtsThe ResupplyFi exploit is another reminder that a single wei, when paired with flawed logic, can dismantle an entire system.As DeFi continues to innovate, we must slow down and ensure that core primitives like oracles, vaults, and pricing logic are built with security-first principles.If not, there will always be someone waiting to turn one wei into one more heist.

1 likes14 reads

Your journey to defend against cyber crime starts here.

Join us to turn your expertise into a force for a safer digital world.

Blog

Web3 Security in 2025: Threat Trends and What You Can Do About Them

Web3 Security in 2025: Threat Trends and What You Can Do About Them

As the blockchain and Web3 space continues to evolve at lightning speed, so do the threats that come with it. From phishing and private key leaks to smart contract exploits, Web3 users and builders face a growing wave of sophisticated attacks. At ChainBounty, we’re building a new kind of defense — powered by the crowd, made for the decentralized web.Here’s a breakdown of the latest Web3 security trends and how you can stay protected.Why Web3 Security MattersDecentralization gives users ownership and control — but it also removes the safety nets of traditional systems. In Web3, there’s no “forgot password” button. A single signature or leaked key can lead to irreversible loss.Unlike Web2, where centralized platforms monitor for threats, Web3 relies on individual responsibility — making security literacy and proactive defense essential.Recent Incidents & Growing LossesThe numbers speak for themselves:2024 saw 760+ major Web3 attacks, resulting in over $2.36 billion in losses — up 31.61% from the previous year.In January 2025 alone, attackers stole $879 million across 40+ incidents.Phishing and wallet-draining scams are becoming more complex and harder to detect — especially for everyday users.The Most Common Threats1. Phishing AttacksFake sites, malicious DMs, fake support channels — phishing remains the #1 threat. In 2024, phishing alone led to over $1.05 billion in user losses.How ChainBounty helps: Our platform tracks community reports on suspicious dApps, domains, and wallet drainers. Users can check before they click.2. Private Key LeaksIf someone gets your seed phrase, your wallet is gone. Period.Losses from leaked keys reached $855 million in 2024, often due to users entering keys into fake apps or “claim” websites.How to protect yourself:Never share your seed phrase or enter it on any unverified site.Use hardware wallets for cold storage.3. Smart Contract ExploitsEven trusted protocols get hacked — especially bridges and DEXs. Code bugs, unverified contracts, and logic errors can drain millions in seconds.What to do:Always check if a project has undergone an audit.Monitor dApp risk reports on ChainBounty before interacting.How the Industry Is RespondingThe Web3 security space is maturing fast. Here are some trends:Security Audits are now a must for serious projects.Decentralized threat intelligence platforms like ChainBounty are emerging — enabling real-time scam reporting and validation.Integrated Web2/Web3 defenses (like Cloudflare’s secure gateways) are helping protect the user experience.What Makes ChainBounty Different?Traditional security relies on closed systems. ChainBounty is powered by the crowd.Decentralized: Anyone can report suspicious activity.Transparent: Every threat is logged and reviewed on-chain.Incentivized: Contributors earn $BOUNTY tokens for validated reports.All reports are added to the Threat Report Database (TRDB), which powers detection tools like ScamHunter and provides APIs for wallet extensions, dApps, and exchanges to preempt phishing.Final ThoughtsWeb3’s growth brings massive opportunity — and massive responsibility. Security isn’t optional — it’s foundational.Stay informed. Stay alert. And remember, you don’t have to fight scams alone. Join the ChainBounty movement, and be part of the defense.👉 community.chainbounty.iosourcesSlowmist 2024/2025 Web3 Security Report: Slowmist Official BlogCertiK 2024 Security Report: CertiK BlogGoPlus Security:GoPlus Security Official WebsiteCloudflare Web3 Security:Cloudflare Official Blog (Web3 Tag)

ChainBounty

ChainBounty

6 days ago
Web3 Scam Trends: What Thousands of Community Reports Reveal — And How to Stay Safe

Web3 Scam Trends: What Thousands of Community Reports Reveal — And How to Stay Safe

Web3 Scam Trends: What Thousands of Community Reports Reveal — And How to Stay SafeAs Web3 grows, so do the scams. Phishing links, fake dApps, and wallet-draining contracts are more sophisticated than ever. But thanks to the ChainBounty community, we now have a clearer picture of what to watch for.Based on hundreds of real user reports submitted at ChainBounty, here are the most common scam types — and how to protect yourself.1. Fake dApps & Clone SitesWhat happens:Scammers copy real platforms like Uniswap, Blur, or MetaMask and host fake versions under misleading domains. Once users connect their wallets, the fake dApp initiates unauthorized transactions.How to stay safe:Always check the domain name carefully.Bookmark official sites.Use browser plugins like ChainBounty Alerts (coming soon) to auto-flag risky domains.Report suspicious URLs at ChainBounty Threats.2. “Claim Now” Phishing LinksWhat happens:Users are tricked into clicking “claim reward” buttons for fake airdrops. The links usually trigger hidden approve() functions that give attackers access to your wallet.How to stay safe:Don’t click reward links from DMs, replies, or unknown sources.Review every transaction and check the “permissions” granted.Use a burner wallet for experimental dApps or airdrops.3. Fake Airdrops & Drainer TokensWhat happens:Scam tokens show up in wallets, directing users to “claim” more via malicious sites. These often initiate stealthy contract calls to drain funds.How to stay safe:Don’t interact with unknown tokens suddenly appearing in your wallet.Never sign a transaction you don’t understand.Search token contracts on ScamHunter to check for risks before engaging.4. Wallet Draining via Message SignatureWhat happens:Victims sign a message (not a transaction), unknowingly allowing attackers future control over assets via permit() or gasless execution.How to stay safe:Don’t sign messages from dApps you don’t fully trust.Be cautious of “Login to claim reward” or “verify account” requests.Use wallets like Rabby or WalletGuard that warn about suspicious signatures.💡Track it on BountyTrackWhile message signatures themselves are not stored on-chain, BountyTrack can help detect the aftermath — such as abnormal withdrawals or contract calls initiated through signature-based attacks.By analyzing wallet behavior patterns and their interactions with related dApps, users can trace, report, and block suspicious actors before more damage is done.5. Hacked Verified AccountsWhat happens:Even verified Twitter/X accounts — influencers, projects, or DAOs — can get hacked. Scammers then share malicious links under trusted handles.How to stay safe:Don’t trust posts solely based on blue checkmarks.Always double-check URLs.Check replies — often users will flag suspicious behavior.Report phishing attempts to ChainBounty.Why This MattersEvery scam report submitted on ChainBounty is verified by the community and stored in the Threat Reputation Database (TRDB) — an on-chain intelligence source powering alerts and protections across Web3.By participating, users are rewarded.By sharing, you help prevent the next attack.By connecting TRDB with dApps and wallets, phishing can be blocked before it strikes.Get InvolvedIf you’ve encountered a phishing link, fake dApp, or suspicious token:🔗 Submit a report hereHelp make Web3 safer — for you and for everyone else.The more we share, the stronger the defense.

ChainBounty

ChainBounty

19 days ago
ChainBounty Presents: BountyTrack

ChainBounty Presents: BountyTrack

Your Web3 Radar Against Crypto ScamsWith scams growing smarter and wallets vanishing overnight, Web3 urgently needs real-time, community-powered tools for early fraud detection. That’s why BountyTrack exists — and now, it just got a major upgrade.What Is BountyTrack?BountyTrack is a crypto investigation dashboard built for Web3 users, security analysts, and on-chain detectives.Its mission? To help users analyze suspicious wallet activity, detect patterns before damage is done, and ultimately prevent fraud before it spreads.Now supporting over millions blockchains, BountyTrack empowers you to investigate wallet behavior across:Ethereum (ERC20), Bitcoin, Binance Smart Chain, Polygon, Avalanche, Tron, Solana, Ripple, Klaytn, Fantom, Cardano, and more.Key FeaturesMulti-chain wallet tracking : Trace a suspicious wallet’s activity across major L1 chains and sidechains.Token contract filtering: Narrow down results to specific tokens (not just native assets).Time-based investigation: Focus your analysis on specific transaction periods.Source & distribution depth control: Customize how deep to trace transactions in both directions.Visual fraud patterns : Generate intuitive graphs to understand flows and relationships instantly.Visualize flows. Trace origins. Flag scams faster.Real Use CasesSuspect a wallet involved in phishing? Track it and flag it.Lost funds to a fake airdrop? Submit a full on-chain report.A known influencer’s wallet seems compromised? Monitor and alert before followers are harmed.Built for Investigators, Powered by the CommunityWith a simple interface and powerful forensic tools, BountyTrack lowers the barrier for anyone to become an on-chain investigator. Whether you’re a security researcher, DAO operator, journalist, or simply a concerned user — you now have the tools to take action.Stop Fraud Before It SpreadsScams aren’t just a technical problem — they’re a timing problem. The faster we investigate, the faster we can protect.Start your investigation today: https://track.chainbounty.io

ChainBounty

ChainBounty

a month ago