Logo

Threat Intelligence

Dive deep into the dark side of the web3 ecosystem with Blockaid's threat intelligence team.

How to Prevent the Next Bybit $1.5B hack: A Strategic Approach to Solving Blind Signing

How to Prevent the Next $1.5B Bybit Hack: A Strategic Approach to Solving Blind Signing

The ByBit $1.5B hack was a replay of the Radiant incident - and it could have been prevented. Here's how.

Threat Intelligence
Lottie

Attack Report: Lottie Player supply chain attack

Step-by-step analysis of the Lottie Player Supply Chain Attack - and how Blockaid was able to detect it within minutes

Threat Intelligence
Unmasking

Unmasking Wallet Drainers: Step-by-Step Breakdown of a Crypto Heist

An in-depth look at how wallets drainers operate and the steps they take to access and steal user assets.

Threat Intelligence
Solana TOCTOU

Dissecting TOCTOU Attacks: How Wallet Drainers Exploit Solana's Transaction Timing

Attackers are now abusing the time gap between simulation and execution to target Solana users.

Threat Intelligence
AngelX

Threat Report: AngelX

How Blockaid Threat hunting team caught a new variant of Angel Drainer - before it was released

Threat Intelligence
Squarespace Incident

Squarespace Domain Hijacking Incident: Attack Report

Dive into the details of the recent Squarespace domain hijacking incident that targeted major DeFi protocols.

Threat Intelligence
Bypasses

Bypasses: How Attackers Evade Transaction Simulation

Learn how threat actors are utilizing bugs in security products to attack users.

Threat Intelligence
Address Poisoning

Deep Dive into Address Poisoning

Dive into the mechanics, effectiveness, and prevention of address poisoning attacks to help you stay safe in the evolving crypto landscape.

Threat Intelligence
Violet Drainer

How Blockaid Stopped Violet Drainer Before It Could Start

Wallet drainers are financially motivated—their only objective is to make money. When we’re able to make it hard enough for them to do that, they give up.

Threat Intelligence
Restake Farming

Emerging Attack Vector: Restake Farming

Angel Drainer group has introduced a new attack vector utilizing a protocol to execute a novel form of approval farming attack through the queue Withdrawal mechanism.

Threat Intelligence
Inferno

Putting Inferno Drainer Group Out of Business

The recent partnership between MetaMask and Blockaid has caused the notorious Inferno Drainer Group to shut down.

Threat Intelligence
Ledger Connect Kit Attack

Attack Report: Ledger Connect Kit

Blockaid’s proactive dApp scanning system found a malicious payload in in the Ledger connect-kit SDK via a supply chain attack causing multiple dApps to serve malicious content for users.

Threat Intelligence
Drainers

Malicious dApp 101: Wallet Drainers Are Stealthier, More Complex than Ever

A look at how Wallet Drainers are becoming more and more sophisticated in utilizing web2 technologies to attempt to scam users and avoid detection.

Threat Intelligence
Malicious dApps 101

Malicious dApps 101: Wallet Drainers

We want to make transacting in web3 as secure as opening a file on your computer or paying with your credit card on Amazon. This article aims to explain the characteristics of wallet drainers and why even the savviest crypto users need to be careful.

Threat Intelligence