Threat Intelligence
Dive deep into the dark side of the web3 ecosystem with Blockaid's threat intelligence team.

How to Prevent the Next $1.5B Bybit Hack: A Strategic Approach to Solving Blind Signing
The ByBit $1.5B hack was a replay of the Radiant incident - and it could have been prevented. Here's how.

Attack Report: Lottie Player supply chain attack
Step-by-step analysis of the Lottie Player Supply Chain Attack - and how Blockaid was able to detect it within minutes

Unmasking Wallet Drainers: Step-by-Step Breakdown of a Crypto Heist
An in-depth look at how wallets drainers operate and the steps they take to access and steal user assets.

Dissecting TOCTOU Attacks: How Wallet Drainers Exploit Solana's Transaction Timing
Attackers are now abusing the time gap between simulation and execution to target Solana users.

Threat Report: AngelX
How Blockaid Threat hunting team caught a new variant of Angel Drainer - before it was released

Squarespace Domain Hijacking Incident: Attack Report
Dive into the details of the recent Squarespace domain hijacking incident that targeted major DeFi protocols.

Bypasses: How Attackers Evade Transaction Simulation
Learn how threat actors are utilizing bugs in security products to attack users.

Deep Dive into Address Poisoning
Dive into the mechanics, effectiveness, and prevention of address poisoning attacks to help you stay safe in the evolving crypto landscape.

How Blockaid Stopped Violet Drainer Before It Could Start
Wallet drainers are financially motivated—their only objective is to make money. When we’re able to make it hard enough for them to do that, they give up.

Emerging Attack Vector: Restake Farming
Angel Drainer group has introduced a new attack vector utilizing a protocol to execute a novel form of approval farming attack through the queue Withdrawal mechanism.

Putting Inferno Drainer Group Out of Business
The recent partnership between MetaMask and Blockaid has caused the notorious Inferno Drainer Group to shut down.

Attack Report: Ledger Connect Kit
Blockaid’s proactive dApp scanning system found a malicious payload in in the Ledger connect-kit SDK via a supply chain attack causing multiple dApps to serve malicious content for users.

Malicious dApp 101: Wallet Drainers Are Stealthier, More Complex than Ever
A look at how Wallet Drainers are becoming more and more sophisticated in utilizing web2 technologies to attempt to scam users and avoid detection.

Malicious dApps 101: Wallet Drainers
We want to make transacting in web3 as secure as opening a file on your computer or paying with your credit card on Amazon. This article aims to explain the characteristics of wallet drainers and why even the savviest crypto users need to be careful.