Elad Ernst (@eladernst) 's Twitter Profile
Elad Ernst

@eladernst

Cyber Security Researcher at
@blockaid_

ID: 1155440097526996998

calendar_today28-07-2019 11:29:21

471 Tweet

764 Followers

316 Following

Blockaid (@blockaid_) 's Twitter Profile Photo

Blockaid's onchain monitoring platform detected in real time the $274M Kelp incident that began at ~17:35 UTC. We have been working with them and our customers to understand the compromise, and our immediate recommendation is: If you operate a LayerZero OFT or OApp -

Blockaid's onchain monitoring platform detected in real time the $274M <a href="/KelpDAO/">Kelp</a> incident that began at ~17:35 UTC. We have been working with them and our customers to understand the compromise, and our immediate recommendation is:

If you operate a <a href="/LayerZero_Core/">LayerZero</a> OFT or OApp -
Blockaid (@blockaid_) 's Twitter Profile Photo

Yesterday, Blockaid's automated detection flagged a smart contract exploit on Scallop on Sui in real time. Post detection, Blockaid enabled rapid coordination with MystenLabs.sui and the Scallop team to freeze attacker funds and prevent further losses.

Blockaid (@blockaid_) 's Twitter Profile Photo

🚨 Blockaid detected and flagged an active exploit on Aftermath Finance (🥚, 🥚) Perpetuals on Sui. ~$1.1M USDC was drained across 11 transactions in ~36 minutes by attacker 0x1a65086c85114c1a3f8dc74140115c6e18438d48d33a21fd112311561112d41e. The exploit targeted a bug in the perp

Tangem (@tangem) 's Twitter Profile Photo

~$15.5M funds saved. 1.2K sketchy dApps blocked. 83K malicious txs caught. One year ago, we integrated Blockaid into all WalletConnect sessions on Tangem. Safer web3 isn’t the goal; it’s the baseline.

~$15.5M funds saved. 1.2K sketchy dApps blocked. 83K malicious txs caught.

One year ago, we integrated <a href="/blockaid_/">Blockaid</a> into all <a href="/WalletConnect/">WalletConnect</a> sessions on Tangem. Safer web3 isn’t the goal; it’s the baseline.
Aftermath Finance (🥚, 🥚) (@aftermathfi) 's Twitter Profile Photo

Update: Great news. Thanks to support from MystenLabs.sui and Sui Foundation all users will be made whole ZERO losses for anyone. Aftermath will be up and running again soon. Thank you to both teams and to Blockaid for the rapid response. For clarity: this was not a Move

Blockaid (@blockaid_) 's Twitter Profile Photo

🚨Community Alert: Ongoing exploit on SWEAT💧 on NEAR Protocol. Exploiter: 3be304b2151870b2be88b9de0b80acab921337ad152584138bd852fc6e9ae018 Largest exploit tx: DvrSMfY85Anc6AuLUmoEDkDdab7qX5NUZLu76HN8NoPn

Blockaid (@blockaid_) 's Twitter Profile Photo

🚨 Blockaid's exploit detection system identified an on-going admin-key compromise exploit on Wasabi Protocol 🟢 across Ethereum and Base. The Wasabi: Deployer EOA was used to grant ADMIN_ROLE to an attacker helper contract, which then UUPS-upgraded the perp vaults and LongPool to

idobn (@idobn) 's Twitter Profile Photo

When working with onchain assets, you need to detect and respond to attacks in seconds and minutes, not hours. The need for speed is real. @Blockaid_ gives teams the speed and agility they need to act and contain the damage in real time.

When working with onchain assets, you need to detect and respond to attacks in seconds and minutes, not hours. 

The need for speed is real. 

@Blockaid_ gives teams the speed and agility they need to act and contain the damage in real time.
Blockaid (@blockaid_) 's Twitter Profile Photo

🚨Blockaid's exploit detection system has identified an on-going exploit on an Ekubo custom extension contract on Ethereum. $1.4M drained so far. Ekubo users are not at risk. Only users who have approved this specific v2 contract as a spender (any token) are at