AccessDenied403 (@adcdiii) 's Twitter Profile
AccessDenied403

@adcdiii

Share my learning journey in the field of Blockchain, Crypto and Web3.
Security Engineer @taurus_hq

ID: 1540271775250096129

linkhttps://rya-sge.github.io/access-denied/ calendar_today24-06-2022 09:53:28

945 Tweet

191 Takipçi

3,3K Takip Edilen

SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨SlowMist TI Alert🚨 The exchange BigONE was exploited due to a supply chain attack and loss exceeds $27 million. The production network was compromised, and the operating logic of account and risk control related servers was modified, enabling the attacker to withdraw

🚨SlowMist TI Alert🚨

The exchange <a href="/BigONEexchange/">BigONE</a> was exploited due to a supply chain attack and loss exceeds $27 million. The production network was compromised, and the operating logic of account and risk control related servers was modified, enabling the attacker to withdraw
Sumit Gupta (CoinDCX) (@smtgpt) 's Twitter Profile Photo

Hi everyone, At CoinDCX : India Ka Crypto Coach, we have always believed in being transparent with our community, hence I am sharing this with you directly. Today, one of our internal operational accounts - used only for liquidity provisioning on a partner exchange - was compromised due to a

Scam Sniffer | Web3 Anti-Scam (@realscamsniffer) 's Twitter Profile Photo

💀 Pro tip for DeFi users: Stop using Google search for crypto sites unless you enjoy playing Russian roulette with your wallet! 🎲 Just checked: Aave, PancakeSwap, Pendle searches are ALL flooded with scam ads. One wrong click = game over!

💀 Pro tip for DeFi users: Stop using Google search for crypto sites unless you enjoy playing Russian roulette with your wallet! 🎲

Just checked: Aave, PancakeSwap, Pendle searches are ALL flooded with scam ads. One wrong click = game over!
OpenZeppelin (@openzeppelin) 's Twitter Profile Photo

OpenZeppelin Solidity Contracts 5.4 just dropped 💥 This release brings standard Account Abstraction primitives, advanced signature schemes (multisignature), interoperability features, and new utilities and data structures. 🧵👇

OpenZeppelin Solidity Contracts 5.4 just dropped 💥

This release brings standard Account Abstraction primitives, advanced signature schemes (multisignature), interoperability features, and new utilities and data structures.

🧵👇
WOO X (@_woo_x) 's Twitter Profile Photo

We're currently investigating a contained incident that occurred on WOO X earlier today While user funds and trading are unaffected, withdrawals have been temporarily paused while we complete the investigation. Stay tuned to this account for updates: support.woox.io/hc/en-us/artic…

Chaofan Shou (svm/acc) (@shoucccc) 's Twitter Profile Photo

Someone forgot to revoke approvals for Multichain Router V4, resulting in a 401 ETH instant hack by MEV bots. They first swapped 200ETH for WETH, which got immediately extracted. Then, they tested 1ETH and got extracted. Finally, they tried 200ETH and got extracted again.

Someone forgot to revoke approvals for Multichain Router V4, resulting in a 401 ETH instant hack by MEV bots. 

They first swapped 200ETH for WETH, which got immediately extracted. Then, they tested 1ETH and got extracted. Finally, they tried 200ETH and got extracted again.
Blockchain Threat Intelligence (@blockthreat) 's Twitter Profile Photo

BlockThreat - Week 31, 2025 💙 Sponsored by Coinspect Security 🧟 $3.5B stolen from LuBian miner in 2020! 🧑‍⚖️ Samourai Wallet defendants plead guilty. 💸 User lost 401 ETH to the old Multichain exploit ☹️ SuperRare typo. $730K stolen.

zak.eth (@0xzak) 's Twitter Profile Photo

I've been in crypto for over 10 years and I’ve Never been hacked. Perfect OpSec record. Yesterday, my wallet was drained by a malicious Cursor extension for the first time. If it can happen to me, it can happen to you. Here’s a full breakdown. 🧵👇

SlowMist (@slowmist_team) 's Twitter Profile Photo

🎣Our MistEye monitoring system recently detected a phishing site using Clickfix phishing techniques. These sites mimic common bot verification features to trick victims into executing malicious commands — leading to malware downloads. Such attacks often rely on social

🎣Our MistEye monitoring system recently detected a phishing site using Clickfix phishing techniques.

These sites mimic common bot verification features to trick victims into executing malicious commands — leading to malware downloads.

Such attacks often rely on social
BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

ALERT! Our system has detected two attack transactions targeting an unknown contract (0x5a46c6) on #BSC, resulting in a loss of ~$85K. Specifically, the attacker utilized EIP-7702 on its own address to leverage the flash loan callback function, manipulating prices and

ALERT! Our system has detected two attack transactions targeting an unknown contract (0x5a46c6) on #BSC, resulting in a loss of ~$85K. 

Specifically, the attacker utilized EIP-7702 on its own address to leverage the flash loan callback function, manipulating prices and
AccessDenied403 (@adcdiii) 's Twitter Profile Photo

"The malware did more than just steal SSH keys, npm tokens, and .gitconfig files - it weaponized AI CLI tools (including Claude, Gemini) to aid in reconnaissance and data exfiltration." stepsecurity.io/blog/supply-ch…

PeckShieldAlert (@peckshieldalert) 's Twitter Profile Photo

#PeckShieldAert Ethereum's L2 blockchain network StarkNet has been down for over 4 hours due to a service outage. x.com/Starknet/statu…

#PeckShieldAert Ethereum's L2 blockchain network StarkNet has been down for over 4 hours due to a service outage.
x.com/Starknet/statu…
AccessDenied403 (@adcdiii) 's Twitter Profile Photo

A big thank you to the Halborn team for the clear and insightful audit report. Really appreciate the professionalism during the process! CMTAT is open source and available on GitHub: github.com/CMTA/CMTAT