BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile
BlockSec Phalcon

@phalcon_xyz

A Platform to Monitor and Block Hacks | The only one boasting dozens of successful white-hat rescues. | Built by @BlockSecTeam

👉TG: t.me/BlockSecTeam

ID: 1278266969532203008

linkhttps://blocksec.com/phalcon calendar_today01-07-2020 09:59:43

855 Tweet

5,5K Followers

39 Following

BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

Our system has detected a series of attacks targeting Bankroll Network across both Ethereum and BSC, resulting in total losses of ~$400K since Sep 2024. Attempts to contact the project team have received no response. These attacks exploit the same root vulnerability in the

Our system has detected a series of attacks targeting <a href="/Bankroll_Status/">Bankroll Network</a> across both Ethereum and BSC, resulting in total losses of ~$400K since Sep 2024. Attempts to contact the project team have received no response.

These attacks exploit the same root vulnerability in the
BlockSec (@blocksecteam) 's Twitter Profile Photo

Thrilled to partner with interlace.money, a true innovator bridging Web2 and Web3 finance. We're excited to work with a team that places such a high priority on security and compliance. This is precisely why we built our Phalcon Compliance App. It empowers partners like

BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

Phalcon Explorer supports HyperEVM now Hyperliquid You can see the call trace of HyperEVM to understand the transaction. A simple transaction: app.blocksec.com/explorer/tx/hy…

Phalcon Explorer supports HyperEVM now <a href="/HyperliquidX/">Hyperliquid</a> 

You can see the call trace of HyperEVM to understand the transaction.

A simple transaction:

app.blocksec.com/explorer/tx/hy…
BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

ALERT! Our system has detected a series of malicious transactions targeting an unverified contract (0x16d7c6f43df19778e382b7a84bcb8c763971a551) on the Binance Smart Chain (BSC), with losses exceeding $600K. Since the contract is not open-source, our investigation indicates the

BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

.SuperRare’s staking contract (v1) on #Ethereum was exploited, with the root cause traced to a flawed updateMerkleRoot function—key validation checks were incorrectly inverted. As a result, instead of restricting updates to privileged accounts (e.g., the owner), any account

.<a href="/SuperRare/">SuperRare</a>’s staking contract (v1) on #Ethereum was exploited, with the root cause traced to a flawed updateMerkleRoot function—key validation checks were incorrectly inverted. As a result, instead of restricting updates to privileged accounts (e.g., the owner), any account
BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

ALERT! Our system has detected a suspicious transaction targeting an unknown contract on #Ethereum, resulting in a loss of $19K. Please revoke any approvals to 0xf4a21ac7e51d17a0e1c8b59f7a98bb7a97806f14 ASAP. Subscribe to Phalcon to monitor attacks and take automatic actions:

BlockSec Phalcon (@phalcon_xyz) 's Twitter Profile Photo

ALERT! Our system has detected a suspicious transaction targeting a contract (0x9a15bb) associated with Wall Street Pepe on #Ethereum, resulting in a ~$10K loss. Given that the contract’s implementation is not open-source, we suspect this may be a typical case of spot price dependency

ALERT! Our system has detected a suspicious transaction targeting a contract (0x9a15bb) associated with <a href="/WEPEToken/">Wall Street Pepe</a> on #Ethereum, resulting in a ~$10K loss. Given that the contract’s implementation is not open-source, we suspect this may be a typical case of spot price dependency