Erol Rsync | Web3 (@web3rsync) 's Twitter Profile
Erol Rsync | Web3

@web3rsync

Securing smart contracts | Managing risks | Digital forensic | #Ethereum block builder | Ape🍌

ID: 234878409

calendar_today06-01-2011 20:09:03

3,3K Tweet

153,153K Takipçi

469 Takip Edilen

ZachXBT (@zachxbt) 's Twitter Profile Photo

1/ Multiple projects tied to Pepe creator Matt Furie & ChainSaw as well as another project Favrr were exploited in the past week which resulted in ~$1M stolen My analysis links both attacks to the same cluster of DPRK IT workers who were likely accidentally hired as developers.

1/  Multiple projects tied to Pepe creator Matt Furie & ChainSaw as well as another project Favrr were exploited in the past week which resulted in ~$1M stolen

My analysis links both attacks to the same cluster of DPRK IT workers who were likely accidentally hired as developers.
Web3 Antivirus (@web3_antivirus) 's Twitter Profile Photo

❗️ A wallet drainer resulted in a massive loss of $115k. The attacker first executed a suspicious approval transaction, swiftly followed by an unauthorized transfer transaction. Victim 0x3c25f384e40eac0fa8eaea0a140253c99fe54b12

❗️ A wallet drainer resulted in a massive loss of $115k.

The attacker first executed a suspicious approval transaction, swiftly followed by an unauthorized transfer transaction.

Victim
0x3c25f384e40eac0fa8eaea0a140253c99fe54b12
Cos(余弦)😶‍🌫️ (@evilcos) 's Twitter Profile Photo

被盗项目 Resupply 终于在链上给黑客的两个地址喊话了? 喊话来源地址: etherscan.io/address/0x1101… 标记是 Resupply: Deployer 1,不过这个喊话信息没在 Resupply 推文上公示。但大概率是项目方的喊话,因为链上我做了初步的关联分析。我还发现了一些其他有意思的点,以后有必要时会再提...

被盗项目 <a href="/ResupplyFi/">Resupply</a> 终于在链上给黑客的两个地址喊话了?

喊话来源地址: etherscan.io/address/0x1101…

标记是 Resupply: Deployer 1,不过这个喊话信息没在 <a href="/ResupplyFi/">Resupply</a> 推文上公示。但大概率是项目方的喊话,因为链上我做了初步的关联分析。我还发现了一些其他有意思的点,以后有必要时会再提...
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨SlowMist TI Alert🚨 Resupply appears to have sent on-chain messages to Exploiter 2 and Exploiter 3, saying "Let's talk over blockscan chat". — signaling a request for further communication. 1⃣etherscan.io/tx/0xa2a364253… 2⃣etherscan.io/tx/0x83d809200…

🚨SlowMist TI Alert🚨

<a href="/ResupplyFi/">Resupply</a> appears to have sent on-chain messages to Exploiter 2 and Exploiter 3, saying "Let's talk over blockscan chat". — signaling a request for further communication.

1⃣etherscan.io/tx/0xa2a364253…

2⃣etherscan.io/tx/0x83d809200…
Scam Sniffer | Web3 Anti-Scam (@realscamsniffer) 's Twitter Profile Photo

🧵 [1/4] 🚨 ScamSniffer H1 2025 Phishing Report H1 2025: $39.33M lost across 43,628 victims 5 whale attacks >$1M accounted for $9.97M (25% of total losses), while monthly figures swung from $10.25M peak (Jan) to $2.80M low (Jun) 📊

🧵 [1/4] 🚨 ScamSniffer H1 2025 Phishing Report
H1 2025: $39.33M lost across 43,628 victims

5 whale attacks &gt;$1M accounted for $9.97M (25% of total losses), while monthly figures swung from $10.25M peak (Jan) to $2.80M low (Jun) 📊
ZachXBT (@zachxbt) 's Twitter Profile Photo

1/ My recent investigation uncovered more than $16.58M in payments since January 1, 2025 or $2.76M per month has been sent to North Korean IT workers hired as developers at various projects & companies. To put this in perspective payments range from $3K-8K per month meaning

1/ My recent investigation uncovered more than $16.58M in payments since January 1, 2025 or $2.76M per month has been sent to North Korean IT workers hired as developers at various projects &amp; companies. 

To put this in perspective payments range from $3K-8K per month meaning
SlowMist (@slowmist_team) 's Twitter Profile Photo

On July 2, a victim reached out to the SlowMist team after losing crypto assets. The cause? Running a seemingly legitimate GitHub project — zldp2002/solana-pumpfun-bot. 🕳️What looked safe turned out to be a cleverly disguised trap. Our analysis revealed: 1️⃣The perpetrator

On July 2, a victim reached out to the SlowMist team after losing crypto assets. The cause? Running a seemingly legitimate GitHub project — zldp2002/solana-pumpfun-bot.

🕳️What looked safe turned out to be a cleverly disguised trap. 

Our analysis revealed:

1️⃣The perpetrator
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨SlowMist TI Alert🚨 MistEye has detected potential suspicious activities related to GMX 🫐 , involving a $42M ( $USDC, $DAI, $LINK, $WETH, etc). 🧩 Initial funds: July 7: 2 $ETH withdrawn from TornadoCash, bridged to Arbitrum via Mayan. 💸 Fund flow: Some funds bridged to

🚨SlowMist TI Alert🚨

MistEye has detected potential suspicious activities related to <a href="/GMX_IO/">GMX 🫐</a> , involving a $42M ( $USDC, $DAI, $LINK, $WETH, etc).

🧩 Initial funds:
July 7: 2 $ETH withdrawn from TornadoCash, bridged to Arbitrum via Mayan.

💸 Fund flow:
Some funds bridged to
SlowMist (@slowmist_team) 's Twitter Profile Photo

The root cause of this attack stems from GMX 🫐 v1's design flaw where short position operations immediately update the global short average prices (globalShortAveragePrices), which directly impacts the calculation of Assets Under Management (AUM), thereby allowing manipulation

The root cause of this attack stems from <a href="/GMX_IO/">GMX 🫐</a>  v1's design flaw where short position operations immediately update the global short average prices (globalShortAveragePrices), which directly impacts the calculation of Assets Under Management (AUM), thereby allowing manipulation
vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

My response to AI 2027: vitalik.eth.limo/general/2025/0… The AI 2027 post is high quality, I encourage people to read it at ai-2027.com I argue a misaligned AI will not be able to win nearly as easily as the AI 2027 scenario assumes, because it greatly underrates our

SlowMist (@slowmist_team) 's Twitter Profile Photo

Recent attack on GMX (GMX 🫐) resulted in over $42M in losses. Here’s a summary of our analysis: Root causes: 1️⃣GMX v1 updates globalShortAveragePrices when opening shorts but not when closing. 2️⃣It immediately increases globalShortSizes on short position creation. These

Recent attack on GMX (<a href="/GMX_IO/">GMX 🫐</a>) resulted in over $42M in losses. Here’s a summary of our analysis:

Root causes:

1️⃣GMX v1 updates globalShortAveragePrices when opening shorts but not when closing.
2️⃣It immediately increases globalShortSizes on short position creation.

These
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨On June 26, the online investment platform "#鑫慷嘉 DGCX (XinKangJia DGCX)" abruptly shut down all withdrawal channels. Users soon found their accounts frozen or wiped, sparking widespread alarm. While no official data has been released, investors claim the scam may involve

🚨On June 26, the online investment platform "#鑫慷嘉 DGCX (XinKangJia DGCX)" abruptly shut down all withdrawal channels. Users soon found their accounts frozen or wiped, sparking widespread alarm.

While no official data has been released, investors claim the scam may involve
Lookonchain (@lookonchain) 's Twitter Profile Photo

The #BigONE exchange was hacked and lost over $27M. Currently, the hacker has exchanged the stolen assets for 120 $BTC($14.15M), 23.316M $TRX($7.01M), 1,272 $ETH($4M) and 2,625 $SOL($428K). Address: bc1qwxm53zya6cuflxhcxy84t4c4wrmgrwqzd07jxm TCAfB8jHbJ56xwmfwKwWEs8HLRjbC2GfHG

The #BigONE exchange was hacked and lost over $27M. 

Currently, the hacker has exchanged the stolen assets for 120 $BTC($14.15M), 23.316M $TRX($7.01M), 1,272 $ETH($4M) and 2,625 $SOL($428K).

Address:
bc1qwxm53zya6cuflxhcxy84t4c4wrmgrwqzd07jxm
TCAfB8jHbJ56xwmfwKwWEs8HLRjbC2GfHG