Blockchain Hacking Insights

Explore top LinkedIn content from expert professionals.

  • View profile for Keith King

    Former White House Lead Communications Engineer, U.S. Dept of State, and Joint Chiefs of Staff in the Pentagon. Veteran U.S. Navy, Top Secret/SCI Security Clearance. Over 16,000+ direct connections & 43,000+ followers.

    43,806 followers

    Immutable Malware: Blockchain-Based Attacks Introduce a New Cybersecurity Paradigm A new form of malware is redefining cyber threats by leveraging blockchain technology to create attacks that are nearly impossible to eliminate. This evolution signals a shift from traditional malware toward persistent, decentralized threat architectures. The attack begins deceptively, often through fake job offers targeting developers, where victims are encouraged to run seemingly harmless code. Once executed, the code initiates a complex attack chain that interacts with multiple blockchain networks, including TRON, Aptos, and Binance Smart Chain. Instead of hosting malicious payloads on centralized servers, the malware uses blockchain transactions as a permanent, publicly accessible storage layer, embedding instructions and pointers that guide the attack. Because blockchain data cannot be easily altered or removed, the malicious infrastructure becomes effectively permanent. This design introduces a significant challenge for cybersecurity defense. Traditional mitigation strategies rely on identifying and shutting down command-and-control servers, but in this case, the infrastructure is decentralized and immutable. Early reports indicate that hundreds of thousands of credentials across numerous organizations may already be compromised, with experts warning that the scale and persistence of this campaign could rival or exceed past global cyberattacks. This development matters because it represents a fundamental shift in how cyber threats are constructed and sustained. By exploiting the permanence and resilience of blockchain systems, attackers are creating a new class of malware that is resistant to conventional countermeasures. For organizations, this underscores the urgent need to rethink security architectures, emphasizing prevention, behavioral detection, and zero-trust principles in a landscape where threats can no longer be easily dismantled once deployed. I share daily insights with tens of thousands followers across defense, tech, and policy. If this topic resonates, I invite you to connect and continue the conversation. Keith King https://lnkd.in/gHPvUttw

  • View profile for Preetam Rao

    Co-Founder @QuillAudits | Digital-Asset Security for Banks, Fintechs & Web3 | 8+ yrs, 1500+ audits across tokenization & stablecoins

    35,894 followers

    🚨 $500,000 lost from a syntax highlighting extension. When we talk about Web3 hacks, people often think of re-entrancy bugs, private key leaks, or oracle manipulations. But sometimes… the attack vector is hiding where we least expect it, inside the very tools we use to build. Recently, Kaspersky's GReAT (Global Research and Analysis Team) researchers investigated a case where a blockchain developer lost half a million dollars because they installed a malicious Solidity extension in Cursor, an AI-powered IDE based on VS Code. Let that sink in for a moment. Fresh machine. Clean install. Only essential tools. The developer did everything "right", except for one crucial oversight that cost them everything. Here's what happened, and why it should terrify every web3 team: • Developer needs Solidity syntax highlighting for Cursor AI. • Searches Open VSX registry. • Finds "Solidity Language" extension with 54,000+ downloads. Looks legit, right? That extension was installing remote access tools, keyloggers, and wallet stealers. By the time the developer realized something was wrong, attackers had full control of their machine. The attackers: • Pumped fake download numbers to 2 million. • Gamed the ranking algorithm to appear above legitimate extensions. • Created multiple variants across different stores. • Built a complete infection chain: PowerShell → ScreenConnect → RATs → Wallet drain. We audit smart contracts line by line, but developers are installing random extensions that can compromise everything before a single line of code gets deployed. Think about it: Your team spends months building secure protocols, goes through rigorous audits, implements best practices... and then a developer installs a fake extension that gives attackers access to deployment keys, private repositories, and treasury wallets. We're so focused on code security that we've ignored developer environment security. Three questions for your team: • Do you have policies around development tool installations? • Are your developers using separate, isolated environments for crypto work? • What happens if your lead developer's machine gets completely compromised tomorrow? This attack specifically targeted blockchain developers. The extension names, the ranking manipulation, the payload design, everything was crafted for our industry. The attackers know we rely heavily on open-source tools. They know we move fast and install whatever helps us ship code faster. And they're exploiting that trust. Your smart contracts might be secure, but if your developers' machines aren't, none of that matters.

  • View profile for Patrick Tan

    ⚖Lawyer & Founder💡| Blockchain Intelligence | Crypto-assets | Tokenization | Real World Assets (RWAs) | Legal Structuring | ✈Ex-Airline Pilot

    4,227 followers

    🚨 𝗔 𝗗𝗲𝗲𝗽𝗲𝗿 𝗗𝗶𝘃𝗲 𝗶𝗻𝘁𝗼 𝘁𝗵𝗲 𝗕𝘆𝗯𝗶𝘁 𝗛𝗮𝗰𝗸🚨 We're excited to finally share our joint case study between ChainArgos and Allium, taking a deeper dive into the $1.5 billion Bybit hack! This collaboration showcases the immense power of combining cutting-edge blockchain data with specialized financial analysis to expose sophisticated illicit activities. Our synergy brings together Allium's unparalleled cross-chain data capabilities, which allows us to track and visualize every interaction within five layers of transactions on Ethereum, involving billions in cumulative volume. Paired with ChainArgos' expertise in applying traditional financial tools to blockchain transactions, we've gained unprecedented insights that go far beyond mere transaction tracing. In this report, we reveal how the Lazarus Group discreetly laundered US$386 million through DeFi aggregators, highlighting the significant role of protocols like PancakeSwap which processed US$263 million alone. Crucially, our analysis demonstrates how an inexplicable 155% surge in ETH deposits to THORChain immediately following the hack should have instantly alerted observers, as it was almost entirely attributable to the hackers. Perhaps most significantly, we identified specific "service providers" who pre-funded 41 hacker-controlled wallets, effectively creating a critical leverage point for authorities. This proactive identification of key facilitators and their economic purpose is what truly enables actionable intelligence. 🥷 𝗨𝗻𝗽𝗿𝗲𝗰𝗲𝗱𝗲𝗻𝘁𝗲𝗱 𝗜𝗻𝘀𝗶𝗴𝗵𝘁𝘀 𝗶𝗻𝘁𝗼 𝗖𝗿𝘆𝗽𝘁𝗼 𝗛𝗮𝗰𝗸𝘀 Our joint report reveals the hidden trails of the Bybit hack, showing how advanced analytics can expose complex money laundering schemes by identifying key DeFi protocols and aggregators used. 📈 𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗗𝗮𝘁𝗮 & 𝗙𝗶𝗻𝗮𝗻𝗰𝗶𝗮𝗹 𝗟𝗲𝗻𝘀 See how Allium's cross-chain data combined with ChainArgos' financial analysis identified clear anomalies, like the massive 155% surge in THORChain activity directly linked to the hack, providing crucial real-time indicators. 💪 𝗕𝗲𝘆𝗼𝗻𝗱 𝗧𝗿𝗮𝗰𝗶𝗻𝗴 - 𝗔𝗰𝘁𝗶𝗼𝗻𝗮𝗯𝗹𝗲 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 We demonstrate that simply following funds isn't enough. Our approach identifies who is enabling illicit activity, pinpointing service providers and critical weak points that can provide law enforcement and regulators with crucial leverage to act. Read the full report to understand how we're setting new standards for blockchain investigations! Special thanks to Ethan Chan and his team at Allium for making this possible, and especially Marcus Chua, Carlos Eduardo C. and Luke Wilson for their relentless pursuit of the truth! It is a privilege and a pleasure to work with all of you. #BybitHack #BlockchainIntelligence #CryptoSecurity #DeFi #Allium #ChainArgos #Cybersecurity

  • Imagine this, $1.5 BILLION lost to hackers. This is exactly what just happened with the ByBit attack Heres what every executive and board member should know about the hack: The hack was a multi layered attack combining smart contract manipulation and a supply chain breach, a growing risk for financial platforms. How the Attack Unfolded: 1️⃣ Wallet Interface Manipulation Hackers altered the smart contract logic while displaying legitimate addresses, tricking the system into approving unauthorized transactions. 2️⃣ Supply Chain Breach Attackers injected malicious code into Safe Wallet, a third-party service used by ByBit, compromising its infrastructure. 3️⃣ Attribution to Lazarus Group The FBI linked the attack to North Korea’s state-sponsored Lazarus Group, which has a history of targeting cryptocurrency platforms. Key Takeaways for Business Leaders: 🔹 Third-party risk is a major vulnerability Companies must enforce stronger security assessments for vendors handling critical infrastructure. 🔹 Crypto platforms remain high-value targets State-sponsored groups are evolving tactics, exploiting smart contract and wallet security flaws. 🔹 Proactive monitoring is essential Continuous security validation and supply chain threat detection must be prioritized to prevent similar breaches. As financial services integrate blockchain and smart contracts, supply chain security and transaction integrity will be critical to mitigating risks.

  • View profile for Ari Redbord

    Global Head of Policy and Government Affairs at TRM Labs

    33,180 followers

    🚨 New TRM Labs Data Drop: Spoiler - 2025 is already a record setting year for hacks. In just the first half of 2025, over $2.1 billion has been stolen in 75+ hacks, marking the largest H1 total ever — up 10% from 2022’s record and nearly matching all of 2024. The average hack now tops $30 million, double last year’s. That surge was led by the Bybit hack in February — a $1.5 billion theft we assess was carried out by North Korea, the largest crypto hack in history. It alone accounts for nearly 70% of total losses, and helps explain why North Korea-linked groups stole $1.6 billion in H1 — more than any other actor by far. This is no longer just cybercrime — it's statecraft. Our data shows DPRK continues to exploit crypto theft to evade sanctions and fund weapons development. Meanwhile, other state-linked actors are entering the fray: in June 2025, alleged Israeli group Gonjeshke Darande (Predatory Sparrow) hacked Iran’s Nobitex exchange, stealing $90 million and sending funds to unspendable vanity addresses — a clear political statement, not a financial one. 👨💻How the hacks are happening: 🔨 Infrastructure attacks — including private key theft and front-end compromises — made up 80% of losses, and were 10x larger than other attacks. ✨ DeFi protocol exploits — like flash loans and reentrancy — accounted for 12%, underscoring persistent smart contract vulnerabilities. 🙋♀️ What it means: H1 2025 marks a turning point. Crypto hacks are now part of geopolitical conflict, with state actors using theft as a tool of foreign policy. Defenses must go beyond audits and MFA — we need industry-wide insider threat detection, advanced social engineering defenses, and state-level response coordination. 🛣️ The way forward: Only a global, coordinated effort—across law enforcement, regulators, and blockchain intelligence—can keep pace. As crypto intersects more deeply with national security, the threats are no longer theoretical. They're operational. Read the full report in the comments ⬇️

  • View profile for Favour Arum

    Fullstack Blockchain Developer || Smart Contracts || Solidity || Rust || Forward Deployed Engineer || Palantir Foundry

    4,524 followers

    𝐈𝐟 𝐁𝐥𝐨𝐜𝐤𝐜𝐡𝐚𝐢𝐧 𝐈𝐬 𝐒𝐨 𝐒𝐞𝐜𝐮𝐫𝐞… 𝗪𝐡𝐲 𝐃𝐨𝐞𝐬 𝐈𝐭 𝐊𝐞𝐞𝐩 𝐆𝐞𝐭𝐭𝐢𝐧𝐠 𝐇𝐚𝐜𝐤𝐞𝐝? 🤷♂️ You should prolly read this before you say “Web3 is the future” again. It’s a question I hear almost every week: “If blockchain is immutable and secure, why do we keep hearing about hacks?” Great question. Now the answer? It’s because the blockchain is secure. But the apps built on it? Not always. 𝙇𝙚𝙩’𝙨 𝙗𝙧𝙚𝙖𝙠 𝙩𝙝𝙞𝙨 𝙙𝙤𝙬𝙣 👇 First, Understand the Layers of Web3 Blockchain is like the internet’s foundation. But the actual apps, DEXs, NFT marketplaces, lending protocols are like websites and platforms built on top of that foundation. The blockchain stores the data securely, but what you build with it is up to you. It’s like saying: “Steel is strong, so why did the building collapse?” Because the engineer messed up, not the steel. You get it now? 𝙀𝙭𝙖𝙢𝙥𝙡𝙚: 𝙏𝙝𝙚 𝙈𝙪𝙣𝙘𝙝𝙖𝙗𝙡𝙚𝙨 𝙃𝙖𝙘𝙠 ($63 𝙈𝙞𝙡𝙡𝙞𝙤𝙣) Just over a year ago (March 2024), the Munchables game on the Blast L2 chain was exploited for over $63 million. The twist? It wasn’t a brute-force hack. It wasn’t a smart contract bug. It was an inside job, a developer embedded a backdoor weeks earlier during the initial contract deployment. Crazy right?😂 𝙏𝙝𝙚 𝙙𝙚𝙫 𝙬𝙖𝙡𝙠𝙚𝙙 𝙖𝙬𝙖𝙮 𝙬𝙞𝙩𝙝 𝙖𝙡𝙡 𝙪𝙨𝙚𝙧 𝙛𝙪𝙣𝙙𝙨… 𝙪𝙣𝙩𝙞𝙡 𝙩𝙝𝙚 𝙩𝙚𝙖𝙢 𝙨𝙤𝙢𝙚𝙝𝙤𝙬 𝙘𝙤𝙣𝙫𝙞𝙣𝙘𝙚𝙙 𝙝𝙞𝙢 𝙩𝙤 𝙧𝙚𝙩𝙪𝙧𝙣 𝙞𝙩. (𝙒𝙝𝙞𝙘𝙝 𝙞𝙨 𝙃𝙞𝙜𝙝𝙡𝙮 𝙞𝙧𝙧𝙚𝙜𝙪𝙡𝙖𝙧.)🤷♂️ Now What Went Wrong? • No multi-sig access control • No external audit before deployment • Trusted devs too much, verified too little • No monitoring of deployer permissions 𝐒𝐨 𝐇𝐨𝐰 𝐃𝐨 𝐖𝐞 𝐒𝐨𝐥𝐯𝐞 𝐓𝐡𝐢𝐬? Here are 6 steps we must normalize as builders: 1. Audits are mandatory, not optional 2. Use formal verification for mission-critical protocols 3. Never trust single-signer deployments 4. Fuzz test every edge case using tools like Foundry 5. Implement upgradability protections carefully 6. Educate users — scams thrive on ignorance 𝙏𝙝𝙚 𝙥𝙧𝙤𝙗𝙡𝙚𝙢 𝙞𝙨𝙣’𝙩 𝙗𝙡𝙤𝙘𝙠𝙘𝙝𝙖𝙞𝙣. The problem is humans building insecure systems on top of secure networks. Just like in Web2 the cloud is safe, but your password might be “123456”. Until we take security as seriously as we take funding rounds, we’ll keep seeing headlines that make the whole space look bad. If you’re a founder, builder, or investor in Web3: prioritize security. Please 🙏 Repost this so every Web3 dev starts taking security as seriously as hype. #Blockchain #Web3 #SmartContracts #Security #Hack #DeFi #Crypto #Solidity #Auditing #Munchables #Blast #Ethereum #CyberSecurity #Web3Builders

  • View profile for Angela Ang
    Angela Ang Angela Ang is an Influencer

    Head of Policy & Strategic Partnerships, APAC @ TRM Labs | Blockchain Intelligence & Crypto Compliance | Former MAS Regulator | INSEAD MBA

    14,413 followers

    🚨 Bybit Hack Update The TRM Labs team, along with our partners across the ecosystem, continue to follow the stolen funds from North Korea's $1.5 billion hack of Bybit. As of February 26, we’ve tracked over $400 million in stolen funds being laundered across multiple blockchains. As you can see from our investigator's graph on screen, the attackers are hopping through wallets, swapping tokens, and using decentralized exchanges and cross-chain bridges in an attempt to obfuscate their activities. While the North Korean hackers experimented with different assets early on, nearly all of the stolen eeth is now being converted into Bitcoin. Some funds briefly moved through Binance Smart Chain and Solana, but right now, most of that Bitcoin is just sitting there, barely moved. So, what’s next? Traditionally, we'd expect North Korea to funnel the stolen funds into a mixer. But, no mixer can reasonably obscure the volumes associated with this hack, especially given the speed at which the funds are moving now. Instead, we could be seeing an intensified version of North Korea’s "flood the zone" tactic, overwhelming compliance teams, blockchain analysts, and law enforcement agencies with rapid, high-frequency transactions across multiple platforms, thereby complicating tracking efforts. But a critical countermeasure is Bybit’s innovative bounty program that will pay out 10% on any frozen transaction. That means we’re likely to see a surge of both amateur and professional blockchain investigators joining the hunt, which will putt even more pressure on the attackers. The next few weeks will be pivotal in determining whether investigators can stay ahead of the attackers or if the launderers can successfully cash out. Read more here: https://lnkd.in/g4VfcsBE

  • View profile for Sofien Kaabar, CFA

    Founder of Quant Atlas | Quantitative Researcher | Author of O’Reilly’s Deep Learning for Finance

    32,076 followers

    A crypto trader asked ChatGPT for help. 30 minutes later, his entire wallet was empty. This may be the first documented AI-poisoning attack targeting a Solana trader. Most people still do not realize this risk exists. Here is what happened: In November 2024, a trader known as Rocky (@r_cky0 on X) wanted to build a simple trading bot for Pump.fun on Solana. Like many developers today, he turned to AI for help. He asked ChatGPT to guide him through the process. That decision cost him $2,500 in crypto. But this was not a traditional hack. It was something more subtle: AI poisoning. Scammers had spent months uploading malicious code into public GitHub repositories. These repositories contaminated the data ecosystem that AI tools rely on when suggesting resources and code. As a result, ChatGPT recommended what appeared to be a legitimate Solana API. It was not. The API site required Rocky’s private key to function. Within 30 minutes, his wallet was completely drained. Blockchain investigators later discovered the scale of the operation: • Over $258,000 in stolen crypto • $147,211 in USDC alone • 107 different token accounts involved The GitHub account responsible, solanaapisdev, had spent four months uploading poisoned code before launching the attack. This was not random. It was carefully planned. The biggest lesson here? AI tools are incredibly powerful, but they are not a security authority. If you work with crypto, Web3, or blockchain development, keep these rules in mind: • Never share your private key with any tool or API • Use separate wallets for testing new code • Verify the source of APIs and repositories manually • Never run AI-generated code without reviewing it first • Always test with small amounts Your private key equals your money. Treat it like the password to your entire bank account. AI is transforming how we build and interact with technology. But as this case shows, it is also creating entirely new attack surfaces. The future of Web3 security will include defending against AI-assisted scams and data poisoning attacks. Stay vigilant. Source: Abasienyene Ekperikpe

  • View profile for Petro Golovko, D.Sc., Ph.D.

    Trust Protector at British Gold Trust ⟡ Private Monetary Infrastructure ⟡ Gold as Final Settlement ⟡ Continuity Under Stress

    3,279 followers

    The Hidden Ledger of Loss: Blockchain Hacks and the Myth of “Tokenize Everything” Over the past decade, the blockchain industry has not only created new markets - it has also created new attack surfaces. The numbers are staggering: 📉 Cumulative stolen funds (2011-2024): over $13 billion in documented thefts 🔓 Largest single hack: Ronin Network, 2022 - $620 million stolen 📆 Record year: 2022 - $3.8 billion lost to hacks (Chainalysis data) From DAO exploits (2016) to DeFi bridge breaches, the same lesson repeats: “Code is law” is meaningless when the law is buggy. And yet, amid this track record of systemic vulnerability, the industry is racing toward total tokenization - from real estate to equities, from art to carbon credits. The sales pitch is always the same: efficiency, transparency, accessibility. But here’s what’s missing from the glossy decks: 1️⃣ Custody risk - Tokens are only as secure as the wallets and smart contracts that hold them. 2️⃣ Pricing risk - Off-chain assets rely on oracles and intermediaries; manipulate one, and the token loses meaning. 3️⃣ Legal mismatch - Many “tokenized” products offer no real ownership, no voting rights, and no legal recourse. 4️⃣ Liquidity illusion - Without deep, continuous market-making, “instant tradability” collapses when hype fades. The question no one selling the dream wants to answer: If the blockchain world can’t even secure its own native assets, why are we so eager to migrate everything onto it? Sometimes, the best innovation is knowing when not to apply technology. #Blockchain #Tokenization #Cybersecurity #Finance #RiskManagement #DigitalAssets

  • View profile for Elena Bobkova, J.D., LL.M.

    AI Governance & Cybersecurity | Lead Auditor | Professor of Practice in Law & Compliance | Public Speaker | 100 farm animals proud owner 🐓🐐🪿🦆🐦⬛🐈⬛ | using my farm as AI security case study

    3,950 followers

    🛡️ 2025: The Worst Year for Crypto Hacks… So Far By mid-2025, over $1.93 billion had already been stolen in crypto crimes — surpassing the entire total for 2024. 🔍 The biggest headlines: The ByBit Hack — $1.5B gone, traced back to North Korean cybercriminal groups. A 40% jump in phishing scams, with fake exchange websites luring individual users across the globe. International arrests in Nigeria and the Philippines uncovered sprawling scam networks with ties to multiple jurisdictions. 🧠 What it really means: AI-assisted attacks are scaling everything — from prompt injection in smart contracts to phishing emails that read like your best friend wrote them. The industry still lacks universal identity and access control standards. On-chain forensic tools (Chainalysis, Elliptic, etc.) are no longer “nice to have.” They’ve become the only way law enforcement can even begin to trace this mess. ⚠️ But here’s the darker layer: while money is leaking by the billions, there are still no global security frameworks or governance structures for Bitcoin or AI. A few companies and countries experiment with enforcement, but the reality is there’s no shared backbone, no reinforcement, and no binding standards. In other words — the riskiest industries on the planet are running without seatbelts. 📍 Until that gap is closed, expect the hacks to keep growing in scale, sophistication, and cost. 👉 In the next posts I’ll walk through how standards like ISO 27001 and 42001 could form the missing guardrails — if the industry is brave enough to adopt them. #responsibleAI #informationsecurity #blockchain

Explore categories