BREAKING
KELP DAO $292M drained via forged LayerZero DVN messages — Lazarus Group 19 APR 2026

Bridge Exploits

1 article

Cross-chain bridge contracts hold locked assets on one chain and mint wrapped tokens on another. Attackers forge withdrawal proofs, exploit validator threshold bugs, or manipulate the verification logic to drain the locked side.

Notable incidents
Kelp DAO ($292M)Ronin ($625M)Nomad ($190M)
Read investigations →
🎭

Social Engineering

1 article

Long-term infiltration of development teams — fake employees, compromised contractors, or insider threats plant malicious code or steal signing keys. Nation-state groups like Lazarus operate campaigns spanning months.

Notable incidents
Drift Protocol ($285M)Bybit ($1.4B)Radiant Capital ($50M)
Read investigations →
📈

Price Manipulation

1 article

Attackers use flash loans or large capital positions to move thin on-chain oracle prices, then exploit protocols that rely on those prices for collateral valuation, liquidation thresholds, or payout calculations.

Notable incidents
Hyperliquid POPCAT ($6M)Mango Markets ($114M)Euler ($197M)
Read investigations →

Flash Loans

Uncollateralised loans borrowed and repaid within a single transaction block. They amplify capital for price manipulation, governance attacks, and reentrancy exploits — requiring zero upfront capital from the attacker.

Notable incidents
bZx ($1M)PancakeBunny ($45M)Platypus ($8.5M)
🔄

Reentrancy

A contract calls an external address before updating its own state. The external address re-enters the original contract and drains funds before the balance is decremented. The original DeFi vulnerability class.

Notable incidents
The DAO ($60M, 2016)Curve Finance ($61M, 2023)Fei Protocol ($80M)
🔮

Oracle Attacks

On-chain price oracles report external data to smart contracts. Attackers manipulate spot prices on low-liquidity DEX pools that serve as oracles, or exploit stale data windows in aggregators like Chainlink.

Notable incidents
Cream Finance ($130M)Inverse Finance ($15M)Nirvana ($3.5M)
🗝

Private Key Theft

Compromised infrastructure, leaked .env files, malicious dependencies (supply chain), or phishing give attackers direct access to admin or treasury signing keys — bypassing all smart contract security entirely.

Notable incidents
Atomic Wallet ($35M)LastPass → $160M+Multichain ($126M)
🔓

Access Control

Missing or misconfigured access modifiers on privileged contract functions — initializers callable by anyone, admin functions without ownership checks, or proxy upgrade paths left unprotected.

Notable incidents
Poly Network ($611M)Wormhole ($320M)Ankr ($5M)
Weekly digest · Free

Get the post-mortem
before the protocol does.

Confirmed exploits, attack vector breakdowns, and recovered-funds updates delivered every week. Independent — no protocol sponsorships, no advertising.

No ads · No spam · Unsubscribe anytime