Scan to download
BTC $73,367.42 +0.34%
ETH $2,296.02 +2.24%
BNB $610.35 +0.13%
XRP $1.36 -0.08%
SOL $85.32 +0.00%
TRX $0.3197 +0.76%
DOGE $0.0937 -0.53%
ADA $0.2516 -2.03%
BCH $438.96 -1.44%
LINK $9.19 +0.56%
HYPE $42.78 +2.50%
AAVE $95.31 +0.38%
SUI $0.9531 -0.03%
XLM $0.1554 -0.59%
ZEC $373.60 -2.31%
BTC $73,367.42 +0.34%
ETH $2,296.02 +2.24%
BNB $610.35 +0.13%
XRP $1.36 -0.08%
SOL $85.32 +0.00%
TRX $0.3197 +0.76%
DOGE $0.0937 -0.53%
ADA $0.2516 -2.03%
BCH $438.96 -1.44%
LINK $9.19 +0.56%
HYPE $42.78 +2.50%
AAVE $95.31 +0.38%
SUI $0.9531 -0.03%
XLM $0.1554 -0.59%
ZEC $373.60 -2.31%

vulnerability

Zcash fixes critical vulnerability: previously threatened the security of over 25,000 ZEC, worth approximately 6.5 million dollars

The privacy coin Zcash recently disclosed and fixed a critical security vulnerability that could have been exploited by malicious miners to transfer over 25,000 ZEC (approximately 6.5 million USD) from the deprecated Sprout privacy pool. Security researcher Alex "Scalar" Sol disclosed on March 23 that the vulnerability stemmed from the zcashd node skipping proof verification when processing transactions involving the Sprout pool.The official statement indicated that the vulnerability had existed since July 2020 but had not been actively exploited, and user funds remained safe at all times. The development team has released version 6.12.0 to complete the fix, and mainstream mining pools have completed the upgrade deployment within a few days. Additionally, the unaffected Zebra full node implementation has the capability to trigger a chain fork, providing extra protection in the event of exploitation.It was disclosed that although the Sprout pool closed to new deposits in November 2020, approximately 25,424 ZEC remained untransferred. Even if the vulnerability were exploited, Zcash's "turnstile" mechanism would prevent inflationary issuance, ensuring that the total supply would not be breached. This vulnerability was discovered with the assistance of AI, and the researcher will receive a total bounty of 200 ZEC (approximately 51,000 USD). It is worth noting that this is not the first time Zcash has encountered a significant vulnerability; as early as 2019, it had fixed a serious flaw that could lead to unlimited issuance.

Venus Protocol: THE market event originated from a supply cap vulnerability, not a flash loan attack

Venus Protocol released a statement regarding the THE market event, stating that this incident was not a flash loan attack, but rather a result of the attacker exploiting a supply cap vulnerability in the old code of the protocol. The team indicated that the attacker had been accumulating THE tokens for about 9 months, gradually establishing a dominant supply position on Venus.The announcement pointed out that the attacker bypassed the normal deposit process by directly transferring THE tokens into the protocol contract, thereby breaking through the supply cap limit of 14.5 million THE. They manipulated DEX prices by taking advantage of the low on-chain liquidity. As the external price was gradually reflected by the TWAP oracle, the attacker borrowed assets (such as CAKE, BNB, etc.) against the inflated collateral value, then bought more THE to drive up the price, and continuously transferred THE into the vTHE market to increase the collateral value. This cycle once pushed the price from about $0.27 to about $0.53, ultimately leaving bad debt in the protocol after the positions were liquidated.Venus stated that it has currently suspended the THE market, reduced its collateral factor to 0, and suspended withdrawals. Additionally, as a precautionary measure, the collateral factors for 8 markets including BCH, LTC, AAVE, POL, FIL, TWT, UNI, and lisUSD have also been reduced to 0. The team and security partners are continuing to investigate and will release a complete post-analysis report in the future.

OKX Star: The Wuhan Anshun Technology attack incident is not due to a security vulnerability in the OKX Web3 wallet

OKX founder and CEO Star responded to the "hacker attack incident involving a plugin vulnerability by the Wuhan Anshun Technology team" by stating, "The OKX Wallet security team has completed its investigation, and describing the original text as 'OKX wallet vulnerability' is inaccurate. Two points need clarification:This incident is not a security vulnerability of the OKX Web3 wallet. The attack method involved hackers controlling user devices through Trojan software, then stealing locally stored encrypted files and passwords by tampering with webpage JS code to implant hooks or by monitoring keyboard inputs.The OKX Web3 wallet is a 100% self-custody wallet. Private keys and passwords exist only on the user's own device, and OKX cannot access or control user assets. However, if the user's device has already been compromised by hackers, then no wallet—including MetaMask—can guarantee security. It's like a thief has already been able to operate your computer and see all your keyboard inputs.Users are advised to avoid installing software or plugins from unknown sources, regularly check device security, and properly protect their mnemonic phrases and private keys."It is reported that the Wuhan Anshun Technology team controlled a large number of user terminals to steal mnemonic phrases and remotely transfer digital assets, with the amount involved reaching 7 million dollars.

The Ledger security team discovered an Android vulnerability that can extract cryptocurrency wallet recovery phrases in 45 seconds

According to The Block, Ledger's security research team Donjon has discovered a vulnerability in the secure boot chain of MediaTek processors, allowing attackers to extract encryption keys via USB connection before the operating system loads, provided they have physical access to the phone. This could enable them to decrypt device storage and obtain the device PIN code and encrypted wallet mnemonic within approximately 45 seconds.In proof-of-concept tests, the vulnerability successfully extracted sensitive data from wallet applications such as Trust Wallet, Kraken Wallet, and Phantom. Researchers indicate that this vulnerability may affect about 25% of Android phones, involving models that use MediaTek chips and Trustonic's Trusted Execution Environment. Ledger's Chief Technology Officer Charles Guillemet stated that smartphones were never designed to be vaults. Although the vulnerability can be patched, it highlights the inherent risks of storing keys on non-secure devices, and users are advised to update security patches as soon as possible.According to data from TRM Labs, over 80% of the $2.1 billion in stolen crypto assets in the first half of 2025 stemmed from infrastructure attacks such as private key theft, mnemonic theft, and front-end hijacking. Chainalysis data shows that losses from crypto asset theft exceeded $3.41 billion in 2024, with the proportion of stolen personal wallets rising from 7.3% in 2022 to 44% in 2024.
app_icon
ChainCatcher Building the Web3 world with innovations.