BlockThreat - Week 51, 2025
Yearn, Rari Capital, Futureswap, NX Finance, Biswap, Dragun69
Greetings!
Roughly $3.7M was stolen this week across eight incidents. The winter holidays remain one of the most dangerous periods for defenders, as attackers intensify their activity while relying on reduced staffing and slower response times.
The most severe incident this week stemmed from a user falling victim to an address poisoning attack, resulting in a $50M loss. While this does not surpass last year’s record $71M WBTC address poisoning hack, successful compromises of this kind continue to incentivize attackers to flood the blockchain with malicious transactions. What’s frustrating is that this class of attack is largely solvable. Wallets and blockchain explorers could defeat most address poisoning attacks with stronger heuristics. What are the odds that a user legitimately interacts with multiple addresses that share similar prefixes and suffixes? We can do better!
The troubling trend of attacks against older contracts also persists. Yearn was compromised yet again, losing $300K due to a misconfiguration exploit, while Rari’s multisig was taken over, allowing attackers to drain approximately $2M.
Let’s dive into the news!
Events
DarkMode Conference by SEAL. Call for Papers is now open.
News
Crypto hacks hit $3.4 billion in 2025, attacks on individual wallets rise: Chainalysis.
Who Is Stealing Your Crypto Assets? — 2025 Web3 User Security and Risk Trends Report by Go Plus Security.
2025 Blockchain Security and AML Annual Report by SlowMist.
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances.
Defimon 2025 Recap by Decurity.
Looking Back at 2025’s Cybersecurity Landscape: Key Trends to Watch in 2026 by TLP Black.
Crime
North Korea Drives Record $2 Billion Crypto Theft Year, Pushing All-Time Total to $6.75 Billion by Chainalysis.
Final Chapter: Interview with the Chollima VII by Mauro Eldritch and Sofia Grimaldo (Bitso).
North Korea and the Industrialization of Cryptocurrency Theft by TRM.
Inside DPRK Operations: New Lazarus and Kimsuky Infrastructure Uncovered Across Global Campaigns.
US seizes E-Note crypto exchange for laundering ransomware payments.
Brooklyn man indicted for allegedly stealing $16 million from Coinbase users through phishing scheme.
Policy
Phishing
Crypto trader loses $50 million to address poisoning attack.
A whale’s Multisig was drained of ~$27.3M due to a private key compromise by Peckshield.
Approaching stealers devs: a brief interview with Phexia by g0njxa. A rare look into the mind of a malware developer.
Singapore Entrepreneur Loses Entire Crypto Portfolio After Downloading Fake Game.
Scams
So far, @atlasx100 has made over $300,000 from more than 300 victims through a scam “private” trading group by Specter.
Malware
Inside GhostPoster: How a PNG Icon Infected 50,000 Firefox Users by Lotan Sery,Noga Gouldman (Koi).
Stealka stealer: the new face of game cheats, mods, and cracks by Artem Ushkov (Kaspersky).
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data.
Amazon: Ongoing cryptomining campaign uses hacked AWS accounts.
New SantaStealer malware steals data from browsers, crypto wallets.
Media
Don’t Get Rekt - Ep04. Pablo Sabbatella and Officer_secrets share great intel on opsec failures and attack patterns. Takeaways.
Research
The Ultimate Guide to the Top for Security Researchers: Setting Sail by Shealtielanz (SigmaPrime).
You’re writing require statements wrong by Brock Elmore (Nascent). A new pattern for DeFi Smart Contract Security.
Decentralized Perpetual Contracts Security Audit Guide by SlowMist.
Solaris: Stateful, Structure-Aware, sBPF Bytecode Coverage-Guided Fuzzing by Inversive Labs.
Institutional-Grade Security. Chapter 1: Guardrails and Role Separation by 0xmikko.eth.
Institutional-Grade Security. Chapter 2: Onchain Github for bytecode by 0xmikko.eth.
Test Proxy Contracts Safely in Wake by Ackee.
You are thinking about rounding errors wrong by Jorgect.eth.
Rebroadcast of my Devcon 7 presentation on Passkeys at 39c3 / CDC by Nicolas Bacca. Remember to keep your most precious passkeys non synchronized on dedicated secure hardware.
Harvesting MEV Bots by Exploiting Vulnerabilities in Flashbots Relay by BlockSec.
Don’t underestimate TON: how incorrect gas estimations lead to critical issues by ChainSecurity.
A Developer’s Guide to FHEVM Security by OpenZeppelin.
Can chatbots craft correct code? by Evan Sultanik (Trail of Bits).
Belobog: Move Language Fuzzing Framework For Real-World Smart Contracts.
Mage: Cracking Elliptic Curve Cryptography with Cross-Axis Transformers.
No More Hidden Pitfalls? Exposing Smart Contract Bad Practices with LLM-Powered Hybrid Analysis.
ScamSweeper: Detecting Illegal Accounts in Web3 Scams via Transactions Analysis.
Sandwiched and Silent: Behavioral Adaptation and Private Channel Exploitation in Ethereum MEV.
Clean Up the Mess: Addressing Data Pollution in Cryptocurrency Abuse Reporting Services.
BugMagnifier: TON Transaction Simulator for Revealing Smart Contract Vulnerabilities.
Love, Lies, and Language Models: Investigating AI’s Role in Romance-Baiting Scams.
Vision-Based Learning for Cyberattack Detection in Blockchain Smart Contracts and Transactions.
BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks.
Tools
CTFBench is a benchmark for evaluating AI smart contract auditors. Repo.
DeployGuard by 0xstormblessed. A CLI tool for auditing Foundry deployment scripts for security vulnerabilities, best practice violations, and missing test coverage. It focuses on detecting CPIMP (Clandestine Proxy In the Middle of Proxy) vulnerabilities and other security anti-patterns.
Introducing Hacken’s Open-Source Uniswap v4 Hook Testing Framework.
Crypto Skills for Python Devs by @fubuloubu. Skills for Claude and other LLMs/Agents to help users build projects in Python for blockchain networks.
Enjoy reading BlockThreat? Consider sponsoring the next edition or becoming a paid subscriber to unlock the premium section with detailed information on hacks, vulnerability, indicators, special reports, and searchable newsletter archives.
Premium Content
The content presented below is intended for personal, non-commercial use only and is protected by copyright laws. Any unauthorized distribution, reproduction, or inclusion of this content in public or commercial products, databases, publications, and other mediums is strictly prohibited without the express written permission of the author.
Hacks
NX Finance
Date: December 15, 2025
Attack Vector: Price Oracle Manipulation
Impact: $400,000
Chain: Solana
Indicators:

