Vladimir S. | Officer's Channel
10.8K subscribers
301 photos
3 videos
7 files
2.55K links
Download Telegram
It looks like Rhea finance has been exploited! $7.6M drained.

Attacker deployed fake token contracts, seeded liquidity in fresh pools, then manipulated the oracle + validation layer to extract real assets (USDC, USDT, ZEC, NEAR, etc.).

https://x.com/officer_secret/status/2044879371312202180?s=46

#security #alert
7👍3🔥3
8💯4👍3🤔2🥰1👨‍💻1
Here is a aWETH redemption protocol allowing ETH lenders on Aave to swap into wstETH or weETH.

Even if user has debt against ETH, he can swap collateral to wstETH or weETH and the debt will remain the same. It will significantly reduce systematic risk for Aave, users, and DeFi as a whole: https://x.com/officer_secret/status/2046013051040678129?s=46

#web3
9👍4💯3👏1
Lazarus Group Just Released “Mach-O Man” – A Brand-New Native macOS Malware Kit Targeting Fintech, Crypto, and High-Value Executives

You get an “urgent” meeting invite over Telegram for a Zoom, Teams, or Google Meet call. The link leads to a convincing fake website that tells you to copy and paste one simple command into your Mac’s Terminal to “fix the connection issue.”

You run it… and Mach-O Man has just taken over your Mac.

https://x.com/officer_secret/status/2046719684213710894?s=46

#security #macos
11👍3💯3
$585K Drained Across 4 Victims in 11 Hours!

One of victims lost 3 WBTC (~$221K) after signing a phishing increaseApproval signature - moments after withdrawing from Aave. Victim: 0x5d908c88bE270889C0953E7dfF1C8E1D699cEeA3

All four victims were hit by the same drainer contract. In order to stay protected from such attacks, you should use tools like RevokeCash, TenderlyApp , web3_antivirus , delegatedotxyz, and of course Rabby Wallet.

Stay safe!

https://x.com/officer_secret/status/2046803885465927948?s=46

#security #alert
10👍4💯4💘1
🐧 DPRK Is Actively Targeting Linux Users

Lazarus Group is hitting developers and IT professionals via fake job offers, malicious coding challenges, and supply-chain poisoning across npm, PyPI, and GitHub.

Key defenses: never run unverified code, enable SELinux/AppArmor, sandbox unknown binaries, and treat every unsolicited "opportunity" as a potential attack vector.

🔗 Details
5🔥3💯2