Scan to download
BTC $79,102.35 -2.63%
ETH $2,223.21 -3.03%
BNB $672.57 -0.89%
XRP $1.43 -3.95%
SOL $89.28 -3.31%
TRX $0.3519 -0.43%
DOGE $0.1136 -1.75%
ADA $0.2612 -3.73%
BCH $426.33 -2.29%
LINK $10.07 -4.23%
HYPE $44.17 -0.33%
AAVE $92.89 -5.84%
SUI $1.09 -7.80%
XLM $0.1544 -5.18%
ZEC $515.52 -7.72%
BTC $79,102.35 -2.63%
ETH $2,223.21 -3.03%
BNB $672.57 -0.89%
XRP $1.43 -3.95%
SOL $89.28 -3.31%
TRX $0.3519 -0.43%
DOGE $0.1136 -1.75%
ADA $0.2612 -3.73%
BCH $426.33 -2.29%
LINK $10.07 -4.23%
HYPE $44.17 -0.33%
AAVE $92.89 -5.84%
SUI $1.09 -7.80%
XLM $0.1544 -5.18%
ZEC $515.52 -7.72%

shu

The auditing platform Code4rena has announced its shutdown, and Immunefi will absorb its bug bounty clients and researchers

According to official news, the smart contract auditing platform Code4rena has announced that it will gradually cease operations, and the Web3 security company Immunefi will take over its clients and security researchers. Code4rena posted on social media that it has made the decision to shut down and stated that all ongoing competitions and bounty activities will be completed as usual, and existing collaborations will be "properly concluded." Immunefi stated that it will assist in migrating Code4rena's bounty projects, reward structures, and researchers to its platform.Code4rena is known for its "competitive auditing" model, where independent researchers compete to find vulnerabilities in smart contracts for rewards. This shutdown comes less than two years after blockchain security company Zellic acquired Code4rena in 2024. Previously, Code4rena raised $6 million from Paradigm in 2023 for auditing incentives and platform expansion.This shutdown comes at a difficult time for DeFi protocols and the security sector. Data from DefiLlama shows that there were over 20 crypto vulnerability incidents in April alone, setting a monthly record. JPMorgan analysts believe that ongoing DeFi security incidents are limiting major institutional investors from entering the market. Meanwhile, the total value locked in DeFi has decreased from about $160 billion in October to approximately $83 billion currently.

Bitrefill disclosed that it was attacked by suspected North Korean hackers, resulting in a customer data breach, and has shut down relevant systems for isolation

Bitcoin payment service provider Bitrefill disclosed on platform X that it suffered a cyberattack on March 1, 2026, resulting in a customer data breach. The attack originated from a compromised employee's laptop and allowed the attackers to access certain databases and cryptocurrency wallets.Investigations revealed that the attack method was highly similar to past attacks on cryptocurrency companies by the North Korean DPRK Lazarus/Bluenoroff hacker group. Approximately 18,500 purchase records involved limited customer information (email, cryptocurrency payment addresses, and IP metadata), with about 1,000 records having customer name information stored in an encrypted format, but potentially accessible. Bitrefill stated that customers do not need to take special actions but are advised to be vigilant for unusual information.Bitrefill further added that it has currently shut down related systems for isolation and is collaborating with security experts, on-chain analysts, and law enforcement. Operations have nearly returned to normal. The company emphasized that it is long-term profitable and financially robust enough to absorb this loss and will continue to strengthen cybersecurity measures, including internal access controls, monitoring, and emergency response mechanisms.

OKX Star: The Wuhan Anshun Technology attack incident is not due to a security vulnerability in the OKX Web3 wallet

OKX founder and CEO Star responded to the "hacker attack incident involving a plugin vulnerability by the Wuhan Anshun Technology team" by stating, "The OKX Wallet security team has completed its investigation, and describing the original text as 'OKX wallet vulnerability' is inaccurate. Two points need clarification:This incident is not a security vulnerability of the OKX Web3 wallet. The attack method involved hackers controlling user devices through Trojan software, then stealing locally stored encrypted files and passwords by tampering with webpage JS code to implant hooks or by monitoring keyboard inputs.The OKX Web3 wallet is a 100% self-custody wallet. Private keys and passwords exist only on the user's own device, and OKX cannot access or control user assets. However, if the user's device has already been compromised by hackers, then no wallet—including MetaMask—can guarantee security. It's like a thief has already been able to operate your computer and see all your keyboard inputs.Users are advised to avoid installing software or plugins from unknown sources, regularly check device security, and properly protect their mnemonic phrases and private keys."It is reported that the Wuhan Anshun Technology team controlled a large number of user terminals to steal mnemonic phrases and remotely transfer digital assets, with the amount involved reaching 7 million dollars.
app_icon
ChainCatcher Building the Web3 world with innovations.