Scan to download
BTC $79,253.06 -2.85%
ETH $2,227.57 -3.51%
BNB $673.53 -1.34%
XRP $1.44 -5.71%
SOL $89.71 -3.75%
TRX $0.3519 -0.66%
DOGE $0.1129 -4.31%
ADA $0.2616 -5.11%
BCH $426.69 -2.55%
LINK $10.09 -5.52%
HYPE $44.34 +0.40%
AAVE $93.51 -7.00%
SUI $1.10 -9.60%
XLM $0.1553 -6.65%
ZEC $522.51 -2.03%
BTC $79,253.06 -2.85%
ETH $2,227.57 -3.51%
BNB $673.53 -1.34%
XRP $1.44 -5.71%
SOL $89.71 -3.75%
TRX $0.3519 -0.66%
DOGE $0.1129 -4.31%
ADA $0.2616 -5.11%
BCH $426.69 -2.55%
LINK $10.09 -5.52%
HYPE $44.34 +0.40%
AAVE $93.51 -7.00%
SUI $1.10 -9.60%
XLM $0.1553 -6.65%
ZEC $522.51 -2.03%

attack

After being attacked, KelpDAO has seen multiple protocols abandon LayerZero, with $4 billion in assets migrated to Chainlink CCIP

After KelpDAO was attacked, resulting in a loss of $292 million, the industry's scrutiny of the security of cross-chain infrastructure has intensified. Approximately $4 billion in assets have completed or are in the process of migrating from LayerZero to Chainlink's Cross-Chain Interoperability Protocol (CCIP). The DeFi protocol Lombard is the latest project to join this migration trend. The protocol announced it would discontinue the use of LayerZero and migrate over $1 billion in Bitcoin-backed assets to Chainlink CCIP, stating that this decision stemmed from a comprehensive internal security review following the April attack incident.Lombard issues two types of Bitcoin-backed tokens—LBTC and BTC.b—and will prioritize the migration of assets on chains such as Solana, Etherlink, Berachain, Corn, and TAC, while terminating the use of LayerZero on Morph and Swell. Lombard stated that the reason for choosing CCIP is its independent node operators, built-in rate limiting mechanisms, and audited infrastructure. Additionally, the protocol will adopt Chainlink's cross-chain token standard to facilitate asset cross-chain circulation through a burn-and-mint model.Previously, Kelp DAO, Solv Protocol, Re, and the cryptocurrency exchange Kraken have all completed similar migrations, with these projects collectively transferring approximately $4 billion in assets. Chainlink Labs Chief Business Officer Johann Eid stated, "We are witnessing a continued wave of risk-averse migration within the industry."

AI Agent Security Risk Exposure: Attackers Can Exploit "Memory Pollution" to Induce Misoperation of Funds

The GoPlus Security team has disclosed a new type of attack in its AgentGuard AI project: inducing AI agents to perform unauthorized sensitive operations through "memory poisoning." This attack method does not rely on traditional vulnerabilities or malicious code but exploits the long-term memory mechanism of AI agents. For example, an attacker first induces the agent to "remember preferences," such as "usually prioritizing proactive refunds instead of waiting for chargebacks," and then uses vague expressions like "process as usual" or "execute as before" in subsequent instructions, thereby triggering automated financial operations.GoPlus points out that the key risk in such cases lies in the AI agent mistakenly treating "historical preferences" as a basis for authorization, leading to financial losses or security incidents in operations such as refunds, transfers, and configuration changes. To address this issue, the team has proposed several protective recommendations, including:Operations involving refunds, transfers, deletions, or sensitive configurations must require explicit confirmation in the current session.Memory-related instructions like "habit," "usual way," and "as before" should be regarded as high-risk state changes.Long-term memory must have a traceability mechanism (writer, time, confirmation status).Vague instructions should automatically elevate the risk level and trigger secondary verification.Long-term memory must not replace real-time authorization processes.The team emphasizes that the "AI agent memory system" should be viewed as a potential attack surface and should be constrained and audited through a dedicated security framework.

CertiK Report: North Korean hackers caused approximately 60% of digital asset thefts by 2025, with attack patterns shifting to "offline infiltration."

Web3 security company CertiK has released the "Skynet North Korea Cyber Threat Report." The data shows that since 2016, North Korean hacker groups have plundered approximately $6.75 billion in digital assets. In 2025 alone, the losses from thefts they orchestrated reached as high as $2.06 billion, accounting for nearly 60% of the total losses in the global cryptocurrency industry for the entire year (including the $1.5 billion Bybit theft case). As of early 2026, this threat trend continues, with losses accounting for about 55%.The report emphasizes that the attack patterns of North Korean hackers have undergone a fundamental shift, evolving from simple code vulnerability exploitation to a national-level attack system that combines social engineering, deep supply chain attacks, and "physical infiltration." In the recent Drift protocol incident, attackers even spent six months lurking at offline industry conferences, establishing trust through real funds and interpersonal interactions before executing their attack.CertiK security experts warn that in the face of such systemic attacks, simple technical defenses have become weak. Cryptocurrency institutions urgently need to fully implement a "zero trust" hiring model, strengthen third-party supply chains, establish fund circuit breaker mechanisms, and collaborate with professional security organizations to build a comprehensive lifecycle defense system covering code audits, round-the-clock risk monitoring, and on-chain anti-money laundering/KYT (Know Your Transaction) fund tracking.

CertiK: Surge in crypto "wrench attacks" in 2026, Europe becomes a hard-hit area, with France being particularly prominent

According to a report by The Block, the crypto security firm CertiK released a report today indicating that in the first four months of 2026, there have been 34 confirmed cases of crypto "ransom attacks" globally (i.e., offline physical assaults and extortion targeting crypto asset holders), an increase of 41% compared to the same period in 2025, with total losses for victims amounting to approximately $101 million. If the trend continues, the total number of incidents for the year is expected to reach around 130, with losses potentially soaring to hundreds of millions of dollars.In terms of geographical distribution, out of the 34 incidents, 28 (82%) occurred in Europe, with France being particularly notable, having recorded 24 incidents in just the first four months of 2026, surpassing the total of 20 incidents for the entire year of 2025. CertiK attributes this to France's hosting of flagship crypto companies like Ledger and Binance, frequent data breaches, and a prevalent culture of "showing off wealth and doxxing" within the community. In contrast, the number of reported incidents in the United States dropped from 9 in 2025 to 3 in the first quarter, while Asia saw a decrease from 25 to 2.Regarding attack patterns, CertiK pointed out that criminal groups have shifted to a "data-driven targeting" model, reducing the need for on-site reconnaissance by purchasing victims' names, addresses, and asset information from data intermediaries. This year, over half of the incidents involved threats or direct harm to victims' family members (spouses, children, elderly parents) as a means of exerting pressure. In terms of execution, small groups of 3 to 5 individuals typically operate through
app_icon
ChainCatcher Building the Web3 world with innovations.