Hacks

During a hack, the hacker exploits a vulnerability in a smart contract, protocol, infrastructure, or software, or steals information from their victims to gain unauthorized use of their device and transfer funds directly on their behalf.

Sim swaps

A Sim Swap occurs when the hacker takes control of the victim’s cell phone to sign transactions on their behalf.

Contract exploit

A Contract Exploit occurs when the scammer exploits a vulnerability in a smart contract - such to steal funds from a wallet.

Other hacks

Other hacks can include, for example:

  • A protocol attack: a Protocol Attack occurs when the scammer exploits a vulnerability in protocol - such as governance, to steal funds from them.
  • A man-in-the-middle or infrastructure attack: a Man in middle attack occurs when the scammer exploits a vulnerability in a communication network to intercept information and access log-in information or private wallet keys. For example, during DNS hijacking, hackers manipulate DNS queries to redirect users to malicious sites.
Hacks

During a hack, the hacker exploits a vulnerability in a smart contract, protocol, infrastructure, or software, or steals information from their victims to gain unauthorized use of their device and transfer funds directly on their behalf.

Sim swaps

A Sim Swap occurs when the hacker takes control of the victim’s cell phone to sign transactions on their behalf.

Contract exploit

A Contract Exploit occurs when the scammer exploits a vulnerability in a smart contract - such to steal funds from a wallet.

Other hacks

Other hacks can include, for example:

  • A protocol attack: a Protocol Attack occurs when the scammer exploits a vulnerability in protocol - such as governance, to steal funds from them.
  • A man-in-the-middle or infrastructure attack: a Man in middle attack occurs when the scammer exploits a vulnerability in a communication network to intercept information and access log-in information or private wallet keys. For example, during DNS hijacking, hackers manipulate DNS queries to redirect users to malicious sites.
Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo
Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo