
Blockchain Security Brief
The weekly record of web3 darkest hours
Monday, November 24, 2025

Top Exploits
These weren’t breaches - they were self-inflicted architectural failures. When the system turns on itself, attackers barely need to show up.
Stream Finance and Elixir trigger a $285M recursive collateral meltdown. A synthetic dollar backed by another synthetic dollar backed by the first one finally snapped, as Stream’s looping engine - which inflated $1.9M into $14M of minted assets - unraveled into a $93M loss, a 77% xUSD depeg, and $285M in cascading creditor damage. Elixir shut down deUSD, vaults froze, and sophisticated funds quietly exited while retail holders discovered the collateral was circular math all along. The loop didn’t get exploited - it worked exactly as designed until it didn’t. (Read more)
Cloudflare outage knocks 20% of the internet offline, freezing crypto front ends globally. A routine database permissions update triggered a hidden bug in Cloudflare’s bot-mitigation engine, collapsing the proxy layer for 24 million sites and taking X, ChatGPT, Coinbase, Kraken, Etherscan, and entire Web2 infrastructure down with it. Blockchains kept producing blocks - but users couldn’t reach them - exposing the uncomfortable truth: “decentralized” finance still dies when a single centralized edge network sneezes. (Read more)
Rekt Audit Broker
The big city sleeps, but the code never does. Neither do the crooks.
Rekt Audit Broker connects protocols with top-tier security firms. One request, multiple bids. Faster audits, fairer pricing, trusted partners.
Audits are cheaper than funerals.
Deep Dives
19 Security Pitfalls in On-Chain Order Books (and How to Fix Them) (29 min read)
On-chain order books promise transparency and trustlessness, but the moment you leave the whiteboard and touch production code, the whole thing turns into a minefield. Matching, fills, cancellations, fund accounting, oracles, gas ceilings, and upgrade paths all start leaking risk in places no one models - and a single overlooked invariant can freeze trading, corrupt balances, or hand free edge to every MEV searcher watching your mempool.
Smart Wallet Recovery: Attack Paths & Defenses (7 min read)
Social recovery makes smart wallets feel safer than seed phrases, but it also opens a new control plane attackers can target. In real deployments, guardian approvals get replayed, thresholds go unchecked, lists mutate mid-recovery, spoofed guardians slip in unnoticed, and oversized guardian arrays turn recovery into a gas-based lockout.
Understanding Critical, High, Medium, and Low Vulnerabilities in Smart Contracts (8 min read)
Smart contract severity levels aren’t just labels - they’re the operating system of Web3 risk, the framework auditors use to decide which bugs can kill a protocol and which ones are just technical debt dressed as danger. Whether in audits, contests, or bug bounties, severity decides urgency, rewards, disclosure, and who doesn’t sleep that night - but behind the neat categories sits the messy truth: every rating is a human judgment call, and consistency is the only thing keeping the whole system sane.
Exit Risk & Finality in Layer 2 Protocols (5 min read)
Layer 2s promise cheaper, faster transactions - but every rollup inherits a brutal truth: your assets aren’t final until Layer 1 says they are. Fraud-proof windows stretch withdrawals across days, sequencer outages stall inclusion, and premature assumptions about “L2 finality” leave users and applications acting on state that can still be rolled back.
Managing third-party and infrastructure risks in stablecoins and DeFi (7 min read)
DeFi’s supply chain isn’t just fragile - it’s a Rube Goldberg machine of smart contracts, bridges, price feeds, Web2 frontends, backend infra, and private keys wired together with assumptions no one has time to re-verify. The real threat isn’t just contract bugs - it’s the sprawling dependency chain where one poisoned vendor, outdated library, misconfigured oracle, or compromised key can drain liquidity across chains faster than anyone can revoke a role or halt redemptions.

Surviving in the Email Imposter Age
You think you’re reading messages from colleagues.
You’re actually reading machine-generated imitations.
AI hasn’t just made phishing better; it has made it believable.
Perfect grammar. Perfect tone. Perfect timing.
Models scrape your LinkedIn, mimic your writing style, mention real projects, and generate a lure tailored specifically to you in minutes. This isn’t the “urgent click here” era anymore. It’s synthetic familiarity: messages that sound exactly like the people you trust.
Modern attacks don’t begin with an exploit. They begin with a moment.
Five minutes before a meeting. 6 a.m. on your phone. A Slack ping that looks exactly like every other Slack ping.
People don’t get compromised because they’re careless. They get compromised because the email feels normal.
And AI knows how to construct “normal” with precision.
Modern Defense Has to Meet the User Where the Attack Lands
Pre-filtering doesn’t catch what looks legitimate.
Annual training doesn’t prepare anyone for a deepfake.
Gut instinct collapses the moment a login page looks perfect.
Meaningful defense now happens at the point of decision - the moment someone is about to trust, reply, authenticate, or approve. The security community has recognised this shift, and a new generation of tools is emerging to expose teams to the types of AI-driven attacks they actually face. Equalizer is one of them, designed to train people against the realism of modern impersonation campaigns.
The Attack that Looked Exactly Right
A finance analyst got a meeting request from a senior executive they worked with every week. Nothing weird on the surface. Same tone. Same calendar format. Same internal slang. Attached was the “Q4 forecasting sheet”, neatly tucked behind what looked like a legit Google Drive link.
Only it wasn’t.
The page loaded flawlessly, pixel-perfect branding, the right favicon, even the correct URL structure at a glance. But behind the glass, attackers were running a live Adversary-in-the-Middle proxy, waiting for the analyst to type a password so they could jack the session and walk straight into the company’s financial hub.
They almost did.
PhishGuard intercepted the load before the analyst authenticated, flagging the login flow as a real-time proxy. The analyst closed the tab, confused, then texted the executive to confirm the meeting.
The reply came later, from 30,000 feet in the air.
The executive was on a transatlantic flight with no Wi-Fi. The meeting didn’t exist. The Drive link didn’t exist. The “forecasting sheet” didn’t exist. The attackers, however, definitely existed.
And they were seconds away from owning the company’s books.
When AI Attacks Demand AI Defenders
Phishing once relied on obvious tells: awkward sentences, mismatched logos, suspicious domains. Defenders were trained to look for these surface-level cues, and for a long time, that was enough.
It no longer is.
Attackers using AI produce messages that blend seamlessly into internal communication patterns. They analyze writing styles, recreate tone, understand reporting structures, and time messages to ongoing projects. The danger lies not in what the message contains but in how convincingly it aligns with everyday workflow.
There is often nothing visibly wrong to detect.
This shift forces defense to evolve. Rule-based filters cannot flag content that appears legitimate from every angle. To counter AI-crafted impersonation, defenders need AI systems capable of reading context: communication habits, behavioural patterns, relationship histories, and the intent behind a request.
Across the industry, this is already taking shape. Teams are deploying AI to interpret anomalies rather than scan for superficial indicators. Resonance Security operates within this direction, building context-aware layers that evaluate how communication is supposed to look, not just whether a message contains something suspicious.
In a threat landscape where written deception now mirrors routine communication, contextual AI has become the only reliable way to keep inboxes usable - and survivable.
Other Security Stories
Chinese Money Launderers Turn Crypto Into a Global Fentanyl Payment Rail. A new RUSI report shows Chinese laundering networks using Bitcoin and USDT to move cartel profits offshore and route fentanyl precursor payments, embedding onchain transfers into a transnational crime pipeline that helped push crypto-related losses to record highs in 2025.
Crypto Private Key Theft Becomes an Industrialized Black-Market Business. A new GK8 report shows seed phrase theft has evolved into an automated criminal pipeline powered by infostealer malware and darknet “mnemonic parsers” that sift through logs, cloud backups, and chat histories to rebuild private keys at scale.
WhatsApp Worm in Brazil Hijacks Phones and Drains Crypto Wallets. SpiderLabs uncovered a two-stage WhatsApp-propagating malware that hijacks sessions, installs the Eternidade Stealer, and auto-scans for banking apps and major crypto wallets, spreading through victims’ contact lists while pulling C2 commands from a disguised Gmail inbox to stay invisible.
North Korean Dev-Targeting Campaign Hides Malware in JSON Storage Links. NVISO found Contagious Interview actors swapping in JSON Keeper-style services to disguise BeaverTail and InvisibleFerret payloads inside trojanized GitHub projects - a stealth upgrade that widens their net for compromising developers and siphoning off sensitive data and crypto wallets.
ShadowRay 2.0 Hijacks 230,000 Exposed Ray Clusters With LLM-Generated Malware. Oligo found IronErn440 exploiting the unfixed CVE-2023-48022 flaw to turn internet-exposed Ray servers into self-spreading Monero miners with AI-written payloads, credential theft modules, reverse shells, and DDoS tooling.
Security Events
IT Security Summit Munich 2025
December 1 - 5, 2025 | Munich, Germany & Online
Hands-on conference for cloud, DevSecOps, web/API and AI-driven security. Focused on real-world defence tactics, secure development and infrastructure protection.
Cyber Week 2025
December 8 - 11, 2025 | Tel Aviv & Online
Now in its 15th year, this major cyber-ecosystem event brings startups, investors, defence, government and academia together for high-profile sessions on global cyber strategy, innovation and resilience.
IdentityShield Summit ’26
January 16 - 17, 2026 | Pune, India
A two-day conference focused on identity security, AI-driven cyber strategies and workforce defence, bringing IT leaders, practitioners and vendors together.
SANS Cyber Threat Intelligence Summit & Training 2026
January 26 - February 2 | Arlington (Rosslyn), USA & Online
Dedicated to threat-intelligence tradecraft, case studies and practitioner training in CTI across industries.
Munich Security Conference 2026
February 13 - 15, 2026 | Munich, Germany
The world’s leading security policy forum brings together heads of state, defence, intelligence and cyber-leaders to shape strategic directions in technology, conflict and digital threats.
Rekt Flashback
One year ago, Rari Capital’s ghost finally stopped pretending to be alive. What began as crypto’s favorite prodigy story - three teens, a billion-dollar protocol, and a robo-advisor for yields - ended as one of DeFi’s most tragic mausoleums. Two catastrophic exploits, a DAO collapse, frozen Fuse pools, and front-ends that blinked out like dying stars left users staring at balances they could see but never touch. The founders vanished, the SEC arrived, and the “trustless” system they built became a graveyard of abandoned code - a reminder that smart contracts don’t forget even when their creators disappear into the ether.
Memes and Videos
The Programmer Who Became a Warlord
He built encryption for the masses, then used it to run a global drug and murder empire. Paul Laroo went from open-source prodigy to a cartel kingpin moving meth from North Korea and opioids into America - until the DEA flipped him and turned his empire against itself.
Want to partner with us?
Skip the bots, hit the brains.
Get your message in front of the sharpest, most battle-tested crowd in crypto.
If they notice you, the whole space will. [Partner with us]
We provide an anonymous platform for whistleblowers and DeFi detectives to present their information to the community. All authors remain anonymous.
We are all rekt.

