[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@SlowMist_Team Avatar @SlowMist_Team SlowMist

SlowMist has been actively investigating and alerting about several recent exploits in the crypto space. The team detected and analyzed incidents involving @cetusprotocol, @corkprotocol, and @stepheronfts, identifying issues such as overflows, arbitrary market creation, and reentrancy exploits. They also monitored and reported on the movement of stolen funds, including a swap into $USDC and bridging to Ethereum.

Engagements: XXX #

Engagements Line Chart

Mentions: X #

Mentions Line Chart

Followers: XXXXXX #

Followers Line Chart

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence cryptocurrencies travel destinations finance exchanges

Social topic influence files, web3, ti, ethereum, $hero, mfa, github, $40m, v1, gmx

Top assets mentioned Ethereum (ETH) StepHero (HERO)

Top Social Posts #


Top posts by engagements in the last XX hours

"🚨SlowMist TI Alert🚨 The exchange @BigONEexchange was exploited due to a supply chain attack and loss exceeds $XX million. The production network was compromised and the operating logic of account and risk control related servers was modified enabling the attacker to withdraw funds. Notably the private keys were not leaked. Hacker addresses: 🔹 Ethereum & BSC0x9Bf7a4dDcA405929dba1FBB136F764F5892A8a7a 🔹 Solana: HSr1FNv266zCnVtUdZhfYrhgWx1a4LNEpMPDymQzPg4R 🔹 Bitcoin: bc1qwxm53zya6cuflxhcxy84t4c4wrmgrwqzd07jxm 🔹 Tron: TKKGH8bwmEEvyp3QkzDCbK61EwCHXdo17c We are closely following up on this"
@SlowMist_Team Avatar @SlowMist_Team on X 2025-07-16 04:56:41 UTC 89.6K followers, 27.4K engagements

"🚨SlowMist Security Alert🚨 We have detected a reentrancy exploit related to @StepHeroNFTs. As always stay vigilant"
@SlowMist_Team Avatar @SlowMist_Team on X 2025-02-21 06:22:54 UTC 89.6K followers, 11.8K engagements

"🚨Attackers often distribute malicious files through #LinkedIn #Discord and #Telegram. To stay safe here are key tips 🛡: 🔹 Beware of fake jobs asking you to run code from GitHub. Verify identities via official sites. 🔹 Always review unknown code & authors. Use VMs/sandboxes for testing. 🔹 Disable auto-downloads in chat apps. Scan files before opening. 🔹 Enable MFA and regularly update strong unique passwords 🔗Read more:"
@SlowMist_Team Avatar @SlowMist_Team on X 2025-07-23 02:25:57 UTC 89.6K followers, 8839 engagements

"The root cause of this attack stems from @GMX_IO v1's design flaw where short position operations immediately update the global short average prices (globalShortAveragePrices) which directly impacts the calculation of Assets Under Management (AUM) thereby allowing manipulation of GLP token pricing. The attacker exploited this design vulnerability by leveraging the Keeper's ability to enable timelock.enableLeverage during order execution (a prerequisite for creating large short positions). Through a reentrancy attack they successfully established massive short positions to manipulate the"
@SlowMist_Team Avatar @SlowMist_Team on X 2025-07-09 16:40:50 UTC 89.6K followers, 123K engagements

"SlowMist in Hong Kong Recently our Hong Kong community lead @coding_toLex was invited to speak at the Web3 Literacy Program hosted by Hang Seng Bank & SideBySide: Project Forward. He introduced blockchain crypto online scams and Web3 security in a clear and engaging way to the public.🛡 At SlowMist we stay true to our mission of being a light in the dark forest of blockchain. ✨ Together with @DeFiHackLabs and @realScamSniffer we also launched a free Web3 phishing simulation platform to boost user awareness. We're just getting started stay tuned for more high-quality knowledge sharing and"
@SlowMist_Team Avatar @SlowMist_Team on X 2025-07-24 02:27:08 UTC 89.6K followers, 2881 engagements

"🚨May 2025 Web3 Security Recap🚨 📊According to SlowMists ⚠15 hacks ➡ $257M lost ❄$162M recovered/frozen 🎣Phishing losses via @realScamSniffer: 7164 victims ➡ $9.6M stolen Major incidents: Cetus Protocol lost $230M in a math overflow attack Cork Protocol exploited for $12M+ due to insufficient validation of user-supplied data BitoPro lost $11.5M; funds laundered via Tornado Cash Thorchain and Wasabi Demex lost $950K from an oracle manipulation targeting a deprecated vault Zunami Protocol lost $500K; root cause under investigation Security Highlights: ⚠Contract vulnerabilities caused XX% of"
@SlowMist_Team Avatar @SlowMist_Team on X 2025-06-03 09:24:01 UTC 89.5K followers, 2841 engagements

"In early July SlowMist investigated a crypto theft caused by a malicious GitHub project: zldp2002/solana-pumpfun-bot. More recently a similar repo audiofilter/pumpfun-pumpswap-sniper-copy-trading-bot was found stealing private keys from .env files and sending them to an attacker-controlled server. 🎭These attacks often rely on social engineering. Developers and users: stay alert when using unknown GitHub tools especially those involving wallets or keys. ⚠Run only in isolated environments without sensitive data. ✍Full analysis:"
@SlowMist_Team Avatar @SlowMist_Team on X 2025-07-22 03:56:40 UTC 89.5K followers, 4403 engagements