SlowMist (@slowmist_team) 's Twitter Profile
SlowMist

@slowmist_team

SlowMist is a Blockchain security firm established in 2018, providing services such as security audits, security consultants, red teaming, and more.

ID: 988385053800517632

linkhttps://www.slowmist.com/ calendar_today23-04-2018 11:52:14

3,3K Tweet

87,87K Followers

406 Following

SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨 A fake Ledger scam is making waves again - but it’s not new 🚨 🧵 This phishing dates back to 2021. Victims receive a fake Ledger device in the mail - complete with real-looking packaging and an “official” letter. You’re told to migrate your 24 words from your “old” (real)

SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨SlowMist Security Alert🚨 We detected potential suspicious activity related to Nexo. As always, stay vigilant! bscscan.com/address/0x0851…

🚨SlowMist Security Alert🚨

We detected potential suspicious activity related to <a href="/Nexo/">Nexo</a>.

As always, stay vigilant!

bscscan.com/address/0x0851…
SlowMist (@slowmist_team) 's Twitter Profile Photo

In recent years, Coinbase users have repeatedly become targets of social engineering attacks — and on May 15, Coinbase confirmed insider involvement. How it works: 📞 Fake support call 📲 Walk user through Coinbase Wallet ⚠️ Provide scam mnemonic phrase 💸 Drain assets under

SlowMist (@slowmist_team) 's Twitter Profile Photo

We’re glad to share that Cos(余弦)😶‍🌫️, founder of SlowMist, will join the landmark event hosted by Safeheron on May 27 in Hong Kong.🔥 Looking forward to an open discussion with industry leaders. 🗓️ Date: May 27 | 🕑 Time: 2:00 PM 📍 Venue: 14/F, Three Exchange Square,

SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨On May 22, LP protocol Cetus🐳 was exploited, with losses exceeding $230M. The attacker crafted a call that caused an overflow—yet still bypassed the check—allowing them to swap a tiny amount of tokens for a massive amount of liquidity assets. How? 🧐The core issue

🚨On May 22, LP protocol <a href="/CetusProtocol/">Cetus🐳</a> was exploited, with losses exceeding $230M.

The attacker crafted a call that caused an overflow—yet still bypassed the check—allowing them to swap a tiny amount of tokens for a massive amount of liquidity assets. How?

🧐The core issue
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨SlowMist Security Alert🚨 ☠️Recently, multiple users have reported receiving SMS messages from "well-known exchanges", saying: 🎭"Your withdrawal verification code is xxx. If you did not request this transaction, call xxx immediately for assistance." 📱Once you call back,

🚨SlowMist Security Alert🚨

☠️Recently, multiple users have reported receiving SMS messages from "well-known exchanges", saying:

🎭"Your withdrawal verification code is xxx. If you did not request this transaction, call xxx immediately for assistance."

📱Once you call back,
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨 After analysis, we found that the phishing case is a new phishing trick, carried out by the well-known phishing group #InfernoDrainer. 🧵 Unlike typical phishing, the delegated address is not a phishing address, but MetaMask: EIP-7702 Delegator

🚨 After analysis, we found that the phishing case is a new phishing trick, carried out by the well-known phishing group #InfernoDrainer.

🧵 Unlike typical phishing, the delegated address is not a phishing address, but MetaMask: EIP-7702 Delegator
SlowMist (@slowmist_team) 's Twitter Profile Photo

👏We’re excited to announce that Haust Network has successfully passed a comprehensive security audit of the Haust Wallet mobile application! Thanks for prioritizing user safety and choosing us as your audit partner. 🤝 Together, we’re making crypto safer.🛡️🚀

SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨SlowMist Security Alert🚨 The Usual protocol experienced a sophisticated arbitrage attack. Analysis reveals that the attacker exploited a price discrepancy between the protocol's internal mechanisms and external markets. The core issue stemmed from the usual Vault system,

🚨SlowMist Security Alert🚨
The <a href="/usualmoney/">Usual</a> protocol experienced a sophisticated arbitrage attack. Analysis reveals that the attacker exploited a price discrepancy between the protocol's internal mechanisms and external markets. The core issue stemmed from the usual Vault system,
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨Sometimes, solutions or tools that claim to enhance “security” may actually exploit the user’s trust to launch attacks. Today, 0x猫宁 | Crypto & AI reached out to the SlowMist Security Team after spotting phishing behavior in the browser extension Osiris. Our deep dive revealed this

🚨Sometimes, solutions or tools that claim to enhance “security” may actually exploit the user’s trust to launch attacks.

Today, <a href="/0xmaoning/">0x猫宁 | Crypto & AI</a> reached out to the SlowMist Security Team after spotting phishing behavior in the browser extension Osiris. 

Our deep dive revealed this
SlowMist (@slowmist_team) 's Twitter Profile Photo

🎉 SlowMist x Foresight News Dragon Boat Festival Giveaway 🎉 Your mnemonic phrase is the lifeline of your crypto — keep it safe, keep it in mind. 🧠⛓️ Foresight News just dropped a cool new collectible, we're giving away 3 to the community! To enter: 1⃣ Follow

🎉 SlowMist x Foresight News Dragon Boat Festival Giveaway 🎉

Your mnemonic phrase is the lifeline of your crypto — keep it safe, keep it in mind. 🧠⛓️

<a href="/Foresight_News/">Foresight News</a> just dropped a cool new collectible, we're giving away 3 to the community!

To enter:
1⃣ Follow
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨On May 21, the U.S. DOJ, in coordination with Microsoft and global law enforcement, seized core infrastructure tied to the notorious info-stealer malware LummaC2. 🔍The takedown included 5 key domains ➕ 2,300+ linked sites, dealing a major blow to downstream threat actors.

Safeheron (@safeheron) 's Twitter Profile Photo

𝙎𝙥𝙚𝙖𝙠𝙚𝙧 𝙃𝙞𝙜𝙝𝙡𝙞𝙜𝙝𝙩 “Open source is not the end, but the starting point of trust verification. What truly builds confidence is whether the code can be verified, run as expected, and clearly explained.” Cos Cos(余弦)😶‍🌫️ , founder at SlowMist, shared this

𝙎𝙥𝙚𝙖𝙠𝙚𝙧 𝙃𝙞𝙜𝙝𝙡𝙞𝙜𝙝𝙩
 
 “Open source is not the end, but the starting point of trust verification. What truly builds confidence is whether the code can be verified, run as expected, and clearly explained.”
 
Cos <a href="/evilcos/">Cos(余弦)😶‍🌫️</a> , founder at <a href="/SlowMist_Team/">SlowMist</a>, shared this
SlowMist (@slowmist_team) 's Twitter Profile Photo

On May 28, Cork Protocol suffered an exploit, resulting in losses exceeding $12 million. According to SlowMist’s analysis, the root cause lies in two key issues: 1️⃣Cork allows users to create markets with arbitrary redemption assets (RA) through the CorkConfig contract,

On May 28, <a href="/Corkprotocol/">Cork Protocol</a> suffered an exploit, resulting in losses exceeding $12 million. According to <a href="/SlowMist_Team/">SlowMist</a>’s analysis, the root cause lies in two key issues:

1️⃣Cork allows users to create markets with arbitrary redemption assets (RA) through the CorkConfig contract,