BlockThreat - Week 25, 2025

Nobitex, Meta Pool, Bankroll Network, CoinMarketCap, Hacken

BlockThreat - Week 25, 2025

Greetings!

The cryptocurrency industry may have just experienced its Stuxnet moment. On June 18th, a pro-Israel threat actor compromised a hot wallet belonging to Nobitex, Iran’s largest crypto exchange. Coming amidst escalating conflict between Israel and Iran, the attack was overtly political with $90 million in stolen assets were sent to wallets with addresses like 1FuckiRGCTerroristsNoBiTEXXXaAovLX. Just as Stuxnet used code to sabotage Iran’s nuclear ambitions, this breach signals a turning point: crypto infrastructure is no longer just financial plumbing, but a strategic national asset and a legitimate target in geopolitical conflict. As blockchain systems become further entangled in the global power structure, a new paradigm is emerging where code is power. And where there is power, there will be adversaries. Nobitex may be the first prominent casualty in a new frontier, where exchanges, validators, and even entire chains become proxy battlefields in an evolving, asymmetric cyberwar. Western platforms like Coinbase, Kraken, Gemini, and others would be naive to think they are immune.

This week also highlighted a troubling trend in phishing and user-targeted attacks. It began with a compromise of CoinMarketCap, where a malicious JavaScript payload with a drainer was injected via a third-party dependency. Soon after, Cointelegraph was also compromised, displaying a crypto drainer popup to unsuspecting users. Last week’s edition focused on the growing threat of supply chain compromises, it’s disheartening to see this already well-known attack vector being exploited yet again to target end users directly. Theft from users is particularly damaging as it erodes the trust that underpins our ecosystem. And without trust, this industry cannot grow.

Speaking of user trust be sure check out the excellent work to uplevel wallet security by this week’s sponsor, Coinspect.


Coinspect’s Wallet Security Ranking is an objective, transparent, and regularly updated evaluation of leading cryptocurrency wallets. It focuses on critical security features like anti-phishing defenses, transaction clarity, and protection against blind signing, helping users choose wallets that prioritize their safety.

Link: https://www.coinspect.com/wallets/


Everyone in blocksec fucks up. It’s part of building in a fast-moving, adversarial, and still-maturing ecosystem. But lately, I’ve noticed a troubling trend: instead of learning from each other’s failures, parts of the community are turning on one another. One recent flame war erupted when a security firm raised valid concerns about the quality of a private audit of a recently compromised protocol. What could’ve been a constructive conversation quickly devolved into public finger-pointing, with the attacker gleefully fueling the drama through onchain taunts. Two more conflicts followed with one involving a private key compromise at a security company and another where a malicious insider exploited a privately disclosed vulnerability. All of these incidents sparked even more accusations, distrust, and taunting.

These incidents are reminders that no one is immune to mistakes. But how we respond matters more than who screwed up. We’re still a small, young industry, and infighting only weakens us while giving attackers exactly what they want. The true villains here are not the audit firms that sometimes should have known better, but the ones who exploit, steal, and burn trust to the ground.

It inevitable that we’ll keep fucking up. But if we own our mistakes, support each other through them, and stay focused on the shared mission of securing the ecosystem, we’ll come out stronger.

Before we dive into this week’s flood of phishing attacks and DeFi hacks, a quick word from our sponsor — Oak Security, a trusted auditor behind some of the ecosystem’s most unique protocols and a long-time supporter of this newsletter.


Oak Security has operated in Web3 Security since 2017, providing security services throughout a project's lifecycle. audits. This includes audits, penetration testing, operational security training, and advisory services. Our signature blinded process emphasizes redundancy: Every line of code is reviewed by multiple auditors with a multi-disciplinary background in parallel.

Link: https://www.oaksecurity.io/


Let’s dive into the news!

News

Crime

Phishing

Scams

Malware

Media

Research

Tools

Hacks

Meta Pool

Date: June 17, 2025
Attack Vector: Insufficient Function Access Control
Impact: $27,000,000
Chain: Ethereum

References:

https://x.com/TenArmorAlert/status/1934867503252983903
https://x.com/peckshield/status/1934895187102454206
https://x.com/meta_pool/status/1934968383872589858
https://x.com/SlowMist_Team/status/1934896061166096739
https://x.com/AckeeBlockchain/status/1935038467693846861
https://medium.com/meta-pool/meta-pool-security-incident-on-mpeth-contract-on-ethereum-ba7a328d45c6
https://quillaudits.medium.com/how-27m-in-stolen-tokens-led-to-just-130k-in-losses-the-meta-pool-hack-4e93ec56288e
https://blog.solidityscan.com/meta-pool-hack-analysis-fef7796f2303
https://medium.com/@lodelux/meta-pool-27m-june-hack-a-technical-breakdown-057cf44e850c
https://x.com/moo9000/status/1935274586259460256

Exploit:

https://etherscan.io/tx/0x57ee419a001d85085478d04dd2a73daa91175b1d7c11d8a8fb5622c56fd1fa69
https://etherscan.io/tx/0x4f43fc6d674e85f7d306debb4a3d48e7688c2fe5a6332dd9ad57558a15c86ef9

Nobitex

Date: June 18, 2025
Attack Vector: Hot Wallet Compromise
Impact: $81,700,000
Chain: Tron, Ethereum, Bitcoin

References:

https://x.com/SlowMist_Team/status/1935246606095593578
https://x.com/GonjeshkeDarand/status/1935231018937536681
https://x.com/GonjeshkeDarand/status/1935412212320891089
https://x.com/CyversAlerts/status/1935252892035760356
https://medium.com/zengo/the-vanity-address-affair-the-iranian-crypto-exchange-hack-a6047259f268
https://x.com/GonjeshkeDarand/status/1935593397156270534
https://www.elliptic.co/blog/iranian-crypto-exchange-nobitex-hacked-pro-israel-group
https://slowmist.medium.com/nearly-100-million-burned-irans-largest-crypto-exchange-nobitex-suffers-major-hack-eafd57b2eac7
https://www.chainalysis.com/blog/nobitex-iranian-exchange-exploit-june-2025/

Analysis:

https://x.com/craiu/status/1935690829210751001

Bankroll Network

Date: June 19, 2025
Attack Vector: Integer Underflow
Impact: $65,000
Chain: BSC, Ethereum

References:

https://x.com/TenArmorAlert/status/1935618109802459464
https://blog.solidityscan.com/bankroll-network-hack-analysis-5d7cdec35075

Exploit:

https://bscscan.com/tx/0x96a6a5ded6d652ec8a38804281fd99437f4cb3fcb4858ca0cf6c632eb34a40c4
https://bscscan.com/tx/0x7226b3947c7e8651982e5bd777bca52d03ea31d19b515dec123595a4435ae22c
https://bscscan.com/tx/0x0706425beba4b3f28d5a8af8be26287aa412d076828ec73d8003445c087af5fd
https://etherscan.io/tx/0x8905a0aca5849626c0de026c2d2894ddfa8060a27725221f01aac9fb0b3d6629

Unkn_e968d2

Date: June 20, 2025
Attack Vector: Reward Manipulation
Impact: $16,400
Chain: BSC

References:

https://x.com/TenArmorAlert/status/1936260055105413500

Exploit:

https://bscscan.com/tx/0xf34e59e4fe2c9b454d2b73a1a3f3aaf07d484a0c71ff8278b1c068cdedc4b64d

CoinMarketCap

Date: June 20, 2025
Attack Vector: JavaScript Injection
Impact: $43,266
Chain: Ethereum

References:

https://x.com/NFTherder/status/1936198662935527722
https://www.chainabuse.com/report/8381f4d3-2df7-4e66-8420-03f224386152
https://x.com/CoinMarketCap
https://x.com/ReyXBF/status/1936276263137574931
https://x.com/CoinMarketCap/status/1936273633611334081
https://x.com/coinspect/status/1936231159320453579

Hacken

Date: June 20, 2025
Attack Vector: Stolen Private Keys
Impact: $253,000
Chain: BSC, Ethereum

References:

https://x.com/PeckShieldAlert/status/1936198957119774979
https://x.com/CyversAlerts/status/1936369526137860120
https://x.com/hackenclub/status/1936362881932484854
https://x.com/hackenclub/status/1936487412101742852s
https://x.com/tayvano_/status/1936530312676483413
https://x.com/tayvano_/status/1936511878882381958
https://x.com/hackenclub/status/1936414609042296833

Exploit:

https://bscscan.com/tx/0xe8c895df8d99d3a680faf80bb65f80c53d8f2c48b5d48fe7c73883b6824aa30f

Libertum Token

Date: June 20, 2025
Attack Vector: Unknown
Impact: $4,800

References:

https://x.com/BlockSecTeam/status/1935974251334627648

Infrared Finance

Date: June 22, 2025
Attack Vector: Insufficient Function Access Control
Impact: $43,000
Chain: Base

References:

https://x.com/TenArmorAlert/status/1936977237116330100

Exploit:

https://basescan.org/tx/0xc78a94c964c99ceff228f72d400aa57ee0f8c62998b59391c9ec4762bad6cfd3