CertiK Logo
Products
Company
CertiK Resources
Blogs, Latest News, Announcements, and more
Welcome to CertiK’s Hack3d report for Q1 of 2025! During this quarter, hackers stole more than $1.6 billion across 197 security incidents. These figures represent an approximate 303.38% increase in value lost compared to the previous quarter, the majority of which is due to the Bybit exploit, the largest crypto theft in history. In our report, we discuss the latest trends in Web3 security, including an analysis of the most prominent attack vectors and targeted chains. We also highlight a variety of our recently-published technical and educational resources.
4/1/2025
CertiK at Consensus 2025: Attendee Guide
As a leading Web3 security company and an important sponsor of this conference, CertiK sincerely invites Web3 participants from all over the world to attend to learn more about our cutting-edge security research, discuss the future of Web3, and promote industry security. This guide will take you through CertiK’s exciting activities at Consensus 2025 and help you efficiently plan your interactive itinerary with us.
5/9/2025
PancakeSwap Infinity: Hooks Security Considerations
This article discusses some of the new features of PancakeSwap Infinity, and explores the security considerations related to PancakeSwap Infinity hooks.
5/7/2025
Pectra’s EIP-7702: Redefining Trust Assumptions of Externally Owned Accounts (EOAs) in EVM
In this post, we examine how EIP-7702 reshapes core EVM assumptions, spotlight mocked examples, and provide actionable guidance for developers to assess whether their existing contracts may be vulnerable.
5/6/2025
Oracle Wars: The Rise of Price Manipulation Attacks
In this article, we look at how oracles work, why they matter, how they can be exploited, and more, with the goal of educating DeFi participants on how to better protect themselves from these types of threats.
5/6/2025
CertiK Co-founder Ronghui Gu Speaks at Unchained Summit on Web3 Security and Compliance
Ronghui Gu, Co-founder of CertiK and Associate Professor of Computer Science at Columbia University, delivered a Keynote speech at Unchained Summit Dubai 2025, emphasizing the important balance between Web3 innovation and security.
4/30/2025
EVM – Cosmos Convergence Research From Security Base: Part 1
Ethereum and Cosmos, two prominent blockchain protocols, have long pursued integration through solutions like EVM compatible chains built on Cosmos SDK (e.g. evmos/Ethermint), followed by the emerging consensus-layer (CL) swaps (e.g. Tendermint replacement for Ethereum PoS) in EVM compatible chains. This series unpacks their technical approaches and associated security trade-offs, providing an in-depth exploration of the convergence of these ecosystems.
4/17/2025
Move for Solidity Developers I: Storage and Access Control
“Move for Solidity Developers” is a series created for experienced Solidity developers who already know a bit about Move. It helps you shift from writing Solidity contracts to developing on Move-based blockchains, such as Aptos and Sui. In this first installment, we’ll explore how Move’s approach to state storage and access control differs from the Solidity/EVM model. By drawing comparisons and analogies, we aim to make these new concepts feel familiar.
4/3/2025
Hack3d: The Web3 Security Quarterly Report - Q1 2025
Welcome to CertiK’s Hack3d report for Q1 of 2025! During this quarter, hackers stole more than $1.6 billion across 197 security incidents. These figures represent an approximate 303.38% increase in value lost compared to the previous quarter, the majority of which is due to the Bybit exploit, the largest crypto theft in history. In our report, we discuss the latest trends in Web3 security, including an analysis of the most prominent attack vectors and targeted chains. We also highlight a variety of our recently-published technical and educational resources.
4/1/2025
A “Long Overdue” innovation in Cardano: Interoperable Programmable Token Design
As CIP-113 advances toward finalization, CertiK is closely tracking its progress—a milestone that could reshape how developers build and enterprises engage with Cardano. This article explores the specification in depth, covering its background, the problems it addresses, its implementation, its impact on the Cardano ecosystem, comparisons with ERC-20, and security considerations.
3/31/2025
Magic Internet Money Incident Analysis
On 25 March 2025, MIM Spell was exploited for 6,261.13 ETH (~$12.9M) due to a vulnerability in the integration of the RouterOrder and Cauldron contracts. The attacker was able to borrow funds, liquidate themselves then borrow funds again without repaying them. This was due to the liquidation process not overwriting records in RouterOrder that counted as collateral, allowing exploiter to falsely borrow additional funds after liquidation.
3/27/2025
0xInfini Incident Analysis
On 24 February 2025, 0xInfini was targeted by an attack that resulted in a loss of ~$49M. A key wallet used in the attack had previously been involved in the development of Infini contracts and had retained admin rights which were used to redeem all Vault tokens.
2/26/2025
Bybit Incident Technical Analysis
On Feb-21-2025 at 02:16:11 PM UTC, the Bybit’s cold ethereum wallet was drained due to a malicious contract upgrade. This exploit resulted in an estimated loss of approximately $1.46 billion, marking the largest breach in Web3 history.
2/23/2025
XPEPE Token Incident Analysis
On 25 January 2025, an attacker exploited a vulnerability in XPEPE’s TokenStaker contract which led to a 99% drop of the token price.
2/12/2025
CertiK Ventures Announces Investment in Zoo Finance
CertiK Ventures is proud to announce our investment in Zoo Finance – a DeFi protocol pioneering the next evolution of blockchain fundraising via its Liquid Node Token (LNT) architecture.
2/11/2025
INOs: A New Era in Web3 Fundraising — Opportunities and Challenges
What is driving the rise of INOs, and how might they shape the future of decentralized networks and project funding? Let’s dive into the potential benefits and challenges of this emerging model.
2/11/2025
Uniswap V4: Hooks Security Considerations
This article discusses some of the new features of Uniswap V4, and explores the security considerations related to Uniswap V4 hooks.
1/28/2025
How to Protect Your Crypto in 2025
Given that phishing attacks are on the rise, it’s important for all Web3 participants to learn how to better protect their cryptocurrency. Below, we’ll look at strategies for avoiding phishing and traps you should avoid.
1/16/2025
Evil in the Shadows: Unveiling the Chaos in Ethereum’s Token Ecosystem
In the Web3 space, new tokens are constantly emerging. Have you ever wondered how many new tokens are issued each day? And more importantly, are these new tokens safe? Over the past few months, CertiK's security team has identified numerous cases of rug pull transactions. Notably, all of the tokens involved in these cases were newly listed on the blockchain.
1/9/2025