KODA Profile Banner
KODA Profile
KODA

@0xKoda

Followers
1,972
Following
500
Media
222
Statuses
1,238

Cyber Security & Smart Contracts | Vet

Joined August 2017
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@0xKoda
KODA
2 months
This is LLEVM. Explore the EVM bytecode of a smart contract, decompile it and speak to it via webLLM, entirely local and in the browser.
8
26
120
@0xKoda
KODA
11 months
@zachxbt @Mr312 Ooof 8yrs Plus $1.2M in restitution is a bad day at the races. Good signal, It ain’t worth it.
2
1
80
@0xKoda
KODA
2 years
October 2022 is now the biggest month in the largest year for hacks. As of the 13th, a whopping $718 MILLION has been lost to malicious actors in #DeFi per @chainalysis reports. Lets discuss how we can make Q4 safer for all individuals and protocols alike:
Tweet media one
4
7
40
@0xKoda
KODA
2 years
Hey @TGIGFestival_ you can delete us from your discord but unfortunately you cannot delete the irrefutable evidence of your negligence toward your customers.
0
2
31
@0xKoda
KODA
10 months
Find withdrawals from Tornado Cash & Railgun using Laundry! Following TG channels Storm Watch and Gun Watch, I endeavored to consolidate the data, facilitate searches & present it clearly. I remain committed to building tools that make hunting threat actors more efficient.
Tweet media one
12
5
69
@0xKoda
KODA
2 years
CBDC’s will inherit weaker security through minimal distance to entropy, contingent on tighter controls of the infrastructure. Expect: 1. More vulnerabilities as a function of time in the market 2. Exploits extracting larger value. Less energy in = shorter distance to entropy.
1
4
29
@0xKoda
KODA
10 months
@tayvano_ This makes sense, Boeing 777 = 8 filters and recirculating every 2 minutes roughly, maintaining 50% ratio. 737-800 can vary from 1 - 2 filters and recirc every 2-3 minutes. This boils down to 777 = ~ 68 passengers /filter, 787 = 96 - 149 passengers /filter Generally Airbus >
4
1
50
@0xKoda
KODA
2 years
At least we all lost together 🤝 Except Milady
1
6
43
@0xKoda
KODA
1 year
@AlboMP 10 Tweets in the last 3 days, 9 of those about the Voice, and only 1 about the ongoing events in the Middle East. No tweet for the murdered Australian either. Priorities….
3
1
30
@0xKoda
KODA
2 years
Showed a teenager my @GhibladyMaker collection on the weekend. They loved it and bought one on the spot, then started coding. Kids these days..
0
3
21
@0xKoda
KODA
2 years
New day new rug. @dictumexchange pulled the wool over many @arbitrum projects eyes. Crypto is a nuanced, fickle thing. Bring on 2023 and the year of better due diligence.
1
2
24
@0xKoda
KODA
11 months
More #Lazarus activity: Crypto themed NPM packages found delivering malware in stealth. Package names included "erc20-testenv", "blockledger", "cryptotransact" and "chainflow", each package maintained by a different user on github.
4
7
21
@0xKoda
KODA
1 year
If you aren’t using Skiff I don’t know what to tell you.
@skiffprivacy
Skiff
1 year
Coming out soon: @farcaster_xyz profiles integrated into Skiff aliases - no setup requited ⚡
Tweet media one
14
20
144
1
3
21
@0xKoda
KODA
11 months
@0xfoobar “So How did you two meet?”…
1
0
20
@0xKoda
KODA
11 months
I built a telegram channel and bot that monitors for withdrawals >100ETH from Tornado. For web3 security folk, monitoring withdrawals can be an important part of the hunt, so I've decided to share it here.
5
1
18
@0xKoda
KODA
9 months
A pivotal initiative. Sam does so much behind the scenes to improve security in the space.
@samczsun
samczsun
9 months
I'm back, did you miss me? I have some huge news! Over the last year and a half, I've been working on something big in secret with the rest of the crypto security community. Today, we're finally ready to reveal ourselves to the world. We are @_SEAL_Org
Tweet media one
96
357
2K
8
6
14
@0xKoda
KODA
2 years
There’s so much misinformation being spread throughout CT that VPNs are a viable solution to IP tracing. This is categorically false, both Gvmt and ISPs can see who is using a VPN, and use gateway enumeration to identify source IP address. Will provide an article soon™️
2
2
19
@0xKoda
KODA
8 months
Yesterday address 0xfa6b7e8709ddbf1a734b463ae9661760d4c438f0 withdrew 3,200 ETH from the Tornado Cash 100E router. This amounted to 32 * 100E withdrawals over a 24 hr period, before ALL the funds were sent back to Tornado cash in a series of 32 Deposits..
3
2
16
@0xKoda
KODA
2 years
Last pass has been breached ... again, I know of at least one DeFi protocol and team that use it. Here are some details: While passwords were encrypted, Emails were not and credit card info is yet to be seen. Expect large-scale phishing campaigns to follow.
13
3
16
@0xKoda
KODA
10 months
New name, new theme, new updates. Retrace consolidates withdrawals from Tornado Cash and Railgun on Ethereum, facilitating efficient hunting. Now with a new theme, transaction hashes linking to @MetaSleuth for faster investigations, and search by date. h/t @RAILGUN_Project
Tweet media one
4
1
17
@0xKoda
KODA
1 year
Tweet media one
0
0
16
@0xKoda
KODA
2 years
@bantg Frame still has telemetry and uses infura. Use portmaster to block app specific telemetry. It’s free and OS.
1
1
16
@0xKoda
KODA
11 months
@bantg url[.].com will help people not click
2
0
15
@0xKoda
KODA
10 months
@tayvano_ Yea A330 has one of the best ratios at 36 pax / filter. Altitude also plays a part so you want shorter recirculation intervals which also improve 02 levels. Best seats are generally fwd center at a window.
1
1
12
@0xKoda
KODA
11 months
With the Kyber Network Exploiter's recent transactions we can establish a link to various exchanges. A Kyber exploiter related address began exploiting a vulnerability related to Thirdweb transferring 455,184,210,526 HXA from 0x…dead onward to
Tweet media one
Tweet media two
1
2
13
@0xKoda
KODA
1 year
Our second guy was a little more active, having funds spread across Arbitrum and Mainnet, and deploying various contracts since August. They been cooking for a while..
Tweet media one
@TeamUnibot
Unibot
1 year
We experienced a token approval exploit from our new router and have paused our router to contain the issue. Any funds lost due to the bug on our new router will be compensated. Your keys and wallets are safe. We will release a detailed response after investigations conclude.
355
244
994
2
3
11
@0xKoda
KODA
2 years
step 4 cont: I recommend . @skiffprivacy provides encryption by default, but also allows you to create multiple accounts and handles. The cherry on-top? Skiff has encrypted cloud and functioning notion replacement. Sign in w/ @keplrwallet + @MetaMask 😉
3
2
9
@0xKoda
KODA
11 months
> Deposit into TC > Waiting.jpeg > Withdraw from TC > Transfer funds to the same address that deposited... > Transfer more funds to a pink drainer wallet Why waste the time and ETH 🫠
Tweet media one
3
0
9
@0xKoda
KODA
1 year
Best privacy platform meets farcaster
@skiffprivacy
Skiff
1 year
First integration now released. If you email a Skiff user with an address that has a @farcaster_xyz profile, the profile info, display name, and picture are auto-populated in Skiff
2
6
61
0
4
12
@0xKoda
KODA
11 months
Crypto users are being targeted through pirated applications distributed via torrents. The malicious applications facilitate an asyncRAT via port 3309, and once infected hosts a clipboard hijacker which replaces users crypto addresses with those of the attacker when copied to
3
1
11
@0xKoda
KODA
2 years
Well @farcaster_xyz has certainly been a smoother on-boarding experience than @LensProtocol , really enjoying the UX thus far. Desktop app is smooth as mustard. Ty @optimizoor for the tweet that encouraged me to try it and @dwr for helping me jump aboard!
1
0
12
@0xKoda
KODA
11 months
As this exploit was to do with ERC20 approvals, the exploiters wallet currently contains no ETH. It will be interesting to see how they fund this wallet and if they can execute it prior to USDC being frozen.
Tweet media one
@0xKoda
KODA
11 months
OKx Dex was just exploited, with several users losing funds. Hackers address is 0x1f14e38666cdd8e8975f9acc09e24e9a28fbc42d The first victim transaction is 0x37ef37adf6f25438fa6011632749d68e12879952fa7f68c6d0c183a16de9c1bf This victim unfortunately lost >15kUSDC
Tweet media one
2
1
5
2
3
9
@0xKoda
KODA
11 months
The OKX exploiters' address was eventually funded from 0xeb982159ec32b601b6201a0553a05745a14e8f6c at transaction 0x4c3cfdf935aef79d46510c86bad7c5099dc7ca04d5d002ba1f9abd05769132c5. The second okx exploiter wallet 0xFacf375Af906f55453537ca31fFA99053A010239 rx'd funds via
Tweet media one
Tweet media two
@0xKoda
KODA
11 months
As this exploit was to do with ERC20 approvals, the exploiters wallet currently contains no ETH. It will be interesting to see how they fund this wallet and if they can execute it prior to USDC being frozen.
Tweet media one
2
3
9
1
2
10
@0xKoda
KODA
2 years
Seems there is a demand, so I will release. @GMX_IO report is done, next up is @Buffer_Finance as I try to prioritize the #RealYield protocols first. Which protocol should I do next? 👇
@0xKoda
KODA
2 years
Been doing some SWOT analysis of popular DeFi protocols, who’d be interested in seeing these publicly? Views my own, ofc
4
0
10
2
0
11
@0xKoda
KODA
2 years
Been doing some SWOT analysis of popular DeFi protocols, who’d be interested in seeing these publicly? Views my own, ofc
4
0
10
@0xKoda
KODA
11 months
Built another telegram bot monitoring withdrawals from Railgun on Ethereum. I remain committed to building tools that make hunting threat actors more efficient. Both the Railgun monitor channel and Tornado monitor channel are linked below.
3
1
9
@0xKoda
KODA
1 year
@Bonecondor She is not real
Tweet media one
0
0
9
@0xKoda
KODA
2 years
Calling all DeFi Detectives and on-chain sleuths! This tool is for you. Speed up your investigations with Defi Detective, a browser extension made by yours truely. No more copy and pasting, just install, highlight and click.
1
3
9
@0xKoda
KODA
10 months
Attempts to categorize APTs based solely on their technical prowess often fall short. The varied tactics and methodologies defining APTs call for a more nuanced understanding, one that cannot be aptly captured with simplistic, broad-brush approaches.
Tweet media one
1
0
6
@0xKoda
KODA
11 months
More interesting behavior following withdrawals from the TC 100E pool. > 7 Addresses withdraw 100E each. > Route through a dummy "WETH" contract > Followed by an address that withdrew ~2800E in Nov > Route 200E on-wards to addresses that deposit to Fixed Float and Mexc. 7
Tweet media one
1
0
7
@0xKoda
KODA
11 months
Web3 is not immune to Web2 vulnerabilities. Following the Velodrome FE compromize I created another TG channel to monitor select Web3 frontends for indicators of compromize.
1
0
6
@0xKoda
KODA
11 months
Reminder to revoke old token approvals! 0x..3cDf0 Is deploying contracts that exploit and extract ERC20 tokens vulnerable to often predisclosed vulnerabilities and sending those tokens directly to the NFT Trader Exploiter. Recently seen with uboost and swap0x
0
3
8
@0xKoda
KODA
1 year
@Lisa9Sophia Whatever it is, do not expect the truth.
1
0
9
@0xKoda
KODA
8 months
With these three addresses combined, the total withdrawal was 8000E, valued at $23.8 Million US.
@0xKoda
KODA
8 months
Another URL to watch, using the same script tornado-cash[.]com. Over the last 3 days, the following addresses dominated 100E pool withdrawals: 0xfa6b7e8709ddbf1a734b463ae9661760d4c438f0 0xe901dea7a92dadb188626feb62ea475897e61f8c 0x3ba4fd5124479a7d21e9540bd8d8568121a68bd0
1
1
6
0
2
10
@0xKoda
KODA
10 months
Ouch. This is not natural selection.
Tweet media one
3
1
8
@0xKoda
KODA
1 year
@bantg Original post
@ValdikSS
ValdikSS
1 year
Well, shit. Encrypted traffic interception on Hetzner and Linode targeting , the largest Russian XMPP (Jabber) messaging service. The instant messaging have been wiretapped for 3 months, on both hosting providers in Germany.
32
285
759
0
0
7
@0xKoda
KODA
1 year
List of businesses affected by the #optus outage: - Melb Metro rail - ACT Government (phones) - Royal Melb Hospital - Budget Direct - Western Syd University - Virgin Australia (Velocity call-center) - Commbank - ANZ - Tafe QLD - Speech pathology Au - Long seed & grain More .👇
1
3
9
@0xKoda
KODA
2 years
The key takeaway here is to remain vigilant and practice good OPSEC. This includes limiting behaviors that are conductive to effective phish campaigns: 1. Stop using password managers, rather, keep air-gapped records using your own obfuscation technique 2. Stop using LinkedIn
2
0
8
@0xKoda
KODA
2 years
No mud, No lotus 🪷 2022 has exposed the mud in Defi, so the true lotus flowers can push through the surface. Secrecy, lack of transparency and complete disregard for retail investors and employees serve no purpose moving forward. I’m optimistic for 2023.
1
0
9
@0xKoda
KODA
11 months
OKx Dex was just exploited, with several users losing funds. Hackers address is 0x1f14e38666cdd8e8975f9acc09e24e9a28fbc42d The first victim transaction is 0x37ef37adf6f25438fa6011632749d68e12879952fa7f68c6d0c183a16de9c1bf This victim unfortunately lost >15kUSDC
Tweet media one
@eno_eth
ENO
11 months
就在刚刚收到好友的协助请求 @axe_ping ,他的钱包资金被盗了,大量资金转入了黑客地址 0x1f14e38666cdd8e8975f9acc09e24e9a28fbc42d。所有被盗的钱包都授权给了 Okx DEX。很明显是Okx DEX被黑客攻击了,十分钟前OKX移除了被黑客攻击的代理地址。
13
3
26
2
1
5
@0xKoda
KODA
11 months
The little contract that could: 4 days ago, 0x..87611 deployed a fake "WETH" contract 0x..fe26 after receiving funds from Fixed Float. This contract has since processed >800 ETH in deposits, these deposits come from a series of wallets that withdrew from the 100E pool over the
Tweet media one
1
0
7
@0xKoda
KODA
11 months
@zachxbt @0xaxxe Bro could of at least made an effort and sent to a clean addr from FF🥲
1
0
8
@0xKoda
KODA
11 months
New #Lazarus related emv1.group-meeting[.]team
1
0
6
@0xKoda
KODA
1 year
@DarknetDiaries @JackRhysider @naomibrockwell At the end you mention you’ve ditched android and switched to a “privacy phone” ? Is it graphene OS?
1
0
1
@0xKoda
KODA
11 months
The day we do away with SMS 2FA is the day the internet becomes a safer place.
1
0
7
@0xKoda
KODA
10 months
@SpachusAus Excellent signal
0
0
8
@0xKoda
KODA
1 year
@AlboMP Priorities? There is literally another war brewing
0
0
7
@0xKoda
KODA
2 years
Me: I'd like some yield on my $ARB, thanks. Her: Low IL, No IL, Incentivized rewards, single sided staking, concentrated liquidity, non-inflationary yield, locked liq or escrowed tokens? Me: I just want yield that tastes like real yield...
Tweet media one
1
0
8
@0xKoda
KODA
10 months
The rUSDCn market seems to be exploited, with the hacker deploying a contract to take advantage minting new rUSDCn, and swapping rUSDn for USDC. (From first glance, am on phone)
1
1
6
@0xKoda
KODA
10 months
Pretty aggressive phishing campaign happening right now, with an army of bot accounts link spoofing to appear as @ArkhamIntel when in reality the link goes to a separate fake account @ ArkhamIntelDAO, promoting a fake phishing site. Do not click!
Tweet media one
0
0
5
@0xKoda
KODA
11 months
@JackRhysider Private pilots license
0
0
5
@0xKoda
KODA
11 months
For crypto to prevail long term we need to solve for Web2 issues. Users should not get rekt from issues on the front-end. After tackling this issue I blv the most efficient solution is wallet providers map & check url <> contract prior to signing TX. Let’s promote a discussion.
1
0
6
@0xKoda
KODA
11 months
@ShieldifyAnon Finished this last year, it comes with a book, be sure to support the author . It also isn't for beginners to Rust.
0
0
7
@0xKoda
KODA
2 years
@NaniXBT @scrypto_ For reference (taking commissions)
Tweet media one
2
0
6
@0xKoda
KODA
2 years
Blink 182 🎟✅
0
0
6
@0xKoda
KODA
2 years
@litedart @GhibladyMaker "yes we really like your idea, but does it ghib?"
0
0
6
@0xKoda
KODA
11 months
We have the perfect domain provenance technology in blockchain, the question is how do we apply it to prevent the impact of DNS takeovers?
Tweet media one
2
1
6
@0xKoda
KODA
10 months
Watching Railgun withdrawals via Gunwatch: 0x..6e3dd received 193.6ETH from Railgun, before bridging to Arbitrum, then bridging back to Mainnet & leaving the funds split between 0x..ABc61f & 0x..6D4B1.
1
0
4
@0xKoda
KODA
11 months
Man won’t stop
@CyversAlerts
🚨 Cyvers Alerts 🚨
11 months
🚨ALERT🚨Our system has detected an abnormal transaction related to the @KyberNetwork exploiter. The address funded by the @KyberNetwork exploiter has received $50M worth of $HXA from the 0x0..000dEaD $ETH address using transferfrom function! 🤯 Address: .
Tweet media one
Tweet media two
5
25
99
1
1
4
@0xKoda
KODA
11 months
Observed remote Address 104.16.85.20:443 from https://cdn[.]jsdelivr[.]net/npm/@ledgerhq/connect-kit@1
@MatthewLilley
I'm Software 🦇🔊
11 months
🚨🚨🚨 RED ALERT 🚨🚨🚨: Do not interact with ANY dApps until further notice. It appears that a commonly used web3 connector has been compromised which allows for injection of malicious code affecting numerous dApps.
509
3K
6K
0
0
5
@0xKoda
KODA
11 months
open connection to 224.0.0[.]252:5355 linked to an Infostealer campaign istributing LUMMA malware.
0
0
4
@0xKoda
KODA
1 year
@cjoye Mates looking after Mates
0
0
5
@0xKoda
KODA
2 years
@crypto_condom @Tendeeno_ Nice! Could use someone with such skill for UI design in the coming weeks.
2
0
6
@0xKoda
KODA
2 years
The Aptos tokenomics design team in action
Tweet media one
0
1
6
@0xKoda
KODA
11 months
Newer #Lazarus related: www.group-meeting[.]team technical-support.safe-meeting[.]online hashkey.group-meeting[.]team
0
0
3
@0xKoda
KODA
2 years
@GhibladyMaker ghib Android17/18 lady
0
0
6
@0xKoda
KODA
2 years
@RyanSAdams From one glasses wearer to another, we are not the same.
0
0
6
@0xKoda
KODA
11 months
@samczsun @shoucccc Also cred to @rabbit_2333 who I believe originally disclosed this
1
0
6
@0xKoda
KODA
11 months
Below are #Lazarus related and some #Bluenoroff activity, some are old but not otherwise tracked. #Bluenoroff campaigns have targeted MacOS devices and the crypto industry. They have also expanded to telegram, the latest post by @AlexMasmej explains how they were targeted.
Tweet media one
0
0
7
@0xKoda
KODA
11 months
An address with several CEX withdrawals sent 1,353 USDC to NFT Trader Exploiter earlier this month.
Tweet media one
2
0
5
@0xKoda
KODA
11 months
Most DeFi protocols lack incident response plans. So a few weeks back I began developing generic DeFi incident response plans that may serve as a starting point for the little guys. It started as a hobby & I called them DIRP's. I've now recognized their value so sharing here.
1
0
5
@0xKoda
KODA
2 years
1) What
@tier10k
db
2 years
[DB] SBF Arrested by Bahamian Authorities
1K
3K
23K
0
0
6
@0xKoda
KODA
1 year
@RonniSalt Hypocrisy is apparent when the shoe is on the other foot, those who once wielded power find themselves at the mercy of the very tactics they employed. The coordinated campaign is a testament to the ruthlessness and the lengths to which some wil go to maintain their grip on power
0
0
6
@0xKoda
KODA
9 months
Watching addresses like this one withdraw from TC and directly deploy rugs on base. 0xA6950a664FBF5F63697F39Ce2A545B24fA80346d
1
0
6
@0xKoda
KODA
2 years
Step 6: Know thy computer telemetry! The apps you use are in constant communication with servers, sending periodic packets unbeknownst to the end user. Prevent this using Portmaster by it's O/S and free. Bonus? Forget VPNs, Use Safing SPN! @SafingIO
1
0
6
@0xKoda
KODA
1 year
While global tensions are rising it is incredibly important to block advertising on all devices, and preferably, at the router. Expect the widespread distribution of “malvertising” to increase over the coming weeks.
1
0
5
@0xKoda
KODA
11 months
This blog dives into reverse engineering the dll, be sure to use google translate.
0
0
4
@0xKoda
KODA
2 years
@CanteringClark @UmamiFinance The most forward-thinking team in DeFi IMO. They apply prudence and care in all undertakings, and do not hesitate to iterate on product launches. Completely transparent and communicate regularly. They are ushering a new standard for both retail and institutional investors.
0
0
5
@0xKoda
KODA
2 years
We’re so back (allegedly)
0
0
5
@0xKoda
KODA
2 years
If it is anonymity you seek, endpoint obfuscation and telemetry minimization should be your priority. I have tirelessly provided a free and OS solution for this, which has had little uptake (I have no affiliation with the service, but wish to see frens protected).
2
0
5
@0xKoda
KODA
10 months
Have an amazing holidays. Embrace family and share kindness. Give yourself permission to switch off.
0
0
4
@0xKoda
KODA
10 months
Isn’t this a sneaky one, imitating a video but sending to a drainer. Be careful out there. + Bonus tip: while it won’t work for Twitter, NextDNS (free) with HageZi blocklist will block most ads being served to you day to day. Fighting malvertizing is a never ending battle.
Tweet media one
1
2
3
@0xKoda
KODA
2 years
2
0
5
@0xKoda
KODA
11 months
First TX:
2
0
3
@0xKoda
KODA
2 years
@crypto_noodles @crypto_condom @GMX_IO Seriously? He has no team. One of the most respected and honest people in Defi, worth having on your side. Glad people can watch you act like this in public, only will reaffirm their fears.
0
0
5
@0xKoda
KODA
2 years
3. Compartmentalize email addresses, providers like Skiff allow the use of aliases for online services, leverage this. 4. If you are a DeFi protocol, listen to the recommendations of your CISO, they preemptively assess risks such as these, do not downplay the impact.
1
0
4
@0xKoda
KODA
11 months
@rpolysec 100% this. There are those in Defi security who are entirely capable of good IR without the post exploit clout farm. Discretion is key in these engagements.
0
0
3