{"id":6067,"date":"2026-04-24T02:47:45","date_gmt":"2026-04-24T02:47:45","guid":{"rendered":"https:\/\/delimiter.online\/blog\/defi-hack\/"},"modified":"2026-04-24T02:47:45","modified_gmt":"2026-04-24T02:47:45","slug":"defi-hack","status":"publish","type":"post","link":"https:\/\/delimiter.online\/blog\/defi-hack\/","title":{"rendered":"Major DeFi hack and macOS supply chain threats reported in new bulletin"},"content":{"rendered":"<p>A new ThreatDay bulletin has reported a significant decentralized finance hack totaling $290 million, alongside escalating threats targeting macOS systems and proxy-based SIM farms. The report, which covers over 25 separate security incidents, highlights persistent vulnerabilities in software supply chains and attack vectors that continue to exploit basic, well-documented flaws.<\/p>\n<p>The $290 million DeFi breach represents the largest single loss in the latest wave of crypto-related crimes. While specific protocols and timestamps were still being verified at the time of reporting, the incident underscores the enduring financial risks within unregulated digital asset markets. Experts note that the attack leveraged vulnerabilities common to many DeFi platforms, including smart contract logic errors and insufficient access controls.<\/p>\n<h2>Supply chain attacks and macOS vulnerabilities<\/h2>\n<p>The bulletin draws attention to a pattern of supply chain compromise, where malicious actors are injecting backdoors and data-stealing code into unverified software packages. These tainted packages are then distributed through official repositories, infecting downstream users who unknowingly integrate them into their applications. The report emphasizes that attacking the underlying infrastructure of apps is often simpler than directly compromising the applications themselves.<\/p>\n<p>Specific mention is made of a &#8220;LotL&#8221; (Living off the Land) abuse technique targeting macOS systems. This method involves using legitimate, built-in system tools and scripts to carry out malicious activities, making detection significantly more difficult for standard security software. The technique has been observed in recent campaigns that install persistent backdoors and harvest credentials.<\/p>\n<h2>ProxySmart SIM farms and other incidents<\/h2>\n<p>The bulletin also details the use of ProxySmart SIM farms, a method where attackers use bulk SIM cards to generate and manage large volumes of phone numbers. This infrastructure is commonly used to bypass SMS-based two-factor authentication and to create fraudulent accounts on social media and other platforms. The report links these farms to credential stuffing campaigns and social engineering attacks.<\/p>\n<p>In total, the bulletin covers more than 25 new stories, including ransomware variants, zero-day exploits in enterprise software, and phishing campaigns targeting critical infrastructure. Many of the described exploits rely on &#8220;same bugs and same mistakes&#8221; that have been discussed in security circles for years, indicating a failure in basic software hygiene and patching discipline.<\/p>\n<h2>Implications and ongoing risks<\/h2>\n<p>Analysts point to the messy nature of modern software supply chains as a primary driver of these ongoing incidents. Packages that users do not personally audit are increasingly used as vectors for initial access. The trend suggests that organizations need to invest in software composition analysis and supply chain verification tools to mitigate these risks. The use of legitimate tools for malicious ends, as seen in the macOS LotL attacks, further complicates defense strategies.<\/p>\n<p>Security researchers are expected to release additional technical breakdowns of the $290 million <a href=\"https:\/\/delimiter.online\/blog\/collapsing-exploit-window\/\" title=\"DeFi hack\">DeFi hack<\/a> in the coming days, along with indicators of compromise for the macOS and supply chain threats. The ongoing cycle of attack and mitigation emphasizes the need for continuous monitoring and proactive threat intelligence across all sectors.<\/p>\n<p>Source: ThreatDay<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new ThreatDay bulletin has reported a significant decentralized finance hack totaling $290 million, alongside escalating threats targeting macOS systems and proxy-based SIM farms. The report, which covers over 25 separate security incidents, highlights persistent vulnerabilities in software supply chains and attack vectors that continue to exploit basic, well-documented flaws. The $290 million DeFi breach [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6068,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[505],"tags":[7059,7057,1276,7058,951],"class_list":["post-6067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity-bulletin","tag-defi-hack","tag-macos-security","tag-sim-fraud","tag-supply-chain-attack"],"_links":{"self":[{"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/posts\/6067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/comments?post=6067"}],"version-history":[{"count":0,"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/posts\/6067\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/media\/6068"}],"wp:attachment":[{"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/media?parent=6067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/categories?post=6067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/delimiter.online\/blog\/wp-json\/wp\/v2\/tags?post=6067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}