Hacken🇺🇦
@hackenclub
Followers
140K
Following
11K
Media
3K
Statuses
10K
End-to-End Blockchain Security & Compliance Partner Born on blockchain. Built for what’s next 🛡️
Security Castle
Joined August 2017
🚨 $3.6B+ stolen in Web3 this year. North Korean hackers are behind 56% of it. We just published the Hacken TRUST Report 2025 – your executive guide to surviving Web3’s most dangerous year yet. 📥 Download → https://t.co/k8qqufSMGa
17
9
115
🇦🇪 Proud to strengthen Hacken’s relations with the UAE government and @cscgovae, global leaders in building secure digital infrastructure. Grateful for the opportunity to meet H.E. Dr. Mohamed Al Kuwaiti, a visionary shaping the future of cybersecurity and digital trust. We’re
3
4
12
🎙 This thread recaps our talk from the @Coinbase Security Series (Ep. 8). It’s a must-watch for devs, security leads & auditors building hybrid Web3 products. Watch it here 👇 https://t.co/5XqytPtirS
0
0
3
Every Web3 app is hybrid. Every exploit we see starts where backend, frontend, and smart contract drift apart. 🛠 Smart contract security is essential… 🛡 But full protection means securing the system. 👉 See real fixes and takeaways in the full blog:
hacken.io
In Episode 8 of the Coinbase Security Series, Hacken’s Senior Smart Contract Auditor, Olesia Bilenka, breaks down one of the most overlooked realities in the industry: Smart contract security alone...
1
0
3
🚨 Case #3: Business Logic Enforcement Gap Your backend says “mint max 100”? But contract lets 1000? Attackers bypass frontend → call contract directly → drain supply. Fix? → Encode logic on-chain, or sign it cryptographically (EIP-712).
1
0
2
🚨 Case #2: Multi-Source State Drift When you store ownership in both: ▫️ the blockchain ▫️ your backend database …and fail to keep them synced in real time → ghost owners, blocked users, stale permissions, and exploits. Fix? → Real-time revalidation with every sensitive
1
0
2
🚨 Case #1: Split-Call Workflows An action split into two steps: 1. On-chain NFT mint 2. Off-chain /register call If the backend trusts user input & they’re not synced… Attackers mint, sell fast, and still register as owner. Fix? → Event-driven sync only from on-chain
1
0
2
Smart contract security is not enough. We break down 3 patterns we’ve seen across countless audits: ⚠️ Split-call workflows ⚠️ State drift between chain & DB ⚠️ Business logic gaps between frontend & contract Each opens critical vulnerabilities.
1
0
2
Many Web3 hacks don’t start in smart contracts. They start in the Web2 layer behind your app. Login flows. Admin panels. APIs. Metadata. Here’s a recap of our episode in the Coinbase Security Series by @base 🧵
3
2
17
🎉 What an unforgettable evening at pRoofPoint Devconnect Buenos Aires! A huge thank you to our co-hosts @Yellow, @cedranetwork & @hackenclub, and to all the participants who joined — your energy made the night truly special 🌇 From insightful panel talks to interactive
7
10
39
🚨 Inside @GANA_PayFi exploit The attacker used EIP-7702 to bypass unstake checks, hijacked reward rates, and rotated ownership across 8 wallets. Root cause? Key compromise or rug-pull-like misuse. Full investigation by @extractor_web3 👇 https://t.co/9X8sv4aU6t
hacken.io
GANA Payment was exploited for about $3.1M in liquidity on PancakeSwap, in an incident that raised serious questions about key management and admin controls. Affected project GANA Payment Loss ≈...
1
2
13
‼️ Live in ONE hour. GENIUS compliance won’t wait: non-compliant stablecoins, RWAs, and payment systems risk lost funds & trust. Learn how to verify reserves, automate AML & Travel Rule, and meet cybersecurity standards. Jump in to get ahead 👇 https://t.co/VWfj60LWug
2
4
14
Our CEO & Co-Founder @jerh17 sat down with @Bold_Awards to unpack Hacken’s journey, the hacker mindset, and what true Web3 security looks like. Defense is a castle: build it, fortify it, update it. Watch the full talk: https://t.co/t5GbOh9WZu
4
5
24
The hits keep coming. Crypto is bleeding billions, and the culprits aren’t who you think. Want a breakdown of the deadliest year for Web3 yet? Discover which risks really drained billions – and how to stay ahead. Get the Hacken 2025 TRUST Report 👇 https://t.co/k8qqufSMGa
hacken.io
$3.6 B lost. 56% traced to North Korea. Operational security failures dominate. The Hacken 2025 TRUST Report is here — revealing how operational security, not smart-contract code, has become the main...
0
1
2
On-chain monitoring is the line between a blocked hack and a post-mortem. @extractor_web3's Safe Multisig & TVL Monitors check tampered signatures, transfers, and withdrawals before they spiral, keeping you ahead of hacks. Book a demo 👇 https://t.co/xGiOdDesPV
extractor.live
Stop exploits before losses. Extractor delivers real-time monitoring, automated smart actions, and audit-ready evidence across your entire Web3 stack – full setup included.
1
1
1
Preventing access control exploits is about discipline: ✅ Use hardware wallets on isolated devices for signing ✅ Lock down vendor accounts and privileges ✅ Monitor multi-sig wallets and admin activity continuously ✅ Keep repos and environments clean from poisoned
1
1
2
Crypto losses aren’t always clever hacks. This year, 57.8% came from human mistakes: open doors, sloppy privileges, exposed signers. Simple errors. Huge losses. Access control failures are the most preventable risks that keep costing billions. Stop leaving the door open 👇
3
5
16
The Missing Link in Tokenized Finance Join us on December 2 for a special webinar on ERC-7943, the emerging interoperability standard designed to unify how real-world assets are issued, transferred, and governed on-chain. We’ll be joined by industry leaders: • @patrickhennes
10
19
74
⚡️ Hacken has been ranked among the fastest-growing tech companies in Central Europe by @Deloitte Technology Fast 50, an annual ranking that highlights innovation and rapid revenue growth across the region’s tech landscape. This recognition is a reflection of our team’s
6
13
58
The most costly mistakes happen after the deploy button is pressed. And if you can’t see your risks, you can’t stop them. @extractor_web3 put together a checklist to help you stay ahead and protect your mission from day one 👇
Most Web3 teams think security ends with the audit. In truth, 100% of attacks hit after launch – upgrades, new integrations. By the time teams respond, alerts are going off and money is disappearing. Good news: Extractor can help. Run this checklist before launch ⬇️
1
2
8