PhantomOpSec Profile Banner
Phantom Security Profile
Phantom Security

@PhantomOpSec

Followers
70
Following
2K
Media
6
Statuses
565

Web3 is under attack. We teach you how to defend OpSec audits•Threat modeling•Real-world attack breakdowns $70,000,000 in Secured Funds | DM for consulting

Joined October 2024
Don't wanna be here? Send us removal request.
@PhantomOpSec
Phantom Security
7 months
Elevating Web3 security. At Phantom Opsec, we're not just advisors we are your security partners. From tailored phishing simulations to comprehensive security awareness, we're elevating how protocols and individuals approach operational security in the web3 space.
1
1
1
@PhantomOpSec
Phantom Security
13 hours
This always does the trick, you just have to ask.
@0xhuy0512
0xhuy0512
1 day
First time using the Fuck-Kim-Jong-Un variation. Made blunders but still won the game 😤
Tweet media one
0
0
1
@PhantomOpSec
Phantom Security
13 hours
Fire Ant isn't just compromising ESXi hosts; they're playing chess at the hypervisor level. These aren’t smash-and-grab ops. This is long-term, persistent access for strategic espionage. If you’re still relying on EDR alone, you’re already blind. 👇.
@TheRecord_Media
The Record From Recorded Future News
2 days
A hacking campaign being tracked as "Fire Ant" is compromising virtualization and networking infrastructure used globally, and shares similarities with a China-linked group that recently launched attacks targeting Singapore
0
0
0
@PhantomOpSec
Phantom Security
14 hours
This is a sophisticated social engineering attempt . 1. Real chat history.2. Accurate language quirks.3. Browser Zoom clone.4. SDK bait for malware. If you work in web3, read every word. This could happen to anyone.
@nicnode
Nico Gallardo
16 hours
today was the closest i've been to getting scammed - this is getting more and more sophisticated. normally it's a lazy cold-approached job interview, bloomberg interview, investor pitch, etc. we all know those. but this time it came from a previous advisor who got his tg.
0
0
4
@PhantomOpSec
Phantom Security
14 hours
RT @PhantomOpSec: The threat surface is about to explode. We're not ready for what deepfake-driven social engineering will enable at scale….
0
1
0
@PhantomOpSec
Phantom Security
14 hours
RT @PhantomOpSec: Most protocol teams wait for a breach to start writing or rewriting their OpSec. The smartest ones design systems assum….
0
1
0
@PhantomOpSec
Phantom Security
14 hours
Most teams don’t realize they’re defenseless until a signer clicks a bad link or a dev wallet gets drained. If you ever want to pressure-test your team without the public pain, we’ll guide you through the drill.
Tweet media one
0
0
0
@PhantomOpSec
Phantom Security
2 days
Most protocol teams wait for a breach to start writing or rewriting their OpSec. The smartest ones design systems assuming compromise from day one. Trusting your team is great, Training them for opsec is better.
0
1
0
@PhantomOpSec
Phantom Security
2 days
The threat surface is about to explode. We're not ready for what deepfake-driven social engineering will enable at scale. OPSEC has to evolve. Fast.
@lonelysloth_sec
LonelySloth
2 days
Lot's of hype about what AI will do. But this is 100% guaranteed. Fraudsters will be able to impersonate anyone over video call in a way you can't distinguish from reality. Completely automated and scalable. We are now entering the "golden age" of social engineering attacks.
0
1
1
@PhantomOpSec
Phantom Security
4 days
Be careful with google.
@realScamSniffer
Scam Sniffer | Web3 Anti-Scam
5 days
💀 Pro tip for DeFi users: Stop using Google search for crypto sites unless you enjoy playing Russian roulette with your wallet! 🎲. Just checked: Aave, PancakeSwap, Pendle searches are ALL flooded with scam ads. One wrong click = game over!
Tweet media one
0
0
0
@PhantomOpSec
Phantom Security
5 days
RT @PhantomOpSec: A new hack almost everyday, compromising on high quality auditing, or opsec auditing will hurt your protocol on the long….
0
1
0
@PhantomOpSec
Phantom Security
5 days
RT @PhantomOpSec: @PatrickAlphaC So disappointing, but couldn’t agree more. Too many teams still treat security as a post-launch feature a….
0
1
0
@PhantomOpSec
Phantom Security
7 days
Great work guys 💪.
@coinspect
Coinspect Security
8 days
Zombie dapp update:🧟‍♀️🧟‍♂️🧟 100+ wallet drainer domains just got buried. 🪓🪓 Our team tracked the necromancer behind them and drove a stake through his op. Stay safe out there. #Web3 #InfoSec #security
Tweet media one
1
0
1
@PhantomOpSec
Phantom Security
7 days
A new hack almost everyday, compromising on high quality auditing, or opsec auditing will hurt your protocol on the long term.
@PhantomOpSec
Phantom Security
8 days
@Fav_Truffle Compromise on security and you'll definitely end up on rekt news, some protocols don't really learn from the past incidents.
0
1
1
@PhantomOpSec
Phantom Security
10 days
$27M gone, not from a leaked key, but a poisoned deployment path. Private keys weren't compromised. Logic was. DevOps, CI/CD, and infra must be treated as attack surfaces, not just your code. So unfortunate to see new hacks almost everyday now.
@SlowMist_Team
SlowMist
10 days
🚨SlowMist TI Alert🚨. The exchange @BigONEexchange was exploited due to a supply chain attack and loss exceeds $27 million. The production network was compromised, and the operating logic of account and risk control related servers was modified, enabling the attacker to withdraw
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
1
@PhantomOpSec
Phantom Security
12 days
Phishing is still #1 attack vector to extract user funds, unfortunate really.
@realScamSniffer
Scam Sniffer | Web3 Anti-Scam
12 days
🚨 Someone lost $617,922 after signing multiple phishing signatures.
Tweet media one
0
0
1
@PhantomOpSec
Phantom Security
16 days
OfficerCIA provided a lot of help and value to the crypto community over the years, anyone who's capable of donating, please do without delay.
@officer_cia
Vladimir S. | Officer's Notes
16 days
I need your support. For a year, I've been on vacation for health reasons, attending doctors, and physically unable to work as previously. I don't like asking you for money like a beggar at all, but I have very few other options…. At the present, all of my revenue comes from.
0
0
4
@PhantomOpSec
Phantom Security
16 days
RT @PhantomOpSec: gmX v1 was exploited for ~$40M, the team acknowledged it and working on it atm. Unfortunate but even big protocols with….
0
1
0
@PhantomOpSec
Phantom Security
16 days
RT @PhantomOpSec: Circle response time is frustrating; the hacker waited 1 hr safely before moving funds.
0
1
0
@PhantomOpSec
Phantom Security
17 days
Circle response time is frustrating; the hacker waited 1 hr safely before moving funds.
@officer_cia
Vladimir S. | Officer's Notes
17 days
@0xZilayo GMX exploiter bridging USDC to ETH while the @circle team eats ice cream with the forehead for 30 minutes. They have now converted to DAI… Thx @Define101 for spotting! .
0
1
2
@PhantomOpSec
Phantom Security
17 days
gmX v1 was exploited for ~$40M, the team acknowledged it and working on it atm. Unfortunate but even big protocols with security budgets get hacked, GMX spent decent amounts on security, hope they'll recover soon.
0
1
1