m13_digital Profile Banner
M13 Digital Profile
M13 Digital

@m13_digital

Followers
574
Following
2K
Media
137
Statuses
424

Blockchain Intelligence | On-chain Technical Analysis | Fund Tracing | Reconstruction of Complex Transactions and Forensic Reports for DeFi investors.

Contact ➔
Joined November 2021
Don't wanna be here? Send us removal request.
@m13_digital
M13 Digital
2 months
Blockchain intelligence specialized in on-chain analysis focused on fund tracing across EVM, non-EVM networks, and reconstruction of complex transactions. Our mission is to make the crypto ecosystem safer through forensic investigations and reports for investors, and companies.
2
0
6
@QuillAudits_AI
QuillAudits 🔜 Devconnect 🇦🇷🥷
2 days
On November 4, 2025, a major controversy erupted in the community following a $93 million loss tied to Stream Finance's xUSD stablecoin depeg and insolvency. The issue centered on permissionless vaults on Morpho Labs and Euler Finance, where third-party curators had allocated
@DU09BTC
Duo Nine ⚡ YCC
4 days
Get your money out of @MorphoLabs and @eulerfinance! Here's why. They take your USDC and give it out to insolvent protocols that leverage loop scam stables like xUSD by Stream Defi which just lost $93M of user money. The incentives are totally misaligned. Curators on Morpho
0
5
15
@m13_digital
M13 Digital
2 days
🛠️ #Service #DeFiSecurity Fake Staking USDC Vault Project An investor contacted us through Reddit to resolve an issue involving an alleged DeFi staking protocol that promised daily yields. The scammer created a false sense of trust by paying small initial returns tied to a
0
0
0
@m13_digital
M13 Digital
3 days
@omeragoldberg
Omer Goldberg
3 days
1/ On November 4th at 05:45:11 AM UTC, the Moonwell protocol was exploited via a Chainlink oracle malfunction that reported secondary market prices, leading to a $1 million loss.
0
0
0
@m13_digital
M13 Digital
4 days
🛡️ #SecurityAlert On-chain monitoring systems detected earlier today, around 05:45:11 (UTC), multiple exploit transactions in #Moonwell’s lending contracts. The attack specifically targeted the $wrstETH and $wstETH markets. The exploiter managed to repeatedly borrow over 20
@MoonwellDeFi
Moonwell
4 days
We are currently investigating a misreported price for wrsETH. The risk manager for the wrsETH Core Market on Base and OP Mainnet has significantly reduced the supply and borrow caps in these markets. We will share more information as it becomes available.
1
0
1
@m13_digital
M13 Digital
4 days
⬆️ #Update StakeWise recovered ~$20.7M in assets stolen in the Balancer V2 exploit. The recovery included 5,041 $osETH (~$19M) and all 13,495 $osGNO ($1.7M), via emergency multisig transactions by the DAO. https://t.co/TlEjGr1BMQ
@stakewise_io
StakeWise
4 days
Just half an hour earlier, StakeWise DAO emergency multisig has executed a series of transactions, recovering ~5,041 osETH (~$19M) and 13,495 osGNO (~$1.7M) tokens from the Balancer exploiter. On Ethereum mainnet, this represents 73.5% of the ~6,851 osETH stolen earlier today,
0
0
0
@m13_digital
M13 Digital
4 days
Five days before the depeg, @RektHQ had already posted warning signs around $xUSD: "The code worked perfectly. The assumptions didn’t. @StreamDefi and @elixir got caught playing stablecoin hot potato." https://t.co/0qmYaU6f9R
Tweet card summary image
rekt.news
DeFi / Crypto - Backing a stablecoin with another stablecoin backed by the first isn't finance - it's expensive performance art. Stream and Elixir got caught playing stablecoin hot potato. In one...
0
0
1
@m13_digital
M13 Digital
4 days
💹 #DeFiUpdate #SecurityAlert 2/ Overall debt to lenders on various lending markets is ~$284.96M. • $eliteRingsScUSD is backed by $veUSD. • $veUSD is backed by locked $stkscUSD. • $stkscUSD is backed by staked $scUSD, that specific $scUSD is rehypothecated to Mithras. •
1
1
2
@m13_digital
M13 Digital
4 days
💹 #DeFiUpdate #SecurityAlert Stream Finance suspended withdrawals and deposits after a loss of $93M in assets managed by an external fund. The stablecoin $xUSD lost its peg to the dollar, plummeting more than 80% to about $0.30. 0xe2fc85bfb48c4cf147921fbe110cf92ef9f26f94
@StreamDefi
Stream Finance
4 days
Yesterday, an external fund manager overseeing Stream funds disclosed the loss of approximately $93 million in Stream fund assets. In response, Stream is in the process of engaging Keith Miller and Joseph Cutler of the law firm Perkins Coie LLP, to lead a comprehensive
1
0
0
@m13_digital
M13 Digital
5 days
🛡️ #SecurityAlert Today, November 3, 2025, the DeFi protocol #Balancer suffered what is so far the largest exploit of the year through its V2 liquidity pools, resulting in estimated losses of more than $120M in assets such as $WETH, $osETH, and $wstETH, mainly on the #Ethereum
@Balancer
Balancer
5 days
We’re aware of a potential exploit impacting Balancer v2 pools. Our engineering and security teams are investigating with high priority. We’ll share verified updates and next steps as soon as we have more information.
1
0
0
@m13_digital
M13 Digital
8 days
The funds stolen on #Solana from WZy4...BJCH were swapped for $ETH and consolidated at 0x98BC...Ea2D12. https://t.co/PbhRpeB4lq
@tanuki42_
tanuki42
9 days
So @gardenfi got hacked for at least $11M+ likely (TBC) by a DPRK-affiliated group known as DangerousPassword. Somewhat ironically, of the $5.3M which appears stolen on Solana (account: WZy4xxpqktWa1b6MPMRiWsD487CT8mDcapB6GufBJCH), over 50% is sourced from the @swissborg hack...
0
0
0
@m13_digital
M13 Digital
8 days
🛡️ #SecurityAlert The bridge service for $BTC and wrapped assets across #Ethereum, #Arbitrum, #Base, and others suffered an exploit worth ~$6.4M, with most of the stolen funds in $cbBTC, $USDC, $USDT, $BNB, and other BTC-wrapped tokens The incident appears to have been caused
@gardenfi
Garden 🌸
9 days
we’ve detected a compromise involving one of garden’s solvers. the app is temporarily offline while we complete a full investigation. the impact is limited to the solver’s own inventory — user funds and garden protocol are not at risk. we’ll share updates as soon as we have
1
0
1
@m13_digital
M13 Digital
9 days
Apparently, the bot is indeed profitable, but only for the hardcoded address 0x1685..., which sends all the funds to the same deposit address on @kucoincom : 0x3D28E99df0aF53b7562a4798Af5AB572FED733B2.
0
0
0
@m13_digital
M13 Digital
9 days
The address 0x29D1... believed they were creating a profitable MEV Bot, probably something they saw on YouTube or were influenced to try by some “expert.” They began depositing $ETH, especially after seeing the bot’s balance increase, unaware that 0x069... had also injected
1
0
0
@m13_digital
M13 Digital
9 days
🛡️ #SecurityAlert #FakeMEVBot It seems unbelievable, but people still fall for the “magical internet money” scam.
@web3_antivirus
Web3 Antivirus
10 days
We’ve detected a new fake MEV bot scam. The victim deployed a contract believing it would auto-trade for profit but ended up losing over $16K in $ETH. The scammer even sent small $ETH inflows to the victim’s wallet to fake activity and 'profits', tricking them into depositing
1
0
0
@m13_digital
M13 Digital
10 days
2) 🌪️ #Update #x402 And after switching networks and addresses, he used another intermediary address, 0x47D94a813991C3799F48b170c31A6f2CB8fB0BBC, to deposit the funds into #Binance.
1
0
1
@m13_digital
M13 Digital
10 days
1)🌪️#Update #x402 After draining around $17k in $USDC on the #Base and swapping it for #ETH on the #Arbitrum through Across and Orbiter Finance, the exploiter used Stargate to bridge the ~4.2 $ETH accumulated on #Arbitrum to the address
1
0
2
@m13_digital
M13 Digital
11 days
The creator of the contract 0xed1AFc4DCfb39b9ab9d67f3f7f7d02803cEA9FC5 transferred ownership to 0x2b8F95560b5f1d1a439dd4d150b28FAE2B6B361F TxHash: https://t.co/CmTs1XM0hr This allowed the new "owner" to use the 'transferUserToken' method to drain ~17k $USDC from +200 users who
1
0
0
@m13_digital
M13 Digital
11 days
🛡️ #SecurityAlert #x402 This is the first public case of a service linked to the x402 protocol being breached. Apparently, there was a private key compromise. Which, is not surprising, since the x402 mechanism requires signatures via a web interface and exposes administrative
@402bridge
402bridge
12 days
The x402 mechanism requires users to sign or approve transactions via the web interface, which are then sent to a backend server. The backend server extracts the funds and performs the minting, finally returning a result to the user. When we onboard to https://t.co/RJ3Cz5txDh,
1
0
1