M13 Digital
@m13_digital
Followers
574
Following
2K
Media
137
Statuses
424
Blockchain Intelligence | On-chain Technical Analysis | Fund Tracing | Reconstruction of Complex Transactions and Forensic Reports for DeFi investors.
Contact ➔
Joined November 2021
Blockchain intelligence specialized in on-chain analysis focused on fund tracing across EVM, non-EVM networks, and reconstruction of complex transactions. Our mission is to make the crypto ecosystem safer through forensic investigations and reports for investors, and companies.
2
0
6
On November 4, 2025, a major controversy erupted in the community following a $93 million loss tied to Stream Finance's xUSD stablecoin depeg and insolvency. The issue centered on permissionless vaults on Morpho Labs and Euler Finance, where third-party curators had allocated
Get your money out of @MorphoLabs and @eulerfinance! Here's why. They take your USDC and give it out to insolvent protocols that leverage loop scam stables like xUSD by Stream Defi which just lost $93M of user money. The incentives are totally misaligned. Curators on Morpho
0
5
15
🛠️ #Service #DeFiSecurity Fake Staking USDC Vault Project An investor contacted us through Reddit to resolve an issue involving an alleged DeFi staking protocol that promised daily yields. The scammer created a false sense of trust by paying small initial returns tied to a
0
0
0
🛡️ #SecurityAlert On-chain monitoring systems detected earlier today, around 05:45:11 (UTC), multiple exploit transactions in #Moonwell’s lending contracts. The attack specifically targeted the $wrstETH and $wstETH markets. The exploiter managed to repeatedly borrow over 20
We are currently investigating a misreported price for wrsETH. The risk manager for the wrsETH Core Market on Base and OP Mainnet has significantly reduced the supply and borrow caps in these markets. We will share more information as it becomes available.
1
0
1
⬆️ #Update StakeWise recovered ~$20.7M in assets stolen in the Balancer V2 exploit. The recovery included 5,041 $osETH (~$19M) and all 13,495 $osGNO ($1.7M), via emergency multisig transactions by the DAO. https://t.co/TlEjGr1BMQ
Just half an hour earlier, StakeWise DAO emergency multisig has executed a series of transactions, recovering ~5,041 osETH (~$19M) and 13,495 osGNO (~$1.7M) tokens from the Balancer exploiter. On Ethereum mainnet, this represents 73.5% of the ~6,851 osETH stolen earlier today,
0
0
0
Five days before the depeg, @RektHQ had already posted warning signs around $xUSD: "The code worked perfectly. The assumptions didn’t. @StreamDefi and @elixir got caught playing stablecoin hot potato." https://t.co/0qmYaU6f9R
rekt.news
DeFi / Crypto - Backing a stablecoin with another stablecoin backed by the first isn't finance - it's expensive performance art. Stream and Elixir got caught playing stablecoin hot potato. In one...
0
0
1
💹 #DeFiUpdate #SecurityAlert 2/ Overall debt to lenders on various lending markets is ~$284.96M. • $eliteRingsScUSD is backed by $veUSD. • $veUSD is backed by locked $stkscUSD. • $stkscUSD is backed by staked $scUSD, that specific $scUSD is rehypothecated to Mithras. •
1
1
2
💹 #DeFiUpdate #SecurityAlert Stream Finance suspended withdrawals and deposits after a loss of $93M in assets managed by an external fund. The stablecoin $xUSD lost its peg to the dollar, plummeting more than 80% to about $0.30. 0xe2fc85bfb48c4cf147921fbe110cf92ef9f26f94
Yesterday, an external fund manager overseeing Stream funds disclosed the loss of approximately $93 million in Stream fund assets. In response, Stream is in the process of engaging Keith Miller and Joseph Cutler of the law firm Perkins Coie LLP, to lead a comprehensive
1
0
0
🛡️ #SecurityAlert Today, November 3, 2025, the DeFi protocol #Balancer suffered what is so far the largest exploit of the year through its V2 liquidity pools, resulting in estimated losses of more than $120M in assets such as $WETH, $osETH, and $wstETH, mainly on the #Ethereum
We’re aware of a potential exploit impacting Balancer v2 pools. Our engineering and security teams are investigating with high priority. We’ll share verified updates and next steps as soon as we have more information.
1
0
0
The funds stolen on #Solana from WZy4...BJCH were swapped for $ETH and consolidated at 0x98BC...Ea2D12. https://t.co/PbhRpeB4lq
So @gardenfi got hacked for at least $11M+ likely (TBC) by a DPRK-affiliated group known as DangerousPassword. Somewhat ironically, of the $5.3M which appears stolen on Solana (account: WZy4xxpqktWa1b6MPMRiWsD487CT8mDcapB6GufBJCH), over 50% is sourced from the @swissborg hack...
0
0
0
🛡️ #SecurityAlert The bridge service for $BTC and wrapped assets across #Ethereum, #Arbitrum, #Base, and others suffered an exploit worth ~$6.4M, with most of the stolen funds in $cbBTC, $USDC, $USDT, $BNB, and other BTC-wrapped tokens The incident appears to have been caused
we’ve detected a compromise involving one of garden’s solvers. the app is temporarily offline while we complete a full investigation. the impact is limited to the solver’s own inventory — user funds and garden protocol are not at risk. we’ll share updates as soon as we have
1
0
1
Apparently, the bot is indeed profitable, but only for the hardcoded address 0x1685..., which sends all the funds to the same deposit address on @kucoincom : 0x3D28E99df0aF53b7562a4798Af5AB572FED733B2.
0
0
0
The address 0x29D1... believed they were creating a profitable MEV Bot, probably something they saw on YouTube or were influenced to try by some “expert.” They began depositing $ETH, especially after seeing the bot’s balance increase, unaware that 0x069... had also injected
1
0
0
🛡️ #SecurityAlert #FakeMEVBot It seems unbelievable, but people still fall for the “magical internet money” scam.
We’ve detected a new fake MEV bot scam. The victim deployed a contract believing it would auto-trade for profit but ended up losing over $16K in $ETH. The scammer even sent small $ETH inflows to the victim’s wallet to fake activity and 'profits', tricking them into depositing
1
0
0
The creator of the contract 0xed1AFc4DCfb39b9ab9d67f3f7f7d02803cEA9FC5 transferred ownership to 0x2b8F95560b5f1d1a439dd4d150b28FAE2B6B361F TxHash: https://t.co/CmTs1XM0hr This allowed the new "owner" to use the 'transferUserToken' method to drain ~17k $USDC from +200 users who
1
0
0
🛡️ #SecurityAlert #x402 This is the first public case of a service linked to the x402 protocol being breached. Apparently, there was a private key compromise. Which, is not surprising, since the x402 mechanism requires signatures via a web interface and exposes administrative
The x402 mechanism requires users to sign or approve transactions via the web interface, which are then sent to a backend server. The backend server extracts the funds and performs the minting, finally returning a result to the user. When we onboard to https://t.co/RJ3Cz5txDh,
1
0
1