Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Collapse
Brand Logo
UDS UDS: $1.86
24h: 7.71%
Trade UDS
Gate.io
Gate.io
UDS / USDT
MEXC
MEXC
UDS / USDT
WEEX
WEEX
UDS / USDT
COINSTORE
COINSTORE
UDS / USDT
Biconomy.com
Biconomy.com
UDS / USDT
BingX
BingX
UDS / USDT
XT.COM
XT.COM
UDS / USDT
Uniswap v3
Uniswap v3
UDS / USDT
PancakeSwap v3
PancakeSwap v3
UDS / USDT

Earn up to 50 UDS per post

Post in Forum to earn rewards!

Learn more
UDS Right

Spin your Wheel of Fortune!

Earn or purchase spins to test your luck. Spin the Wheel of Fortune and win amazing prizes!

Spin now
Wheel of Fortune
selector
wheel
Spin

Paired Staking

Stake $UDS
APR icon Earn up to 50% APR
NFT icon Boost earnings with NFTs
Earn icon Play, HODL & earn more
Stake $UDS
Stake $UDS
UDS Left

Buy UDS!

Buy UDS with popular exchanges! Make purchases and claim rewards!

Buy UDS
UDS Right

Post in Forum to earn rewards!

UDS Rewards
Rewards for UDS holders
Rewards for UDS holders (per post)*
  • 100 - 999 UDS: 0.05 UDS
  • 1000 - 2499 UDS: 0.10 UDS
  • 2500 - 4999 UDS: 0.5 UDS
  • 5000 - 9999 UDS: 1.5 UDS
  • 10000 - 24999 UDS: 5 UDS
  • 25000 - 49999 UDS: 10 UDS
  • 50000 - 99 999 UDS: 25 UDS
  • 100 000 UDS or more: 50 UDS
*

Rewards are credited at the end of the day. Limited to 5 payable posts per day, 50 K holders - 3 posts per day, 100K holders - 2 posts per day. Staked UDS gives additional coefficient up to X1.5

  1. Home
  2. Crypto-Detective
  3. Ethereum Core Developer Loses Funds to Malicious AI Code Assistant

Ethereum Core Developer Loses Funds to Malicious AI Code Assistant

Scheduled Pinned Locked Moved Crypto-Detective
3 Posts 3 Posters 16 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
This topic has been deleted. Only users with topic management privileges can see it.
  • nihalsariN Offline
    nihalsariN Offline
    nihalsari
    wrote last edited by
    #1

    0198a321-dff1-7164-8f86-23edeee866cb.webp

    Even experienced blockchain developers are not immune to sophisticated scams. Core Ethereum developer Zak Cole revealed on X that he fell victim to a cryptocurrency wallet drainer embedded in a rogue AI code assistant.

    The malicious extension, “contractshark.solidity-lang”, appeared legitimate—with a professional icon, descriptive text, and over 54,000 downloads—but secretly exfiltrated his private key. According to Cole, it accessed his .env file and sent the key to an attacker’s server, allowing them to control his hot wallet for three days before draining the funds on Sunday.

    “In 10+ years, I have never lost a single wei to hackers. Then I rushed to ship a contract last week,” Cole said, adding that the loss was limited to “a few hundred” dollars in Ether thanks to his practice of using small, project-specific hot wallets and storing primary holdings on hardware devices.

    Wallet Drainers: A Growing Threat

    Wallet drainers—malware designed to steal digital assets—are increasingly targeting both developers and investors. In September 2024, a fake WalletConnect app on Google Play operated for over five months before being taken down, stealing more than $70,000 in crypto. Some fake reviews for the app even described irrelevant, non-crypto features to appear legitimate.

    Extensions as a New Attack Vector

    Malicious VS Code extensions are emerging as a major attack vector, using fake publishers and typosquatting to capture sensitive data, said Hakan Unal, senior security operations lead at blockchain security firm Cyvers.

    “Builders should vet extensions, avoid storing secrets in plain text or .env files, use hardware wallets, and develop in isolated environments,” Unal advised.

    Meanwhile, wallet drainer tools are becoming easier for scammers to obtain and deploy, raising the stakes for security-minded crypto builders.

    1 Reply Last reply
    2
    • J Offline
      J Offline
      jacson4
      wrote last edited by
      #2

      <p dir="auto"><img src="/forum/assets/uploads/files/1755154420729-0198a321-dff1-7164-8f86-23edeee866cb.webp" alt="0198a321-dff1-7164-8f86-23edeee866cb.webp" class=" img-fluid img-markdown" /></p> <p dir="auto">Even experienced blockchain developers are not immune to sophisticated scams. Core Ethereum developer Zak Cole revealed on X that he fell victim to a cryptocurrency wallet drainer embedded in a rogue AI code assistant.</p> <p dir="auto">The malicious extension, “contractshark.solidity-lang”, appeared legitimate—with a professional icon, descriptive text, and over 54,000 downloads—but secretly exfiltrated his private key. According to Cole, it accessed his .env file and sent the key to an attacker’s server, allowing them to control his hot wallet for three days before draining the funds on Sunday.</p> <p dir="auto">“In 10+ years, I have never lost a single wei to hackers. Then I rushed to ship a contract last week,” Cole said, adding that the loss was limited to “a few hundred” dollars in Ether thanks to his practice of using small, project-specific hot wallets and storing primary holdings on hardware devices.</p> <p dir="auto">Wallet Drainers: A Growing Threat</p> <p dir="auto">Wallet drainers—malware designed to steal digital assets—are increasingly targeting both developers and investors. In September 2024, a fake WalletConnect app on Google Play operated for over five months before being taken down, stealing more than $70,000 in crypto. Some fake reviews for the app even described irrelevant, non-crypto features to appear legitimate.</p> <p dir="auto">Extensions as a New Attack Vector</p> <p dir="auto">Malicious VS Code extensions are emerging as a major attack vector, using fake publishers and typosquatting to capture sensitive data, said Hakan Unal, senior security operations lead at blockchain security firm Cyvers.</p> <p dir="auto">“Builders should vet extensions, avoid storing secrets in plain text or .env files, use hardware wallets, and develop in isolated environments,” Unal advised.</p> <p dir="auto">Meanwhile, wallet drainer tools are becoming easier for scammers to obtain and deploy, raising the stakes for security-minded crypto builders.</p>

      1 Reply Last reply
      0
      • N Offline
        N Offline
        Nahid10
        wrote last edited by
        #3

        What’s scary here is the shift in attack surface. Phishing used to be mostly about emails and fake websites. Now, scammers are embedding malware into tools developers trust and use daily. VS Code extensions, npm packages, browser plugins — all are ripe for abuse because the target audience is already logged in, already has permissions, and often already has funds nearby. The fact that “contractshark.solidity-lang” had 54K+ downloads before being caught should be a wake-up call. This is the perfect time for extension marketplaces to introduce better publisher verification and automated code scans before approval.

        1 Reply Last reply
        0


        Powered by NodeBB Contributors
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups