Venus Initiates Emergency Vote: Security Recovery Protocol and User Funds Recoupment
BlockBeats News, September 3rd: Venus Protocol has released an emergency vote in response to a security incident where users fell victim to a phishing attack, prompting the protocol to swiftly pause to protect asset safety. The team has proposed a partial protocol recovery to adjust positions and prevent liquidation, along with a forced liquidation of the attacker's wallet. The protocol will be fully restored once the security review is completed.
The vote includes:
- Partial recovery of the Venus Protocol within 5 hours (enabling debt repayment/supply of funds);
- Recovery of stolen funds within 7 hours;
- Security review of Venus within 24 hours to prevent any other users from being subjected to similar attacks.
Full recovery of Venus - Updates and timelines will be announced separately.
You may also like

Traveling? ‘Evil Twin’ WiFi networks can steal crypto passwords
Key Takeaways “Evil Twin” WiFi attacks occur when hackers mimic legitimate WiFi networks to steal sensitive user data.…

ThunderChain Resumes Legal Battle as Former CEO Chen Lei Accused of Embezzlement for Cryptocurrency Speculation - What Happened Back Then?

Current Landscape of Cryptocurrency Exchanges in 2026
Key Takeaways The cryptocurrency exchange market is notably competitive, with each platform offering unique strengths to attract users.…

Error Prevented Content Extraction: Causes and Solutions
Key Takeaways Excessive requests can result in blocked access to data sources. Ensuring adherence to API usage policies…

A computation bug that allowed Truebit to be hacked for 8535 ETH

Vietnam Sets Mid-January Timeline for Pilot Crypto Exchange Approvals
Key Takeaways Vietnam aims to regulate its growing cryptocurrency market by licensing pilot digital asset exchanges under a…

Ledger Faces Yet Another Data Breach — Customer Information at Risk
Key Takeaways Ledger, the prominent hardware wallet manufacturer, has experienced another data breach via its payment processor, Global-e,…

2025 Crypto Violence Retrospective: Increasing Assaults and Fatal Incidents in a Growing Market
Key Takeaways Violent incidents involving cryptocurrency holders have escalated, with 2025 documenting 65 attacks, including 4 fatalities. The…

Court Sentences Criminal in Virtual Currency Fraud Case with Major Global Implications
Key Takeaways A landmark case in Beijing reveals a significant cross-border telecom and internet fraud scheme involving virtual…

Rep. Torres Targets Insider Trading on Prediction Markets Following Profitable Maduro Bet
Key Takeaways A substantial Polymarket wager concerning Maduro’s capture has led Rep. Ritchie Torres to propose new legislation…

Cybersecurity Firm Warns of Shai-Hulud 3.0 Threatening the NPM Ecosystem
Key Takeaways SlowMist’s CISO has issued a warning about Shai-Hulud 3.0, a significant threat targeting the NPM ecosystem…

SlowMist Warns of Return of Shai-Hulud 3.0 Supply Chain Attack
Key Takeaways SlowMist’s Chief Information Security Officer alerted the community about the resurgence of Shai-Hulud 3.0, an advanced…

Hackers Exploit Rainbow Six Siege Servers, Ubisoft Responds
Key Takeaways Hackers successfully breached Rainbow Six Siege, distributing enormous amounts of in-game currency. Players discovered unexpected changes…

Trust Wallet Investigates Browser Extension Security Incident
Key Takeaways A recent security incident in Trust Wallet’s browser extension has affected 2,596 wallets, leading to the…

Trust Wallet Users Experience $7 Million Loss Due to Hacked Chrome Extension
Key Takeaways Trust Wallet faced a significant security breach affecting its Chrome extension, resulting in over $7 million…

Trust Wallet Browser Extension Security Incident Leads to Losses
Key Takeaways Trust Wallet identified a significant security breach in its browser extension version 2.68. Approximately over $6…

Trust Wallet Hack Results in $3.5 Million Loss for Major Wallet Holder
Key Takeaways A significant Trust Wallet hack led to the theft of $3.5 million from an inactive wallet.…

Social Engineering in the Crypto Universe: Safeguarding Your Assets in 2025
Key Takeaways Social engineering, a psychological manipulation tactic, has been the leading cause of crypto asset theft in…
Traveling? ‘Evil Twin’ WiFi networks can steal crypto passwords
Key Takeaways “Evil Twin” WiFi attacks occur when hackers mimic legitimate WiFi networks to steal sensitive user data.…
ThunderChain Resumes Legal Battle as Former CEO Chen Lei Accused of Embezzlement for Cryptocurrency Speculation - What Happened Back Then?
Current Landscape of Cryptocurrency Exchanges in 2026
Key Takeaways The cryptocurrency exchange market is notably competitive, with each platform offering unique strengths to attract users.…
Error Prevented Content Extraction: Causes and Solutions
Key Takeaways Excessive requests can result in blocked access to data sources. Ensuring adherence to API usage policies…
A computation bug that allowed Truebit to be hacked for 8535 ETH
Vietnam Sets Mid-January Timeline for Pilot Crypto Exchange Approvals
Key Takeaways Vietnam aims to regulate its growing cryptocurrency market by licensing pilot digital asset exchanges under a…