Back to Blog

Phalcon's 2023 Year-End Recap

Phalcon
January 1, 2024

In 2023, Web3 harbors not just aspirations for technological breakthroughs but also grapples with security challenges of unprecedented scale. The year also witnesses the transformation of Phalcon from a transaction explorer to a comprehensive security suite. Phalcon now covers the entire spectrum of protocol security, from pre-launch testing, post-launch monitoring and attack blocking, to post-incident analysis.

Through the story of Phalcon, let's explore the relentless efforts made by BlockSec to advance Web3 security in 2023.

Phalcon's Security Philosophy: Go Beyond Code Audits πŸ€”πŸ’‘

Since the very foundation of BlockSec, our standpoint has remained consistent - code audits alone are inadequate to safeguard against the ever-present security risks in the Web3 dark forest (although we do a great job at code audits). Once a project is live, proactive defenses and swift response mechanisms become critical.

Traditional attack monitoring systems alert us to threats, yet teams are often too slow or uncertain about how to respond effectively. We began to question: How could we standardize our incident response capabilities to better assist a wider range of projects? This led to the creation of BlockSec Phalcon, a system designed to automatically block attacks.

In February of this year, when the Platypus protocol was under attack, BlockSec Phalcon helped recover $2.4 million in potential losses.

A month later, the system once again proved its worth by intercepting an attempt on Paraspace, saving an estimated $5 million. πŸ›‘οΈπŸ’°

November marked a milestone with the introduction of BlockSec Phalcon at the Devconnect conference in Istanbul, a testament to our two years of dedicated refinement. The system stands out as the first Web3 security product with the ability to automatically block hacks.

Our Mission: Advancing Web3 Security πŸš€

Time and again, we've been approached by project teams and users seeking assistance after hacks and phishing attempts, which solidified our determination to help elevate security awareness in the Web3 community.

This year, we participated in a series of events, including the DeFi Security Summit, TOKEN 2049, Devconnect, ETHBerlin, and ACM CCS. We shared insights on the susceptibility of Web3 to hacks, underscored the significance of proactive defense, discussed incident response strategies, and introduced practical security tools.

Additionally, we've initiated the πŸ† BlockSec Blockchain Security Award πŸ†, a three-year scholarship to honor exceptional students at PolyU pursuing a Master's degree in blockchain technology. In doing so, we aim to assist the industry in cultivating a greater number of qualified security professionals and developers with robust security qualifications. πŸŽ“

As a security company, we consider it our responsibility and vision to nurture talent and advance blockchain security, contributing to the industry's robust growth.

Looking Forward

As the new year unfolds, we are dedicated to the pursuit of innovation, with a focus on developing Phalcon into a more practical and well-rounded security product. We also commit to continually sharing our insights and vision for security with the wider Web3 community.

Happy New Year in advance! πŸŽ‰

May your Web3 journey in the new year be prosperous and smooth.

May the coming year bring you all health and happiness. πŸ₯³

Sign up for the latest updates
Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026

This BlockSec weekly security report covers nine DeFi attack incidents detected between March 30 and April 5, 2026, across Solana, BNB Chain, Arbitrum, and Polygon, with total estimated losses of approximately $287M. The week was dominated by the $285.3M Drift Protocol exploit on Solana, where attackers combined multisig signer social engineering with Solana's durable nonce mechanism to bypass a zero-timelock 2-of-5 Security Council, alongside notable incidents including a $950K flash loan TWAP manipulation against the LML staking protocol, a $359K Silo Finance vault inflation via an external `wstUSR` market donation exploiting a depegged-asset oracle and `totalAssets()` accounting flaw, and an EIP-7702 delegated-code access control failure. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident, covering flawed business logic, access control, price manipulation, phishing, and misconfiguration attack types.

Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure
Case Studies

Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure

An on-chain investigation into VerilyHK, a fraudulent platform that moved $1.6B in TRON USDT through a multi-layered fund-routing infrastructure of rotating wallets, paired payout channels, and exchange exit funnels, with traced connections to the FinCEN-sanctioned Huione Group.