Forta and Conduit have strengthened their partnership to enhance rollup security. The collaboration enables rollups using Conduit's infrastructure to integrate Forta Firewall protection with minimal development effort.
- Automatic security integration for Conduit-powered rollups
- Zero-friction implementation process
- Enhanced protection for rollup users and assets
Leading rollups are already utilizing the Firewall protection system. For more details, visit Forta's announcement.
Forta ๐ค @conduitxyz If Conduit runs your rollup infrastructure, you can now enable Firewall with little to no effort from your dev team ๐ง Join leading rollups already secured by Firewall-scale confidently, protect your users ๐ซ forta.org/conduit
๐จ Phishing Surge

**$6M stolen** in August through 2,883 phishing contracts on Ethereum mainnet - Forta detected all malicious contracts, including a **$3M whale attack** on AETHUSDT - Phishing remains the **leading threat** in DeFi - Previous month saw $2.88M stolen via 1,173 contracts Forta's detection network continues monitoring blockchain activity in real-time to identify threats before they execute.
Forta Firewall Partners with Plume Network for RWA Security
**Forta Firewall** has partnered with **Plume Network**, a leading real-world asset (RWA) tokenization platform. **Key Partnership Details:** - Plume operates 180+ protocols with $3B+ in available assets - Partnership focuses on enhancing security and compliance for RWA projects - Forta provides real-time blockchain monitoring infrastructure **Why This Matters:** As RWA tokenization grows, robust security infrastructure becomes critical. Forta's decentralized detection network helps identify threats and outlier transactions in real-time. The collaboration positions both platforms to better serve the expanding RWA sector with enterprise-grade security solutions. [Read more details](https://www.forta.org/blog/plume-partners-with-forta-rwa)
OFAC Compliance Becomes Critical Infrastructure for Blockchain Rollups
**Regulatory compliance** is becoming a core requirement for blockchain networks, particularly regarding OFAC-sanctioned wallet transactions. Key points: - Transactions with sanctioned wallets pose significant regulatory risks - Compliance screening is now essential infrastructure for rollups - Forta Firewall offers a solution for OFAC screening implementation *Security and compliance* are emerging as crucial growth enablers in the on-chain economy. Forta Firewall provides tools to help rollups and protocols prevent potential security breaches and maintain regulatory compliance. Learn more: [Forta's Guide to OFAC Screening](https://www.forta.org/blog/why-ofac-screening-matters-in-crypto-and-how-forta-firewall-helps)
Forta Detects Major Phishing Operation on Ethereum Mainnet
Forta's security monitoring revealed a significant phishing campaign on Ethereum Mainnet: - 1,069 malicious contracts identified - 181.5 ETH and 178 different tokens stolen - Total losses exceed $868K A detailed case study shows how one victim lost $59,000 in WBTC through a single malicious approval. The attack happened gradually: - Initial phishing transaction granted token approvals - Multiple small withdrawals to avoid detection - Victim remained unaware throughout the process **Key Security Tips:** - Regularly revoke unused approvals - Monitor wallet activity frequently - Verify all dApp interactions thoroughly *Remember: Most crypto thefts occur silently, one transaction at a time.*
GemPad Hit by $2M Cross-Chain Reentrancy Attack

A significant security breach has affected GemPad across multiple blockchains - Ethereum, BSC, and Base - resulting in a $2M loss through a reentrancy attack. The incident was detected by Forta Firewall's security systems. This attack follows a pattern of recent crypto security incidents, including: - Penpie's $27M reentrancy exploit - Onyx Protocol's $4.2M market manipulation - Bedrock DeFi's $1.7M smart contract vulnerability These incidents highlight the growing importance of preventative security measures in DeFi protocols. **Learn More**: Visit Forta's blog to understand how these attacks can be prevented.