PANews reported on December 12th that, according to SlowMist founder Yu Xian and ZEROBASE officials, a malicious on-chain contract named "Vault" (0x0dd2…2396) masqueraded as a ZEROBASE frontend to trick users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not a problem with the Binance Web3 wallet. Hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84. ZEROBASE has implemented an authorization detection mechanism, and the community is urging users to revoke the risky authorization as soon as possible via revoke.cash.
ZEROBASE front-end was counterfeited; BSC phishing contract has stolen over $250,000 USDT.
Share to:
Author: PA一线
This content is for informational purposes only and does not constitute investment advice.
Follow PANews official accounts, navigate bull and bear markets together
Recommended Reading
