ZEROBASE front-end was counterfeited; BSC phishing contract has stolen over $250,000 USDT.

PANews reported on December 12th that, according to SlowMist founder Yu Xian and ZEROBASE officials, a malicious on-chain contract named "Vault" (0x0dd2…2396) masqueraded as a ZEROBASE frontend to trick users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not a problem with the Binance Web3 wallet. Hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84. ZEROBASE has implemented an authorization detection mechanism, and the community is urging users to revoke the risky authorization as soon as possible via revoke.cash.

Share to:

Author: PA一线

This content is for informational purposes only and does not constitute investment advice.

Follow PANews official accounts, navigate bull and bear markets together
Recommended Reading
5 hour ago
7 hour ago
8 hour ago
10 hour ago
12 hour ago
13 hour ago

Popular Articles

Industry News
Market Trends
Curated Readings

Curated Series

App内阅读