ZEROBASE frontend impersonated, BSC phishing contract has stolen over 250,000 USDT
According to ChainCatcher, as disclosed by SlowMist founder Cosine and the official ZEROBASE team, a malicious contract named “Vault” (0x0dd2…2396) on the BSC chain disguised itself as the ZEROBASE frontend to trick users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not an issue with any exchange’s Web3 wallet. Currently, hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have already been transferred to the ETH address 0x4a57…fc84.
ZEROBASE has activated an authorization detection mechanism, and the community is urging users to promptly revoke risky authorizations via revoke.cash.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Data: 103 million BLUR transferred to a certain exchange Prime, worth approximately $3.32 million
Federal Reserve's Goolsbee: Lowering interest rates to finance government debt is concerning
