ZEROBASE frontend impersonated, BSC phishing contract has stolen over 250,000 USDT
According to ChainCatcher, as disclosed by SlowMist founder Cosine and the official ZEROBASE team, a malicious contract named “Vault” (0x0dd2…2396) on the BSC chain disguised itself as the ZEROBASE frontend to trick users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not an issue with any exchange’s Web3 wallet. Currently, hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have already been transferred to the ETH address 0x4a57…fc84.
ZEROBASE has activated an authorization detection mechanism, and the community is urging users to promptly revoke risky authorizations via revoke.cash.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Colosseum Announces Winning Projects of Solana Cypherpunk Hackathon
US Bitcoin company increased its holdings by 613 BTC this week, with total holdings reaching $444 million
0G Foundation: Contract Attacked, Resulting in the Theft of 520,000 $0G
Data: Public and private companies have accumulated a total of 883,000 BTC since 2023
