ZEROBASE front end has been impersonated, and BSC phishing contracts have stolen over $250,000 USDT
According to the disclosure by Yuxian, the founder of Slow Fog, and ZEROBASE officials, the malicious contract "Vault" (0x0dd2…2396) on the BSC chain disguised itself as the ZEROBASE frontend to lure users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not an issue with the Binance Web3 wallet. Currently, it has affected hundreds of addresses, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84.
ZEROBASE has activated an authorization detection mechanism, and the community is calling for a quick revocation of risky authorizations through revoke.cash.
Related tags
Related tags









