GoPlus Security

GoPlus Security: The information leak regarding token listing is "not true," and an internal investigation is underway regarding the token's price drop

ChainCatcher news, GoPlus Security posted on platform X: "First, GoPlus has established a special investigation team to conduct a comprehensive investigation into the abnormal price fluctuations. Binance has also provided additional support to assist in investigating the cause of the incident. Firstly, in response to community feedback claiming that a leaker disclosed the listing information in advance and suspecting that this person is a member of the GoPlus team or a community administrator, GoPlus immediately initiated an internal investigation. The investigation results show that this situation is not true. The GoPlus team did not have prior knowledge of the March 4th GPS listing plan. Everything happened very suddenly; our team only learned about the listing news after the announcement was made and immediately collaborated with Binance to meet any additional requests from our side. Furthermore, it has been confirmed that the individuals spreading various rumors are unrelated to the parties involved and they had no way to obtain internal information about the listing through official internal channels.On the day of the listing, GoPlus transferred a total of 500 million GPS tokens to Binance. Of these, 300 million GPS tokens have been distributed as rewards for the BNB HODLer program, and the remaining 200 million tokens will be used for future marketing activities. For transparency, Binance has transferred the remaining 200 million GPS tokens to a public wallet address. Regarding the situation where the GPS price plummeted by 50% within 24 hours, GoPlus is conducting internal investigations with multiple partners and will provide users with a comprehensive explanation of our investigation results."

GoPlus releases alert on "new type of predictive address attack": attackers exploit create2 feature to launch attacks for arbitrage

ChainCatcher news, according to official sources, security company GoPlus has issued an alert about a "new type of predicted address attack." It is reported that attackers exploit the characteristics of create2 to pre-calculate the blank address where the contract will be deployed, then deceive users into granting authorization. Since the blank address can bypass the security company's black address marking and security monitoring, once users authorize, the attackers will deploy the contract at this address and transfer the users' assets.In addition, this attack has the following characteristics:Create2 is a deployment method that can predict the generated contract address, allowing attackers to first deceive users into granting authorization and then deploy the contract.Since the contract is not deployed at the time of authorization, the attack address is an empty EOA address, so it will not be recorded by any detection tools, making it highly covert.GoPlus reminds users to be vigilant against phishing attacks from the source, to memorize commonly used protocol URLs or use browser bookmarks to manage official websites. Additionally, carefully check whether the authorized object is a blank (EOA) address during signature authorization, as there may be significant risks.
ChainCatcher Building the Web3 world with innovators