掃碼下載
BTC $77,066.28 +2.54%
ETH $2,421.34 +2.84%
BNB $642.75 +1.07%
XRP $1.48 +1.51%
SOL $88.82 -0.34%
TRX $0.3277 +0.20%
DOGE $0.0992 -0.34%
ADA $0.2584 -0.57%
BCH $453.15 -0.69%
LINK $9.61 +0.40%
HYPE $44.50 +1.23%
AAVE $115.19 -0.27%
SUI $0.9993 -0.55%
XLM $0.1742 +3.07%
ZEC $328.57 -3.12%
BTC $77,066.28 +2.54%
ETH $2,421.34 +2.84%
BNB $642.75 +1.07%
XRP $1.48 +1.51%
SOL $88.82 -0.34%
TRX $0.3277 +0.20%
DOGE $0.0992 -0.34%
ADA $0.2584 -0.57%
BCH $453.15 -0.69%
LINK $9.61 +0.40%
HYPE $44.50 +1.23%
AAVE $115.19 -0.27%
SUI $0.9993 -0.55%
XLM $0.1742 +3.07%
ZEC $328.57 -3.12%

GoPlus:用戶需儘快檢查錢包是否收到黑客地址轉入的 Gas,及時轉出資產並更換安全錢包

2025-02-14 20:47:31
收藏

ChainCatcher 消息,据 GoPlus 在 X 發文表示,GoPlus 已確定攻擊者的相關地址,並已將其全部拉黑處理。值得注意的是,攻擊者曾用0x9AE開頭的錢包向多個地址發送 Gas,但尚未進行 Token 轉移,用戶還有機會轉移資產到安全錢包。

攻擊者用於發放 Gas 的地址:0x9AEf1CA082c17f9D52Aa98ca861b50c776dECC35

攻擊者盜幣歸集地址 1:0x49add3e8329f2a2f507238b0a684d03eae205aab

歸集地址 2:0x7831d05afc72a10bd475eb4777680b4e9204695a

歸集地址 3:0xb312a2c9ab9700dac49798f457b4c28e28f1c4fc

歸集地址 4:0xc657b6e6c59af5bcff4de626dab52832e77d2996

請用戶保持警惕,定期檢查錢包安全。

app_icon
ChainCatcher 與創新者共建Web3世界