掃碼下載
BTC $77,609.71 +4.04%
ETH $2,440.60 +4.35%
BNB $642.01 +2.77%
XRP $1.48 +3.81%
SOL $89.76 +3.71%
TRX $0.3250 -0.28%
DOGE $0.1003 +3.43%
ADA $0.2630 +4.17%
BCH $458.27 +3.78%
LINK $9.75 +3.62%
HYPE $44.90 +0.33%
AAVE $116.10 +6.38%
SUI $1.02 +3.90%
XLM $0.1741 +6.95%
ZEC $343.19 +1.75%
BTC $77,609.71 +4.04%
ETH $2,440.60 +4.35%
BNB $642.01 +2.77%
XRP $1.48 +3.81%
SOL $89.76 +3.71%
TRX $0.3250 -0.28%
DOGE $0.1003 +3.43%
ADA $0.2630 +4.17%
BCH $458.27 +3.78%
LINK $9.75 +3.62%
HYPE $44.90 +0.33%
AAVE $116.10 +6.38%
SUI $1.02 +3.90%
XLM $0.1741 +6.95%
ZEC $343.19 +1.75%

GoPlus:用戶需儘快檢查錢包是否收到黑客地址轉入的 Gas,及時轉出資產並更換安全錢包

2025-02-14 20:47:31
收藏

ChainCatcher 消息,据 GoPlus 在 X 發文表示,GoPlus 已確定攻擊者的相關地址,並已將其全部拉黑處理。值得注意的是,攻擊者曾用0x9AE開頭的錢包向多個地址發送 Gas,但尚未進行 Token 轉移,用戶還有機會轉移資產到安全錢包。

攻擊者用於發放 Gas 的地址:0x9AEf1CA082c17f9D52Aa98ca861b50c776dECC35

攻擊者盜幣歸集地址 1:0x49add3e8329f2a2f507238b0a684d03eae205aab

歸集地址 2:0x7831d05afc72a10bd475eb4777680b4e9204695a

歸集地址 3:0xb312a2c9ab9700dac49798f457b4c28e28f1c4fc

歸集地址 4:0xc657b6e6c59af5bcff4de626dab52832e77d2996

請用戶保持警惕,定期檢查錢包安全。

app_icon
ChainCatcher 與創新者共建Web3世界