A serious Web3 phishing incident occurred recently. According to security teams, a malicious contract Vault on the BSC chain (address 0x0dd2…2396) impersonated the ZEROBASE official front end and used a fake webpage to trick users into authorizing USDT transfers.
The attack originated from an intrusion into the ZEROBASE front end, rather than a vulnerability in the wallet itself. This has resulted in hundreds of wallet addresses being compromised, with the largest single theft amounting to $123,000. Over $250,000 worth of USDT has been transferred to a specified ETH address: 0x4a57…fc84.
The official team has initiated an emergency response and deployed authorization detection mechanisms to prevent further damage. The community strongly recommends all users immediately review their wallet permissions, especially to disable any suspicious USDT authorization records. These phishing tactics are still active; please stay vigilant, and do not enter private keys or perform authorization operations on unknown websites.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
5 Likes
Reward
5
2
Repost
Share
Comment
0/400
ForkTrooper
· 17h ago
Here we go again? ZEROBASE front-end got hacked, these hackers are really leaving no stone unturned.
---
$250,000 just disappeared like that. Luckily, I haven't touched this project recently.
---
No wonder there are a bunch of suspicious authorizations in my wallet lately. Need to clean them up quickly.
---
BSC chain has really become a phishing paradise. Seems like there are new tricks every week.
---
Never enter your private key on unfamiliar websites. We should all have this basic knowledge, right?
---
A single transaction of $123,000. How careless do you have to be to get scammed that much?
---
Front-end intrusion is even scarier than smart contract vulnerabilities. It's hard to guard against everything.
---
Quickly update your bookmarks. Don't click on links from Twitter anymore.
---
After this incident, is anyone still willing to use ZEROBASE? Trust has completely collapsed.
---
Checking permissions sounds simple, but few people actually do it.
View OriginalReply0
consensus_whisperer
· 17h ago
Another bloodshed, front-end hacking incidents are really hard to prevent.
---
250,000 USDT just disappeared like that, this method makes my heart ache.
---
NG, the phishing activities on BSC haven't stopped, people are falling for it every day.
---
It feels like these incidents are happening more and more recently—are we too weak or are hackers too powerful?
---
Quickly check your authorizations, everyone, so you won't regret it when it's too late.
---
A single transaction of 120,000 disappeared... I need to carefully check what else is in my wallet.
---
When the front-end gets hacked, it really feels powerless to defend against it.
---
It's the same old tricks again; when will these people come up with something new?
---
That's why I'm especially reluctant to authorize on unfamiliar websites now — I just don't feel safe.
A serious Web3 phishing incident occurred recently. According to security teams, a malicious contract Vault on the BSC chain (address 0x0dd2…2396) impersonated the ZEROBASE official front end and used a fake webpage to trick users into authorizing USDT transfers.
The attack originated from an intrusion into the ZEROBASE front end, rather than a vulnerability in the wallet itself. This has resulted in hundreds of wallet addresses being compromised, with the largest single theft amounting to $123,000. Over $250,000 worth of USDT has been transferred to a specified ETH address: 0x4a57…fc84.
The official team has initiated an emergency response and deployed authorization detection mechanisms to prevent further damage. The community strongly recommends all users immediately review their wallet permissions, especially to disable any suspicious USDT authorization records. These phishing tactics are still active; please stay vigilant, and do not enter private keys or perform authorization operations on unknown websites.