PANews reported on December 12th that, according to SlowMist founder Yu Xian and ZEROBASE officials, a malicious on-chain contract named "Vault" (0x0dd2…2396) masqueradedPANews reported on December 12th that, according to SlowMist founder Yu Xian and ZEROBASE officials, a malicious on-chain contract named "Vault" (0x0dd2…2396) masqueraded

ZEROBASE front-end was counterfeited; BSC phishing contract has stolen over $250,000 USDT.

2025/12/12 23:11

PANews reported on December 12th that, according to SlowMist founder Yu Xian and ZEROBASE officials, a malicious on-chain contract named "Vault" (0x0dd2…2396) masqueraded as a ZEROBASE frontend to trick users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not a problem with the Binance Web3 wallet. Hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84. ZEROBASE has implemented an authorization detection mechanism, and the community is urging users to revoke the risky authorization as soon as possible via revoke.cash.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like