BTC
ETH
HTX
SOL
BNB
View Market
简中
繁中
English
日本語
한국어
ภาษาไทย
Tiếng Việt

ZEROBASE's front end was spoofed, and hackers used phishing contracts to steal over $250,000 USDT.

2025-12-12 15:13

According to a post on the X platform by Yu Xian, founder of SlowMist, and ZEROBASE, a malicious on-chain contract "Vault" (0x0dd2…2396) masqueraded as the ZEROBASE frontend to trick users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not a problem with the Binance Web3 wallet. Hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84. ZEROBASE has implemented an authorization detection mechanism, and the community is urging users to revoke the risky authorization as soon as possible via revoke.cash.