扫码下载
BTC $77,848.53 -1.34%
ETH $2,321.48 -3.26%
BNB $636.32 -1.09%
XRP $1.43 -0.71%
SOL $85.50 -2.23%
TRX $0.3291 -0.04%
DOGE $0.0963 -0.28%
ADA $0.2472 -2.07%
BCH $457.41 -1.23%
LINK $9.27 -1.42%
HYPE $40.99 +0.08%
AAVE $92.84 -1.64%
SUI $0.9352 -2.36%
XLM $0.1753 -1.90%
ZEC $334.85 +4.47%
BTC $77,848.53 -1.34%
ETH $2,321.48 -3.26%
BNB $636.32 -1.09%
XRP $1.43 -0.71%
SOL $85.50 -2.23%
TRX $0.3291 -0.04%
DOGE $0.0963 -0.28%
ADA $0.2472 -2.07%
BCH $457.41 -1.23%
LINK $9.27 -1.42%
HYPE $40.99 +0.08%
AAVE $92.84 -1.64%
SUI $0.9352 -2.36%
XLM $0.1753 -1.90%
ZEC $334.85 +4.47%

GoPlus:用户需尽快检查钱包是否收到黑客地址转入的 Gas,及时转出资产并更换安全钱包

2025-02-14 20:47:31
收藏

ChainCatcher 消息,据 GoPlus 在 X 发文表示,GoPlus 已确定攻击者的相关地址,并已将其全部拉黑处理。值得注意的是,攻击者曾用0x9AE开头的钱包向多个地址发送 Gas,但尚未进行 Token 转移,用户还有机会转移资产到安全钱包。

攻击者用于发放 Gas 的地址:0x9AEf1CA082c17f9D52Aa98ca861b50c776dECC35

攻击者盗币归集地址 1:0x49add3e8329f2a2f507238b0a684d03eae205aab

归集地址 2:0x7831d05afc72a10bd475eb4777680b4e9204695a

归集地址 3:0xb312a2c9ab9700dac49798f457b4c28e28f1c4fc

归集地址 4:0xc657b6e6c59af5bcff4de626dab52832e77d2996

请用户保持警惕,定期检查钱包安全。

app_icon
ChainCatcher 与创新者共建Web3世界