【Is the hacker back?】According to Yu Xian and ZEROBASE's post on platform X, the malicious contract "Vault" (0x0dd2…2396) on the BSC chain disguised itself as the ZEROBASE frontend to induce users to authorize USDT. It is suspected that the ZEROBASE frontend was attacked, and it is not an issue with the Binance Web3 wallet. So far, hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84. ZEROBASE has activated an authorization detection mechanism, and the community is calling for quick revocation of risky authorizations through revoke.cash. $ZBT #zerobase


ZBT
0.084
+1.08%