[Crypto World] A serious authorization scam has been exposed on the BSC chain. According to security teams, a malicious contract disguised as the ZEROBASE frontend (0x0dd2…2396) is inducing users to authorize USDT. This incident originated from an attack on the ZEROBASE frontend, with the attacker deploying malicious contracts for phishing purposes, which has nothing to do with the Binance Web3 wallet itself.
The situation is now quite severe—hundreds of addresses are affected, with a single loss reaching up to $123,000. The stolen funds have been transferred to ETH address 0x4a57…fc84 for concealment.
Good news is, ZEROBASE has activated an authorization detection mechanism to prevent further losses. If you have interacted with this contract, it is strongly recommended to immediately log in to revoke.cash and revoke the relevant authorizations. Don’t wait to be exploited further. Safety is no small matter; act now.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
8 Likes
Reward
8
7
Repost
Share
Comment
0/400
PuzzledScholar
· 12-12 19:44
Here we go again, same old trick. Front-end gets attacked and phishing scams occur. Hundreds of people fall for it, and still no lesson learned.
View OriginalReply0
0xSunnyDay
· 12-12 16:08
Here it is, the BSC chain really is a fishing paradise...
---
Hundreds of addresses? Damn, how reckless do you have to be
---
Be careful with authorization stuff, not everyone can be trusted
---
$120,000 per transaction? These scammers are too greedy
---
Even if ZEROBASE is taken down, they can still do evil. Is the security team asleep?
---
Looks like I need to add more to the blacklist again, 0x0dd2…2396. Remember, guys
---
I told you USDT authorization is the easiest to cause issues, always check the contract address
---
Are people still using ZERO? I already ran away long ago, not gonna lie
---
Phishing contracts happen every day, there are so many copycat scammers
---
Frontend hacked = users get exploited, the logic is airtight
View OriginalReply0
BanklessAtHeart
· 12-12 16:00
Is BSC so easy to attack? It's always this kind of nonsense everyday.
View OriginalReply0
BTCWaveRider
· 12-12 15:58
Here we go again, a few of these incidents on BSC in the past month...
View OriginalReply0
AirdropSkeptic
· 12-12 15:55
Here we go again, there are so many scammers in this trashy BSC place.
View OriginalReply0
DefiPlaybook
· 12-12 15:55
It's the same old story of front-end being hacked to deploy malicious contracts. The guy who went all-in with $120,000 is probably still watching the K-line [dog head].
---
Phishing scams are always the simplest and most brutal way to cut in the crypto world, even easier than flashloan arbitrage.
---
Hundreds of addresses victimized? I just want to know if these guys checked the contract code before approving... most likely not.
---
There have been so many scam contracts on BSC in the past two years, it feels more rampant than on the mainnet.
---
Honestly, the issue of front-end being attacked should have been taken seriously long ago, otherwise users always foot the bill.
---
Is the contract 0x0dd2 already blacklisted now? Has anyone tracked the flow of these funds?
---
A classic phishing trick: secretly changing the front-end address. Big players are rushing to approve, and they can't react quickly enough.
---
It seems that NFT scams have cooled down, but contract scammers are even more arrogant... these days, even DeFi isn't safe.
---
Lost $120,000 all at once, how desperate must they have been? Approvals done without review.
View OriginalReply0
JustHereForMemes
· 12-12 15:42
It's the same trick again—front-end attack authorization scams. How are people still falling for this?
Beware of malicious contract scams on the BSC chain: hundreds of addresses have been victimized, with the largest single loss exceeding $120,000.
[Crypto World] A serious authorization scam has been exposed on the BSC chain. According to security teams, a malicious contract disguised as the ZEROBASE frontend (0x0dd2…2396) is inducing users to authorize USDT. This incident originated from an attack on the ZEROBASE frontend, with the attacker deploying malicious contracts for phishing purposes, which has nothing to do with the Binance Web3 wallet itself.
The situation is now quite severe—hundreds of addresses are affected, with a single loss reaching up to $123,000. The stolen funds have been transferred to ETH address 0x4a57…fc84 for concealment.
Good news is, ZEROBASE has activated an authorization detection mechanism to prevent further losses. If you have interacted with this contract, it is strongly recommended to immediately log in to revoke.cash and revoke the relevant authorizations. Don’t wait to be exploited further. Safety is no small matter; act now.