📢 Gate广场 #创作者活动第一期# 火热开启,助力 PUMP 公募上线!
Solana 爆火项目 Pump.Fun($PUMP)现已登陆 Gate 平台开启公开发售!
参与 Gate广场创作者活动,释放内容力量,赢取奖励!
📅 活动时间:7月11日 18:00 - 7月15日 22:00(UTC+8)
🎁 活动总奖池:$500 USDT 等值代币奖励
✅ 活动一:创作广场贴文,赢取优质内容奖励
📅 活动时间:2025年7月12日 22:00 - 7月15日 22:00(UTC+8)
📌 参与方式:在 Gate 广场发布与 PUMP 项目相关的原创贴文
内容不少于 100 字
必须带上话题标签: #创作者活动第一期# #PumpFun#
🏆 奖励设置:
一等奖(1名):$100
二等奖(2名):$50
三等奖(10名):$10
📋 评选维度:Gate平台相关性、内容质量、互动量(点赞+评论)等综合指标;参与认购的截图的截图、经验分享优先;
✅ 活动二:发推同步传播,赢传播力奖励
📌 参与方式:在 X(推特)上发布与 PUMP 项目相关内容
内容不少于 100 字
使用标签: #PumpFun # Gate
发布后填写登记表登记回链 👉 https://www.gate.com/questionnaire/6874
🏆 奖励设置:传播影响力前 10 名用户,瓜分 $2
5 ‘insidious’ crypto scams to watch out for this year
Crypto users faced a rise in “psychologically manipulative” attacks in the second quarter as hackers dreamt up advanced and creative ways to try and steal crypto, according to blockchain security firm SlowMist.
SlowMist’s head of operations, Lisa, said in the firm’s Q2 MistTrack Stolen Fund Analysis report that while it didn’t see an advancement in hacking techniques, the scams have become more sophisticated, with a rise in fake browser extensions, tampered hardware wallets and social engineering attacks.
“Looking back on Q2, one trend stands out: attackers’ methods may not be getting technically more advanced, but they are becoming more psychologically manipulative.”
“We’re seeing a clear shift from purely onchain attacks to offchain entry points — browser extensions, social media accounts, authentication flows, and user behavior are all becoming common attack surfaces,” said Lisa
Malicious browser extensions pretend to be security plugins
Ironically, one emerging attack vector involved browser extensions masquerading as security plugins, such as the “Osiris” Chrome extension, which claimed to detect phishing links and suspicious websites
Instead, the extension intercepts all downloads of .exe. .dmg and .zip files, replacing those files with malicious programs
“Even more insidiously, attackers would guide users to visit well-known, commonly used websites like Notion or Zoom,” said Lisa
“When the user attempted to download software from these official sites, the files delivered had already been maliciously replaced — yet the browser still displayed the download as originating from the legitimate source, making it nearly impossible for users to spot anything suspicious.”
These programs would then collect sensitive information from the user’s computer, including Chrome browser data and macOS Keychain credentials, giving an attacker access to seed phrases, private keys or login credentials
SlowMist said another attack method focused on tricking crypto investors into adopting tampered hardware wallets.
In some cases, hackers would send users a compromised cold wallet, telling their victims they had won a free device under a “lottery draw” or telling them their existing device was compromised and they needed to transfer their assets
In Q2, one victim reportedly lost $6.5 million by purchasing a tampered cold wallet that they saw on TikTok, according to Lisa
Social engineering with fake revoker website
SlowMist said it was also contacted in Q2 by a user who could not revoke a “risky authorization” in their wallet.
Related: US sanctions crypto wallet tied to ransomware, infostealer host
Upon investigation, SlowMist said the website that the user was using to try to revoke the smart contract’s permission was “a near-perfect clone of the popular Revoke Cash interface,” which asked users to input their private key to “check for risky signatures.”
“Upon analyzing the front end code, we confirmed that this phishing website used EmailJS to send users’ input — including private keys and addresses — to an attacker’s email inbox.”
“Attackers know that phrases like ‘risky signature detected’ can trigger panic, prompting users to take hasty actions. Once that emotional state is triggered, it’s much easier to manipulate them into doing things they normally wouldn’t — like clicking links or sharing sensitive information.”
Attacks exploit Pectra upgrade, WeChat friends
Other attacks included phishing techniques that exploited EIP-7702, introduced in Ethereum’s latest Pectra upgrade, while another targeted several WeChat users by gaining control of their accounts
Cointelegraph Magazine recently reported that the attackers utilized WeChat’s account recovery system to gain control of an account, impersonating the real owner to scam their contacts with discounted Tether (USDT)
SlowMist’s Q2 data came from 429 stolen fund reports submitted to the firm during the second quarter.
The firm said it froze and recovered around $12 million from 11 victims who reported having crypto stolen in Q2.
Magazine: North Korea crypto hackers tap ChatGPT, Malaysia road money siphoned: Asia Express