[ZEROBASE Frontend Impersonation Causes Over $250,000 USDT Loss for BSC Users]
SlowMist founder Yu Jian and ZEROBASE disclosed that a malicious contract on the BSC chain, 'Vault' (0x0dd2…2396), disguised itself as the ZEROBASE frontend to trick users into authorizing USDT transactions. It is suspected that the ZEROBASE frontend was attacked, and this is not an issue with the Binance Web3 wallet. So far, hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84. ZEROBASE has activated an authorization detection mechanism, and the community is urging users to promptly revoke risky authorizations via revoke.cash.