PANews reported on December 12th that, according to SlowMist founder Yu Xian and ZEROBASE officials, a malicious on-chain contract named "Vault" (0x0dd2…2396) masqueraded as a ZEROBASE frontend to trick users into authorizing USDT. This is suspected to be due to an attack on the ZEROBASE frontend, not a problem with the Binance Web3 wallet. Hundreds of addresses have been affected, with the largest single loss reaching $123,000. The stolen funds have been transferred to the ETH address 0x4a57…fc84. ZEROBASE has implemented an authorization detection mechanism, and the community is urging users to revoke the risky authorization as soon as possible via revoke.cash.

