Gate News, March 11 — GoPlus issued a security alert stating that attackers are using Google search ads to distribute malware that perfectly clones the official Claude Code installation page at a pixel level. This malware can steal user passwords, cookies, session tokens, crypto wallet credentials, and system information. GoPlus recommends users take the following precautions: identify ad labels in search results and carefully verify URL differences from the official website; verify installation methods through official documentation, social media, or GitHub repositories via multiple channels; avoid executing unfamiliar commands directly and analyze command behavior before running; install security plugins to intercept phishing links, risk signatures, authorizations, and transactions in real time.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
a16z Crypto Research Report: AI agent DeFi exploit rate reaches 70%
According to a research report published by a16z Crypto on April 29, when AI agents are equipped with structured domain knowledge, their success rate in reproducing an Ethereum price manipulation vulnerability reaches 70%; in a sandbox environment with no domain knowledge at all, the success rate is only 10%. The report also documents cases where AI agents independently bypass sandbox restrictions to access future transaction information, as well as systematic failure modes of the agents when constructing multi-step profitable attack plans.
MarketWhisper28m ago
Polymarket denies allegations of a leak of 300k records, saying its API data is publicly available and auditable
According to an X post by Polymarket on April 29, the cybersecurity account Dark Web Informer claimed that the decentralized prediction market platform Polymarket was hacked, with more than 300k records and an exploit tool kit leaked to online criminal forums; Polymarket immediately denied this on X, saying that all on-chain data is publicly available and can be audited.
MarketWhisper52m ago
Slow Mist Detects EIP-7702 Exploit: QNT Reserve Pool Loses 1,988.5 QNT (~$54.93M in ETH)
Gate News message, April 29 — Slow Mist detected a malicious transaction exploiting a vulnerability in an EIP-7702 account, resulting in the loss of 1,988.5 QNT (approximately 54.93 ETH) from a QNT reserve pool.
The vulnerability stemmed from a structural flaw in the reserve pool's access
GateNews1h ago
CertiK report: $900 million in AML fines; SEC crypto enforcement down 97% year over year
According to a report published by blockchain security audit firm CertiK on April 28, anti-money laundering (AML) enforcement has replaced securities violation findings and become the top regulatory threat facing crypto companies. The report shows that the U.S. Department of Justice and the Financial Crimes Enforcement Network (FinCEN) issued a total of $900 million in AML-related fines in the first half of 2025; in the same period, the U.S. Securities and Exchange Commission (SEC) saw crypto-asset penalties fall 97% year over year.
MarketWhisper1h ago
Bitcoin ETF Outflows Hit $89.68M, Ethereum ETF Down $21.8M; Saylor Eyes $10M Per BTC
Gate News message, April 29 — Bitcoin spot ETFs recorded net outflows of $89.68 million yesterday (April 28), with BlackRock's IBIT leading losses at $112 million. Ethereum spot ETFs saw net outflows of $21.8 million, with BlackRock's ETHA accounting for $13.17 million of the decline.
Meanwhile, Mi
GateNews2h ago
India I4C issues alert: surge in fake verification link phishing scams involving Trust Wallet
According to an official alert issued on April 28 by India’s Internet Crime Coordination Center (I4C), cases of “wallet-draining” scams targeting Trust Wallet users have continued to increase. Attackers lure users into granting wallet permissions to malicious smart contracts by impersonating “cryptocurrency verification” steps, after which the funds are immediately transferred out via automated scripts. I4C said that the upward trend in the number of these scams is driven by a surge in the number of complaints received by the national cybercrime reporting portal.
MarketWhisper2h ago