🌟 Photo Sharing Tips: How to Stand Out and Win?
1.Highlight Gate Elements: Include Gate logo, app screens, merchandise or event collab products.
2.Keep it Clear: Use bright, focused photos with simple backgrounds. Show Gate moments in daily life, travel, sports, etc.
3.Add Creative Flair: Creative shots, vlogs, hand-drawn art, or DIY works will stand out! Try a special [You and Gate] pose.
4.Share Your Story: Sincere captions about your memories, growth, or wishes with Gate add an extra touch and impress the judges.
5.Share on Multiple Platforms: Posting on Twitter (X) boosts your exposure an
Be wary of fake exchange APP, the security of funds is worrying, and multiple verifications protect assets
Hidden risks of fake exchange apps: user funds are threatened with theft
Recently, a new type of cryptocurrency fraud has attracted a lot of attention. Some users unknowingly transfer funds to the hacker's wallet while using a seemingly normal trading platform app. This scam cleverly exploits the user's trust in the app and steals funds by replacing the transfer address.
It is reported that some users encountered a situation where the funds did not arrive when they were preparing to transfer ETH from other wallets to a well-known trading platform. After verification by customer service, it was found that the recharge address used by the user did not belong to any user of the platform. In another similar incident, a user transferred USDT from another platform, and the first transaction was successfully received, but the second transfer of more than 5,000 USDT was delayed.
Through on-chain data analysis, an address suspected of participating in such scams has received nearly 400 transfers totaling more than 500,000 USDT in the past month. This shows that the scam has caused considerable losses.
Security experts point out that the core of this scam lies in the fact that malicious code is precisely implanted into a normal-looking APP. When a user makes a top-up operation, the malicious code will quietly replace the displayed top-up address with an address controlled by the hacker. Unlike other methods of coin theft, this method does not require bypassing any additional security verification steps.
To combat this threat, experts recommend that users take the following precautions:
The security team explained that this fake APP is no different from the genuine one in terms of basic functions such as user login, but it implants malicious code in the top-up process. When a user makes a top-up operation, the malicious code is triggered, replacing the correct top-up address with an address controlled by the hacker.
In particular, experts caution not to look for and download cryptocurrency trading apps through search engines, as the download links in the search results are likely to lead to fake apps. The only reliable way to download safely is to go directly to the official website of the trading platform.
This incident once again highlights the importance of vigilance in the cryptocurrency space. Users should be extremely cautious when conducting any fund operations, and always pay attention to the security reminders and update notices issued by the authorities.