The post ZEROBASE front-end hacked, over 270 users lose USDT appeared on BitcoinEthereumNews.com. Hackers took control of the front-end interface of decentralizedThe post ZEROBASE front-end hacked, over 270 users lose USDT appeared on BitcoinEthereumNews.com. Hackers took control of the front-end interface of decentralized

ZEROBASE front-end hacked, over 270 users lose USDT

2025/12/13 14:46

Hackers took control of the front-end interface of decentralized zero-knowledge (ZK) proving network Zerobase late Friday, resulting in losses for more than 270 users and draining over $240,000 worth of USDT. 

According to on-chain investigators Lookonchain, several users reported unauthorized fund movements at around 2:30 PM UTC yesterday, after interactions with what appeared to be the official Zerobase interface. 

The attackers did not breach the underlying blockchain infrastructure, but exploited the platform’s front-end which could be accessed directly through a web interface. They deployed a phishing smart contract on BNB Chain to impersonate Zerobase, which tricked users into connecting their wallets and approving USDT spending permissions.

Once approvals were granted, the attackers were able to siphon funds without further user interaction, with one affected user alone reportedly lost 123,597 USDT, Lookonchain found.

Front-end attack on Zerobase interface causes $240K loss

According to blockchain cybersecurity platform HashDit, the malicious contract address linked to the incident was identified as 0x0dd28fd7d343401e46c1af33031b27aed2152396. The contract was specifically made to hijack wallet connections and extract approved tokens.

Zerobase’s hack was different from the regular smart contract exploits, because a front-end compromise does not need a breacher to tamper with the blockchain’s security. They can manipulate the interface and add malicious codes to intercept transactions or redirect assets once approvals are in place.

These attacks take place at the user interaction layer, so they can be difficult for non-technical users to detect even as their funds are being rerouted. Lookonchain pleaded with affected users to immediately review their wallet permissions and use revoke.cash or similar services to remove any suspicious or unnecessary contract approvals from their wallets.

Zerobase acknowledged the issue in a post on X, warning users who had interacted with the malicious contract and adding that it had implemented automatic safeguards for affected wallets.

“When you access ZEROBASE Staking, if your wallet is detected to have interacted with this contract, the system will automatically block deposits and withdrawals until the approval to the phishing contract is revoked,” the company wrote.

The Binance Wallet team also confirmed it blocked the website domain suspected of hosting malicious activity. It also blacklisted the relevant contracts to prevent more authorization risks, and would automatically send alerts to affected users within 30 minutes advising them to review their approvals.

“We will continue to monitor the situation and take necessary measures to ensure user security. We will share any further updates as soon as possible,” the Binance team noted.

Binance with questions to answer after Upbit hack discovery

The Zerobase incident comes on the backdrop of Binance’s scrutiny over its response to the Upbit exchange hack that occurred late November. Cryptopolitan reported that South Korea’s regulators accused the world’s largest exchange by volume of only partially complying with a freeze request from Upbit.

On November 27 hackers stole a significant amount of digital assets from the exchange and later laundered the funds through more than a thousand wallets. That same day, South Korean police and Upbit formally requested Binance to freeze approximately 470 million won worth of stolen Solana tokens traced to its platform.

Binance froze only about 80 million won, or roughly 17% of the requested amount citing the need for “fact-checking” before taking any action. South Korean authorities were notified that the freeze had been completed around midnight on November 27, 15 hours after the initial request was submitted.

Upbit later disclosed the perpetrators had exploited a vulnerability in its Solana-based hot wallet, siphoning funds from 24 Solana ecosystem tokens in less than an hour. Losses from the attack were estimated at 44.5 billion won, equivalent to about $33 million at the time. 

The exchange later confirmed that all customer losses would be covered using internal reserves, seeking to reassure users amid heightened concerns about platform security.

In a separate but related blockchain security event, blockchain security firm CertiK detected suspicious Tornado Cash deposits linked to anomalous withdrawals from 0G Labs on Friday. 

An unidentified party made a withdrawal of approximately 520,000 0G tokens, valued at around $516,000, using a privileged emergencyWithdraw function. The funds were first transferred to the address 0x617E8e3C07bEF319F26C1682270A19e89Ea2bf75.

Get $50 free to trade crypto when you sign up to Bybit now

Source: https://www.cryptopolitan.com/zerobase-front-end-hacked/

Piyasa Fırsatı
ZeroLend Logosu
ZeroLend Fiyatı(ZERO)
$0.000008395
$0.000008395$0.000008395
-1.83%
USD
ZeroLend (ZERO) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen service@support.mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Crypto.com Reveals Hidden User Data Breach

Crypto.com Reveals Hidden User Data Breach

The post Crypto.com Reveals Hidden User Data Breach appeared on BitcoinEthereumNews.com. According to a Bloomberg investigation, Crypto.com, one of the world’s largest cryptocurrency exchanges, reportedly suffered a security breach it never disclosed. The report linked the incident to Scattered Spider, a hacking group that often targets companies with social engineering tactics. The group comprises mainly teenagers who specialize in tricking employees into handing over their credentials. Sponsored Sponsored According to Bloomberg, the attackers posed as IT staff and persuaded unnamed Crypto.com employees to surrender login credentials. Once inside, they attempted to escalate their access by targeting senior staff accounts. Crypto.com told Bloomberg that the attack affected only “a very small number of individuals” and emphasized that customer funds remained untouched. The firm has yet to provide additional information about the incident as of press time. Meanwhile, security experts argue that the exchange’s decision not to disclose the breach undermines confidence in its security practices. They argue that its failure to share details about the incident leaves its users uncertain about the extent of the exposure and vulnerable to possible follow-up attacks. This concern is significant because Coinbase previously suffered a similar breach that exposed its customers to more than $300 million yearly losses. On-chain investigator ZachXBT accused Crypto.com of deliberately covering up the breach. He also stressed that this was not the first time the platform had been linked to undisclosed security lapses Sponsored Sponsored His comments echo wider industry frustration about exchanges that quietly downplay breaches to protect their reputations. Meanwhile, the incident has also reignited criticism of the industry’s reliance on Know Your Customer (KYC) systems. Pseudonymous security researcher Pcaversaccio reacted sharply to the issues, arguing that KYC requirements create massive data honeypots for hackers. “You can change a password easily, but not your passport and they f#cking know it well. We’re basically the collateral in their surveillance racket,”…
Paylaş
BitcoinEthereumNews2025/09/22 03:09
Shiba Inu Price Prediction: 1 Trillion SHIB Hits Exchanges – What Are Whales Planning Behind the Scenes?

Shiba Inu Price Prediction: 1 Trillion SHIB Hits Exchanges – What Are Whales Planning Behind the Scenes?

Whale activity around SHIB has suddenly surged, and it could spell trouble for the bulls.Over 1 trillion SHIB tokens, worth more than $8 million, were moved to
Paylaş
Coinstats2025/12/16 07:32
Trump Hints at Samourai Wallet Pardon — Another After CZ, Ulbricht

Trump Hints at Samourai Wallet Pardon — Another After CZ, Ulbricht

The post Trump Hints at Samourai Wallet Pardon — Another After CZ, Ulbricht appeared on BitcoinEthereumNews.com. President Donald Trump said he would consider pardoning
Paylaş
BitcoinEthereumNews2025/12/16 08:41