🎉 [Gate 30 Million Milestone] Share Your Gate Moment & Win Exclusive Gifts!
Gate has surpassed 30M users worldwide — not just a number, but a journey we've built together.
Remember the thrill of opening your first account, or the Gate merch that’s been part of your daily life?
📸 Join the #MyGateMoment# campaign!
Share your story on Gate Square, and embrace the next 30 million together!
✅ How to Participate:
1️⃣ Post a photo or video with Gate elements
2️⃣ Add #MyGateMoment# and share your story, wishes, or thoughts
3️⃣ Share your post on Twitter (X) — top 10 views will get extra rewards!
👉
Wintermute: After the Pectra upgrade, a malicious contract named "CrimeEnjoyor" has appeared, suspected of phishing and has not made a profit.
PANews, June 2 - According to CoinDesk, Wintermute pointed out that after the Ethereum Pectra upgrade went live with EIP-7702, a large number of malicious contracts named "CrimeEnjoyor" appeared, exploiting the mechanism that allows users to authorize wallet permissions to smart contracts, attempting to scan and transfer funds. However, the attackers have not made any profits so far. More than 97% of EIP-7702 authorizations point to the same replicated code, suspected to be an automated coin theft tool. The attackers invested about 2.88 ETH for 79,000 address authorizations, with the largest address handling over 52,000 authorizations, yet there have been no actual gains to date. Although this attack method has not been effective, it exposes security vulnerabilities in EIP-7702.