Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Port3 Network: The reason for the attack is a vulnerability in CATERC20, and a new Token will be issued to completely resolve this issue.
On November 23, the Port3 Network official posted on social media that PORT3 adopted the cross-chain token solution CATERC20 using the Nexa network to support multi-chain development. However, this solution has a boundary condition validation vulnerability. When the ownership of the token is abandoned, the function return value exactly matches the owner verification condition, leading to a failure in permission verification, allowing unauthorized access. This vulnerability was not detected in the CATERC20 audit report. Since the PORT3 token had previously abandoned ownership to enhance decentralization, it was in a state that could be exploited by this vulnerability. After the hacker discovered this authorization verification defect, at UTC time 20:56:24, they initiated the RegisterChains operation through address 0xb13A…812E, registering their address as an authorized address. The attacker then repeated the same attack method from multiple addresses, including 0x7C2F…551fF. The official has contacted mainstream exchanges to suspend deposit and withdrawal services. Next, the issue will be completely resolved by reissuing a fixed version of the token.