Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Heads up—security researchers have flagged a concerning cyber campaign targeting US entities. Threat actors with suspected links to state-level operations are distributing malware with Venezuelan-themed packaging and infrastructure.
While the initial targets appear to be government and infrastructure sectors, the tactics used—sophisticated social engineering, custom malware variants, and multi-stage deployment—are worth monitoring. The Web3 community should stay vigilant, as similar techniques occasionally spill over into crypto platforms and wallet services.
Key takeaway: Update your security protocols, verify software authenticity, and avoid suspicious downloads regardless of source. Layer your defenses with strong authentication and keep recovery keys offline.
Just keep your private key safe, everything else is虚的
Is it Venezuela again? This trick is so old
Don't connect your wallet to the internet, that's the right way
All this talk is less practical than a硬钱包, spreading alarmist rumors here
The real threat has always been myself, like pressing the wrong key on the keyboard
Trust me, just don't click on unfamiliar links and you'll be fine, it's that simple
---
It's the same old social engineering tactics; everyone needs to pay attention to their wallets.
---
Venezuelan-themed packaging? That's way too obvious, haha.
---
Cold wallets are always correct. Don't be lazy.
---
Storing recovery keys offline is truly not an unnecessary suggestion.
---
It feels like this kind of cross-border technology will eventually hit crypto, making it hard to defend against.
---
Wait, are they really going to target wallet services? We need to be careful.
---
Verify before downloading software, it's that simple.
---
Multi-stage techniques are indeed advanced; one slip and you'll get caught.
---
Strong authentication is not optional; it's a must.
---
It's the same old Venezuelan trick, this time targeting infrastructure. Be careful with your wallets on our side.
---
Basically, it's about update, verification, offline key storage. Nothing new, but 99% of people don't do it.
---
Haha, state-level social engineering, feels like it's on a whole new level compared to those small-scale tricks before.
---
I'm truly impressed. Every time they say monitoring, but those who are vulnerable still get phished. Web3ers need to learn their lesson this time.
---
The most outrageous part is that we have to act as firewalls ourselves. Platform security is just so-so...
---
I've been doing offline recovery keys for a long time. What about others? Really?
---
Venezuelan-themed, what's the new trick? Just tell me how to defend against it directly.
Speaking of this multi-stage deployment approach, we Web3 folks need to be extra cautious; my wallet can't have issues.
Storing the keys offline is non-negotiable, beginners really need to pay attention.
It's the same old story... but we still need to stay alert and not fall for social engineering.
Recovery keys stored online are all crazy people, right? Just looking at them gives me the creeps.
This round targeting infrastructure, retail investors like us need to be careful to avoid splash damage...