Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
I just read a report about an issue that could seriously affect cryptocurrency wallet owners. It turns out researchers have discovered over 300 malicious plugins for AI assistants that actively steal data from users' wallets. This is not just spam — it's a serious security threat.
What exactly do these plugins do? They can extract browser passwords, information about crypto wallets, SSH keys, and API keys. Some are even equipped with keylogging and remote control features. Essentially, they gain full control over the account without the user's knowledge.
Why does this happen? It's simple — AI assistants have elevated system permissions that grant access to file systems, browsers, email, and wallets. This makes them a much more attractive target for cybercriminals than traditional malware. If you use top crypto wallets or any other storage solutions, be cautious.
What should you do? First, never store mnemonic phrases or private keys in AI tools — this is critically important. Second, do not install plugins from untrusted sources. Check the reputation before installing. Third, enable all available security features. If you take your asset protection seriously, especially if you use top crypto wallets, these measures are mandatory.
Personally, I always recommend being paranoid about security. Top crypto wallets or any other storage require maximum protection. This story once again confirms that you can't rely solely on tools — you need to keep track of what you're allowing them to do.