Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
Recently, I noticed a pretty serious phenomenon: domestic scam groups are rapidly upgrading from traditional telecom fraud to the cryptocurrency field. I see many people crashing in the U scam pits—depositing $500k into a bank takes five minutes, but clicking on a phishing link can be gone in less than a second.
Why are scammers so obsessed with U theft scams? Basically, because cryptocurrencies are not legally protected domestically. When victims report to the police, many officers don’t really understand what USDT is; some directly tell you it’s unprotected and won’t even file a case. This gives scammers plenty of room to operate.
In the recent U theft scams I’ve seen, the three most common types are these. First is the QR code contract authorization method—scammers send you a QR code during a transaction for you to scan, making it look like a transfer, but actually it’s authorizing them to control your wallet. I’ve looked closely; these phishing QR codes are third-party redirect links, whereas normal transfer QR codes are just wallet addresses. Especially those claiming you need to transfer to a third party to complete the transaction—100% scams. Many newbies are fooled by promises of high returns, even thanking the scammers after being duped.
The second is even more vicious: clipboard virus. A fan told me his computer got infected—copying a Bitcoin address automatically gets replaced with the scammer’s address, while other text remains unaffected. Scammers usually send some seemingly enticing trojan files; once you download and open them, all copied transfer links will be tampered with. For example, you copy an address ending in 123, but when pasted, it becomes 567. The sneakiest part of this U theft method is that you won’t even notice.
The third is fake wallet U theft, which is a high-incidence scam area. Since cold wallets are open source, it’s not hard to imitate them. Scammers first attract newbies with promises of high returns, encouraging them to download fake wallets voluntarily. Small transfers in the beginning are fine, but once large amounts are deposited, the fake wallet will freeze your account and demand a ransom to unfreeze it. At this point, it shifts from simple U theft to a “pig butchering” scam—pressuring you to pay deposits