Futures
Access hundreds of perpetual contracts
CFD
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
SlowMist: TRON users beware of phishing attacks impersonating the TronLink extension
BlockBeats News, May 11 — The SlowMist team recently issued a warning, discovering a high-risk phishing incident targeting TRON wallet users. The attacker created a Chrome browser extension that impersonates the official TronLink wallet, using Unicode bidirectional control characters and visually similar Cyrillic letters to forge the extension name, thereby deceiving users.
The malicious extension’s name displayed in the Chrome Web Store closely resembles the legitimate one and leverages the high download count and positive reviews of the real extension, reducing the vigilance of ordinary users. The extension’s code is minimal, only responsible for loading a complete phishing page from a remote server, forming a “shell and core separation” attack chain, making it difficult for routine static code reviews to detect malicious activity.
The remotely loaded phishing page visually nearly identical to the real TronLink web wallet, specifically designed to trick users into entering seed phrases, private keys, Keystore files, and wallet passwords. Once submitted, these sensitive details are immediately sent to the attacker via a Telegram bot. Additionally, the page has built-in anti-debugging features, disabling right-click menus, developer tools, drag-and-drop actions, and printing. It also redirects based on the user’s geographic location and language settings (especially targeting Russian users) to evade automated security scans.
SlowMist recommends users immediately check and uninstall suspicious extensions from unknown sources, clear local browser storage data, and watch for abnormal network requests. If wallet information has been inadvertently leaked, users should immediately create a new wallet and transfer all assets to a secure address.