GoPlus Security Deep Dive: On How We Discovered Over Half a Million Risky Tokens on Five Ethereum L2 Chains
defihacklabs.substack.com
All readers can follow us on Twitter (DeFiHackLabs) to get the latest information. Author: GoPlus Security 13.6 Million Users have been affected over the last three Quarters Introduction With the rapid development of Web3, more and more retail is entering the space and investing. Among the areas of on-chain investment, meme tokens are amongst the most beloved and attractive investment vehicles. Meme tokens have characteristics such as fast issuance, high volatility, and anonymity of issuers. However, a large number of scammers have exploited this meme token frenzy, cloaked in the guise of meme tokens, and carried out large-scale on-chain scams against users. These criminals use the characteristics of smart contracts to design various risky tokens, deceive users into investing, and then illegally profit by triggering code backdoors and other methods.
GoPlus Security Deep Dive: On How We Discovered Over Half a Million Risky Tokens on Five Ethereum L2 Chains
GoPlus Security Deep Dive: On How We…
GoPlus Security Deep Dive: On How We Discovered Over Half a Million Risky Tokens on Five Ethereum L2 Chains
All readers can follow us on Twitter (DeFiHackLabs) to get the latest information. Author: GoPlus Security 13.6 Million Users have been affected over the last three Quarters Introduction With the rapid development of Web3, more and more retail is entering the space and investing. Among the areas of on-chain investment, meme tokens are amongst the most beloved and attractive investment vehicles. Meme tokens have characteristics such as fast issuance, high volatility, and anonymity of issuers. However, a large number of scammers have exploited this meme token frenzy, cloaked in the guise of meme tokens, and carried out large-scale on-chain scams against users. These criminals use the characteristics of smart contracts to design various risky tokens, deceive users into investing, and then illegally profit by triggering code backdoors and other methods.