🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
Trust Wallet has opened a claim channel, with over 2,600 people applying in a short period of time.
Trust Wallet was subjected to a supply chain attack this week, with losses amounting to at least $7 million. The official has now officially initiated the compensation process.
(Background: CZ: Trust Wallet will compensate users for asset losses, with stolen funds reaching $7 million)
(Additional background: SlowMist: Trust Wallet’s code repository suspected to be compromised, users are advised to disconnect from the internet and transfer assets)
The self-custody crypto wallet Trust Wallet has officially opened the official claim form for full compensation. Applicants must prepare: 1) contact Email and residence; 2) stolen wallet address; 3) attacker’s receiving address; 4) related transaction hash (TXID); 5) a brand new, uncontaminated receiving wallet address.
The official once again reminds users that they only need to submit information through the official form. Beware of phishing accounts “do not interact with any messages from non-official channels,” and any “customer service” requesting seed phrases is a scam.
Trust Wallet CEO recently posted:
Security upgrade recommendations
Security experts advise that even if assets are not affected, anyone who has installed v2.68 should immediately upgrade to v2.69 and consider regenerating a new wallet to prevent future issues. Large assets should be transferred to cold wallets or multi-signature addresses to reduce single point risks.
Finally, diversifying assets, regularly checking authorization records and plugin sources remain the best strategies to prevent supply chain attacks.