🚀 Gate Square “Gate Fun Token Challenge” is Live!
Create tokens, engage, and earn — including trading fee rebates, graduation bonuses, and a $1,000 prize pool!
Join Now 👉 https://www.gate.com/campaigns/3145
💡 How to Participate:
1️⃣ Create Tokens: One-click token launch in [Square - Post]. Promote, grow your community, and earn rewards.
2️⃣ Engage: Post, like, comment, and share in token community to earn!
📦 Rewards Overview:
Creator Graduation Bonus: 50 GT
Trading Fee Rebate: The more trades, the more you earn
Token Creator Pool: Up to $50 USDT per user + $5 USDT for the first 50 launche
KiloEx released a summary of the hacker incident: a bug in the TrustedForwarder contract in the smart contracts led to this attack.
According to Deep Tide TechFlow news, on April 21, KiloEx released a root cause analysis and post-incident summary of the hacking event. The incident was caused by its smart contracts, where the TrustedForwarder contract inherited from OpenZeppelin’s MinimalForwarderUpgradeable but did not override the execute method, resulting in the function being callable by anyone.
The attack occurred from April 14, 18:52 to 19:40 (UTC), with the Hacker implementing the attack by deploying attack contracts on multiple chains including opBNB, Base, BSC, Taiko, B2, and Manta. After negotiation, the Hacker agreed to retain 10% of the bounty and has returned all stolen assets (including USDT, USDC, ETH, BNB, WBTC, and DAI) to the multi-signature wallet designated by KiloEx.