12 月 ETH 价格预测 · 发帖挑战 📈
12 月降息预期升温,ETH 热点回暖,借此窗口期发起行情预测互动!
欢迎 Gate 社区用户 —— 判趋势 · 猜行情 · 赢奖励 💰
奖励 🎁:预测命中的用户中抽取 5 位,每位 10 USDT
时间 📅:预测截止 12 月 11 日 12:00(UTC+8)
参与方式 ✍️:
在 Gate 广场发布 ETH 行情预测帖,写明价格区间(如 $3,200–$3,400,区间需<$200),并添加话题 #ETH12月行情预测
发帖示例 👇
示例①:
#ETH12月行情预测
预测区间:$3,150-$3,250
行情偏震荡上行,若降息如期落地 + ETF 情绪配合,冲击前高可期 🚀
示例②:
#ETH12月行情预测
预测区间:$3,300-$3,480
资金回流 + L2 降费利好中期趋势,向上试探 $3,400 的概率更高 📊
评选规则 📍
以 12 月 11 日 12:00(UTC+8)ETH 实时价格为参考
价格落入预测区间 → 视为命中
若命中人数>5 → 从命中者中随机抽取 5 位 🏆
Maestro Telegram Bot Hit By Critical Security Breach
Maestro, one of the largest Telegram bot projects in the crypto eco, fell victim to a critical security breach earlier today, resulting in the unauthorized transfer of more than 280 ETH, amounting to a staggering $500,000, from user accounts. The breach stemmed from a critical vulnerability discovered in its Router2 contract, leaving the project in turmoil.
Consequently, Maestro has taken steps to address the issue. However, there will be a temporary disruption in accessing tokens within liquidity pools on specific decentralized exchanges (DEXs).
Router2 Contract Flaw Exploited
The Router2 contract, a pivotal component designed to manage the logic behind token swaps, harbored a vulnerability that enabled malicious actors to ute arbitrary calls, leading to the illicit transfer of assets.
Security firm PeckShield has identified that the stolen funds found their way to the cross-chain exchange platform Railgun, a likely attempt to obfuscate their origin.
The issue lies in the unique design of the Router2 contract, employing a proxy mechanism that facilitates alterations in the contract’s logic without necessitating a change in its address.
While this feature was intended to allow for upgradability, it inadvertently opened a gateway for unauthorized calls. Attackers leveraged this vulnerability to initiate “transferFrom” operations between any approved addresses.
The attackers exploited a simple yet powerful technique. By inputting a token address into the Router2 contract, they set the function to “transferFrom,” manipulating the sender’s details to reflect the victim’s address and redirecting the tokens to their accounts. This heinous tactic led to the unauthorized transfer of tokens from the victims’ accounts to those under the attackers’ control.
Maestro Hopes to Issue Refunds ly
Responding with commendable swiftness, Maestro took immediate action. Within 30 minutes of discovering the breach, the team replaced the compromised Router2 contract’s logic with a benign Counter contract. This tactical move effectively froze all router operations, preventing further unauthorized transfers.
While Maestro’s diligent efforts have successfully resolved the vulnerability, tokens housed in liquidity pools on prominent decentralized exchanges, including SushiSwap, ShibaSwap, and ETH PancakeSwap, will remain temporarily inaccessible as the company conducts a thorough internal review.
Assuring affected users, the Maestro team announced their commitment to refunds, hopefully within the day.
The incident comes as the popularity of Telegram-integrated bots among crypto traders is rising. Despite their convenience and ease of use, experts are raising concerns regarding the security measures implemented by these bots in handling user assets.