💥 Gate Square Event: #PostToWinCGN 💥
Post original content on Gate Square related to CGN, Launchpool, or CandyDrop, and get a chance to share 1,333 CGN rewards!
📅 Event Period: Oct 24, 2025, 10:00 – Nov 4, 2025, 16:00 UTC
📌 Related Campaigns:
Launchpool 👉 https://www.gate.com/announcements/article/47771
CandyDrop 👉 https://www.gate.com/announcements/article/47763
📌 How to Participate:
1️⃣ Post original content related to CGN or one of the above campaigns (Launchpool / CandyDrop).
2️⃣ Content must be at least 80 words.
3️⃣ Add the hashtag #PostToWinCGN
4️⃣ Include a screenshot s
Slow Fog Cosine: GMGN Hacker drained user funds through honeypot withdrawal method, profiting over $700,000.
Odaily News Slow Fog's余弦 published on the X platform stating: “After reviewing dozens of stolen intelligence reports related to GMGN submitted to us, a commonality: the users' Private Keys have not been leaked, but SOL and BNB have all been purchased into a honeypot (which can only be bought and not sold). The Hacker mainly siphons off user funds by withdrawing the pools from the honeypot, profiting over 700,000 USD. The cause of this situation (not a Private Key leak) is likely due to a more advanced phishing method. Since GMGN has already fixed the related issues, reproduction is not easy, and it is speculated to be related to the GMGN account model. Users access phishing websites, and the phishing site obtains the login signature information of the user's GMGN account model, such as the accesstoken and refreshtoken values, taking over the user's account permissions. However, without the user's 2FA, it is impossible to directly export the Private Key or withdraw coins. Therefore, they implement a “counter-trade” attack on user funds through the honeypot, indirectly stealing user assets.”