Hackers took control of the front-end interface of decentralized zero-knowledge (ZK) proving network Zerobase late Friday, resulting in losses for more than 270Hackers took control of the front-end interface of decentralized zero-knowledge (ZK) proving network Zerobase late Friday, resulting in losses for more than 270

Hackers compromised the ZEROBASE front-end

2025/12/13 14:40

Hackers took control of the front-end interface of decentralized zero-knowledge (ZK) proving network Zerobase late Friday, resulting in losses for more than 270 users and draining over $240,000 worth of USDT. 

According to on-chain investigators Lookonchain, several users reported unauthorized fund movements at around 2:30 PM UTC yesterday, after interactions with what appeared to be the official Zerobase interface. 

The attackers did not breach the underlying blockchain infrastructure, but exploited the platform’s front-end which could be accessed directly through a web interface. They deployed a phishing smart contract on BNB Chain to impersonate Zerobase, which tricked users into connecting their wallets and approving USDT spending permissions.

Once approvals were granted, the attackers were able to siphon funds without further user interaction, with one affected user alone reportedly lost 123,597 USDT, Lookonchain found.

Front-end attack on Zerobase interface causes $240K loss

According to blockchain cybersecurity platform HashDit, the malicious contract address linked to the incident was identified as 0x0dd28fd7d343401e46c1af33031b27aed2152396. The contract was specifically made to hijack wallet connections and extract approved tokens.

Zerobase’s hack was different from the regular smart contract exploits, because a front-end compromise does not need a breacher to tamper with the blockchain’s security. They can manipulate the interface and add malicious codes to intercept transactions or redirect assets once approvals are in place.

These attacks take place at the user interaction layer, so they can be difficult for non-technical users to detect even as their funds are being rerouted. Lookonchain pleaded with affected users to immediately review their wallet permissions and use revoke.cash or similar services to remove any suspicious or unnecessary contract approvals from their wallets.

Zerobase acknowledged the issue in a post on X, warning users who had interacted with the malicious contract and adding that it had implemented automatic safeguards for affected wallets.

“When you access ZEROBASE Staking, if your wallet is detected to have interacted with this contract, the system will automatically block deposits and withdrawals until the approval to the phishing contract is revoked,” the company wrote.

The Binance Wallet team also confirmed it blocked the website domain suspected of hosting malicious activity. It also blacklisted the relevant contracts to prevent more authorization risks, and would automatically send alerts to affected users within 30 minutes advising them to review their approvals.

“We will continue to monitor the situation and take necessary measures to ensure user security. We will share any further updates as soon as possible,” the Binance team noted.

Binance with questions to answer after Upbit hack discovery

The Zerobase incident comes on the backdrop of Binance’s scrutiny over its response to the Upbit exchange hack that occurred late November. Cryptopolitan reported that South Korea’s regulators accused the world’s largest exchange by volume of only partially complying with a freeze request from Upbit.

On November 27 hackers stole a significant amount of digital assets from the exchange and later laundered the funds through more than a thousand wallets. That same day, South Korean police and Upbit formally requested Binance to freeze approximately 470 million won worth of stolen Solana tokens traced to its platform.

Binance froze only about 80 million won, or roughly 17% of the requested amount citing the need for “fact-checking” before taking any action. South Korean authorities were notified that the freeze had been completed around midnight on November 27, 15 hours after the initial request was submitted.

Upbit later disclosed the perpetrators had exploited a vulnerability in its Solana-based hot wallet, siphoning funds from 24 Solana ecosystem tokens in less than an hour. Losses from the attack were estimated at 44.5 billion won, equivalent to about $33 million at the time. 

The exchange later confirmed that all customer losses would be covered using internal reserves, seeking to reassure users amid heightened concerns about platform security.

In a separate but related blockchain security event, blockchain security firm CertiK detected suspicious Tornado Cash deposits linked to anomalous withdrawals from 0G Labs on Friday. 

An unidentified party made a withdrawal of approximately 520,000 0G tokens, valued at around $516,000, using a privileged emergencyWithdraw function. The funds were first transferred to the address 0x617E8e3C07bEF319F26C1682270A19e89Ea2bf75.

Get seen where it counts. Advertise in Cryptopolitan Research and reach crypto’s sharpest investors and builders.

Market Opportunity
ZeroLend Logo
ZeroLend Price(ZERO)
$0.000008434
$0.000008434$0.000008434
-1.37%
USD
ZeroLend (ZERO) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime

SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime

The post SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime appeared on BitcoinEthereumNews.com. In a pivotal week for crypto infrastructure, the Solana network
Share
BitcoinEthereumNews2025/12/16 20:44
Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Share
BitcoinEthereumNews2025/09/18 00:41