Slow Mist Cosine: Recommended to clear browser cache to eliminate Ledger malicious code
The founder of SlowMist, Yu Xian, posted on social media regarding the Ledger vulnerability. 1. The poisoning problem of the Ledger module ledgerhq/connect-kit has been basically resolved, but the poisoned code may still be cached in the browser. If not sure, be sure to clear the browser cache (including the built-in browser cache in the wallet app); 2. Users must confirm the content of each unsigned transaction in the wallet multiple times; 3. The Ledger wallet itself is not affected; 4. The details of this supply chain attack are intriguing, and such hunters are not rare in this dark forest; 5. Tether acted in a timely manner and froze the USDT profits from phishing. In comparison, USDC continues to ignore the issue.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Pantera Partners: Which DePIN projects have real revenue?DePin Case Studies
Some DePIN projects achieve sustainable profitability by solving existing problems, even without relying on the flywheel effect of token economics.
Cardano Partners With Barcelona to Enhance Fan Interaction
XRP Ledger v2.3.0 Upgrade to 2.3.0: Essential Changes and 80% Server Upgrade Milestone
Best New Meme Coins with 1000X Potential: BTFD Coin’s Presale Rally Sparks Buzz While Pudgy Penguins and Osaka Protocol Thrive