🎉 [Gate 30 Million Milestone] Share Your Gate Moment & Win Exclusive Gifts!
Gate has surpassed 30M users worldwide — not just a number, but a journey we've built together.
Remember the thrill of opening your first account, or the Gate merch that’s been part of your daily life?
📸 Join the #MyGateMoment# campaign!
Share your story on Gate Square, and embrace the next 30 million together!
✅ How to Participate:
1️⃣ Post a photo or video with Gate elements
2️⃣ Add #MyGateMoment# and share your story, wishes, or thoughts
3️⃣ Share your post on Twitter (X) — top 10 views will get extra rewards!
👉
GoPlus security reminder: Please check your Wallet as soon as possible to see if Hacker has transferred Gas in and promptly transfer out your assets
BlockBeats news, on February 14th, GoPlus has identified the relevant Address of the attacker and blacklisted them all. It is worth noting that the attacker used a Wallet starting with 0x9AE to send Gas to multiple Addresses, but has not yet transferred Tokens. Users still have the opportunity to transfer assets to a secure Wallet. Aggregation Address 1: 0x49add3e8329f2a2f507238b0a684d03eae205aab Aggregation Address 2: 0x7831d05afc72a10bd475eb4777680b4e9204695a Aggregation Address 3: 0xb312a2c9ab9700dac49798f457b4c28e28f1c4fc Aggregation Address 4: 0xc657b6e6c59af5bcff4de626dab52832e77d2996 Attacker's Gas distribution Address: 0x9AEf1CA082c17f9D52Aa98ca861b50c776dECC35 Users are advised to stay vigilant, regularly check Wallet security. It is recommended to install the GoPlus security plugin to monitor transaction risks in real-time; if users have interacted with the above attacker Addresses, they can contact GoPlus to provide information and seek security assistance.