Slow Mist Cosine: Recommended to clear browser cache to eliminate Ledger malicious code
The founder of SlowMist, Yu Xian, posted on social media regarding the Ledger vulnerability. 1. The poisoning problem of the Ledger module ledgerhq/connect-kit has been basically resolved, but the poisoned code may still be cached in the browser. If not sure, be sure to clear the browser cache (including the built-in browser cache in the wallet app); 2. Users must confirm the content of each unsigned transaction in the wallet multiple times; 3. The Ledger wallet itself is not affected; 4. The details of this supply chain attack are intriguing, and such hunters are not rare in this dark forest; 5. Tether acted in a timely manner and froze the USDT profits from phishing. In comparison, USDC continues to ignore the issue.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Subscribe to ETH Earn products for dual rewards exclusive for VIPs— Enjoy up to 10% APR and trade to unlock an additional pool of 50,000 USDT
Bitget Spot Margin Announcement on Suspension of SANTOS/USDT, MYRO/USDT, DUSK/USDT, PHB/USDT, ALPINE/USDT Margin Trading Services
CandyBomb x RAVE: Trade futures to share 200,000 RAVE!
Bitget TradFi: Trade gold, forex, and more assets in one account
