SlowMist Cosine: If you have not received the Monad airdrop, it is recommended to check the airdrop claiming address, as there may be a suspected session hijacking vulnerability attack.
According to ChainCatcher, as disclosed by SlowMist Cosine, some users may not have received the Monad airdrop. It is recommended to check whether the wallet address bound on the airdrop claim page claim.monad.xyz is the expected address.
Cosine stated that if the bound address is not the user's expected one, they may have encountered a problem similar to that of user Onefly (@Onefly)—the wallet address was bound to a hacker's address, causing the official airdrop to be distributed to the hacker. According to Cosine, a white hat hacker previously reported a related vulnerability, which has a prerequisite: if someone hijacks a user's session on the Monad airdrop claim page, they can change the claim wallet address without further confirmation.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Bitget Launchpool project MON is now open for participation; stake BGB or MON to unlock 25 million MON.
Bitwise announces its DOGE ETF is coming soon
Spot SOL ETF saw a net inflow of $57.99 million yesterday
