🎉 Congratulations to the following users for winning in the #Gate CBO Kevin Lee# - 6/26 event!
KaRaDeNiZ, Sakura_3434, Anza01, asiftahsin, GateUser-d0654db3, milaluxury, Ryakpanda, 静.和, milaluxury, 币大亨1
💰 Each winner will receive $5 Points!
🎁 Rewards will be distributed within 14 working days. Please make sure to complete identity verification to be eligible.
📌 Event details: https://www.gate.com/post/status/11782130
🙏 Thank you all for your enthusiastic participation — more exciting events are on the way!
Kelp DAO security incident analysis: The attacker bypassed 2-FA verification by impersonating the Kelp team to convince GoDaddy's customer support.
BlockBeats News, on July 29th, Liquiditystakeprotocol Kelp DAO reviewed the previous security incident: at 22:30 on July 22nd, Kelp's dApp began displaying malicious Wallet activity transactions, attempting to steal user funds. The Kelp team responded immediately by locking the domain servers, restoring ownership access, and resolving the issue. The attacker successfully convinced GoDaddy's customer support by impersonating the Kelp team and bypassing 2-FA. The Kelp team is taking preventive measures, including transferring to another domain registrar and strengthening alerts for abnormal UI behavior. A few users reported financial losses due to UI attacks, and the Kelp team is providing support.