00:59
Slow Mist Cosine: If you have not received the Monad Airdrop, it is recommended to check the Airdrop receiving Address, as there may be a session hijacking vulnerability attack.
According to ChainCatcher news and Slow Fog's Yu Xian, some users may not have received the Monad Airdrop. It is recommended to check whether the Wallet Address bound on the Airdrop claiming page claim.monad.xyz is the expected address. Yu Xian stated that if the bound address is not what the user expected, they may have encountered a problem similar to Onefly's (@Onefly) — the Wallet Address being bound to a Hacker's address, causing the official Airdrop distribution to go to the Hacker. Yu Xian revealed that a white hat hacker had previously synced a related vulnerability with him, which has a precondition: if someone hijacks the user's session on the Monad Airdrop claiming page, they can change the claiming Wallet Address without further confirmation.

