Foresight News reports that the account abstraction wallet Holdstation has confirmed a recent security incident. The extent and scope of the impact are still being assessed, and the team is actively investigating. The official will notify affected users as soon as possible and asks everyone to stay calm and patiently wait for the latest updates and remediation steps. Meanwhile, Holdstation recommends users transfer their assets to a secure wallet to protect their funds.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Google Warning: Set a 2029 timeline for migrating to post-quantum cryptography for the ECDLP-256 protocol, on which most blockchains rely and that has known vulnerabilities.
Gate News update: On March 31, Google’s Quantum AI team said in its latest blog post that the ECDLP-256 protocol, which most blockchain technologies and cryptocurrencies rely on, has security vulnerabilities. While viable solutions such as post-quantum cryptography (PQC) already exist, implementation takes time, and the urgency of anti-quantum migration efforts is increasing. Google has set 2029 as the timeline for post-quantum cryptography migration and is working with organizations such as a certain institution, the Stanford Blockchain Research Center, and the Ethereum Foundation to advance the related work.
GateNews20m ago
Steakhouse Financial: The official website is temporarily offline, but the vault is running normally. The attack originated from social engineering that compromised an OVH account.
Steakhouse Financial releases the latest updates on the security incident. The official website is still offline, but the Steakhouse Vaults site is operating normally, and there are no issues with the deposit and withdrawal functions. The attack originated from a phone-based social engineering assault, which resulted in the theft of domain management permissions, and the website’s DNS now points to a malicious IP. The official team has rolled back all changes, and users’ assets are safe.
GateNews1h ago
Gauntlet: After the Resolv Labs exploitation incident, it still has not published a remediation plan and has removed multiple markets
Gauntlet said that after the vulnerability incident, Resolv Labs did not publish a remediation plan, and it plans to pursue funds and perform removal operations across multiple vault markets. The markets that have already been removed involve approximately $11.9 million in liquidity, and a claims contract will be set up for liquidity providers going forward.
GateNews1h ago
An American man was indicted for attacking Uranium Finance, with $54 million at stake and a maximum of 30 years in prison.
March 30, U.S. prosecutors charged Jonathan Spalletta of Maryland, accusing him of repeatedly attacking the decentralized exchange Uranium Finance since 2021, involving $54 million. Spalletta faces computer fraud and money laundering charges, with a maximum total sentence of up to 30 years in prison. He allegedly profited illegally by manipulating transaction processes and used the proceeds to buy collectible items. Prosecutors emphasized that crypto assets are also protected by law.
GateNews5h ago
Malware Infiniti Stealer targets Mac users’ encrypted wallets by forging verification codes
GoPlus Security reports that a type of malware called Infiniti Stealer carries out attacks against Mac users by impersonating a Cloudflare verification page, stealing crypto wallets and credentials. The malware bypasses security mechanisms by manually executing commands; it can steal browser data and developer keys and has the ability to evade detection.
GateNews16h ago