🔥 Gate 广场活动|#发帖赢Launchpad新币KDK 🔥
KDK|Gate Launchpad 最新一期明星代币
以前想参与? 先质押 USDT
这次不一样 👉 发帖就有机会直接拿 KDK!
🎁 Gate 广场专属福利:总奖励 2,000 KDK 等你瓜分
🚀 Launchpad 明星项目,走势潜力,值得期待 👀
📅 活动时间
2025/12/19 12:00 – 12/30 24:00(UTC+8)
📌 怎么参与?
在 Gate 广场发帖(文字、图文、分析、观点都行)
内容和 KDK上线价格预测/KDK 项目看法/Gate Launchpad 机制理解相关
帖子加上任一话题:#发帖赢Launchpad新币KDK 或 #PostToWinLaunchpadKDK
🏆 奖励设置(共 2,000 KDK)
🥇 第 1 名:400 KDK
🥈 前 5 名:200 KDK / 人(共 1,000 KDK)
🥉 前 15 名:40 KDK / 人(共 600 KDK)
📄 注意事项
内容需原创,拒绝抄袭、洗稿、灌水
获奖者需完成 Gate 广场身份认证
奖励发放时间以官方公告为准
Gate 保留本次活动的最终解释权
某合规平台社工诈骗案:加拿大骗子冒充客服盗取200万美元
Source: CryptoNewsNet Original Title: Fake Coinbase support scammer allegedly stole $2M from users Original Link: https://cryptonews.net/news/security/32203152/ An alleged scammer posing as a support desk worker has reportedly stolen around $2 million in crypto from users, according to blockchain sleuth ZachXBT.
In a Monday X post, ZachXBT claimed that he had managed to pinpoint the identity of the alleged scammer after cross referencing Telegram group chat screen shots, social media posts and wallet transactions.
ZachXBT alleged that the “Canadian threat actor” had “stolen $2M+ via support impersonation social engineering scams in the past year blowing the funds on rare social media usernames, bottle service, & gambling.”
The Canadian allegedly deployed social engineering tactics to dupe users into believing he worked for the exchange. In his post, ZachXBT shared a leaked video of the alleged scammer on the phone with the victim offering fake customer support.
While the specifics were not detailed, social engineering generally consists of scammers posing as someone from a legitimate organisation to gain trust and elicit private data from unsuspecting victims, or to make dubious transactions.
The alleged scammer attempted to hide their tracks by continually buying “expensive Telegram usernames” and deleting old accounts. However, ZachXBT claimed it was easy to pinpoint their identity and movements due to constant gloating on social media, and posted screenshots of numerous examples of “stories and selfies flaunting his lifestyle with little regard for opsec and was also caught simping for eGirls.”
ZachXBT even claimed to worked out the alleged scammer’s home address using publicly available information, but did not share them due to X’s terms of service.
How can users protect themselves against social engineering?
While seasoned crypto veterans know the best practices to protect themselves after years of trial and error, newcomers often need a heads-up.
It’s important for users to be very vigilant about safe-keeping their private data, don’t use the same password for multiple services and keep significant holdings off an exchange in a hardware wallet.
As a rule of thumb, it’s important to never click on links sent to you or respond to cold calls. Always contact customer support directly through verified avenues such as on the actual website or app.
Additionally, help desk workers will never ask for seed phrases or login credentials, share private wallets to send funds to, or re-direct conversations over to social media apps like Telegram.