💞 #Gate Square Qixi Celebration# 💞
Couples showcase love / Singles celebrate self-love — gifts for everyone this Qixi!
📅 Event Period
August 26 — August 31, 2025
✨ How to Participate
Romantic Teams 💑
Form a “Heartbeat Squad” with one friend and submit the registration form 👉 https://www.gate.com/questionnaire/7012
Post original content on Gate Square (images, videos, hand-drawn art, digital creations, or copywriting) featuring Qixi romance + Gate elements. Include the hashtag #GateSquareQixiCelebration#
The top 5 squads with the highest total posts will win a Valentine's Day Gift Box + $1
Recently, a Web3 user shared his experience of having his Wallet stolen, hoping to raise awareness among everyone. The user stated that he originally received an invitation to experience a gaming project. At first, out of caution, he downloaded it but did not install it. However, the next day, curiosity got the better of him, and he decided to install the program.
After the installation was completed, the user found only two compressed files, which were audio and video files, but not the expected game executable file. When he tried to contact the person who recommended the project, he did not receive a response. Subsequently, he sought help on Discord but was unable to get a valid answer.
Unfortunately, before going to bed that night, the user discovered that his Wallet had been compromised, and approximately 1300U in assets had been transferred away. In retrospect, the user regretfully stated that during that time, he had also copied the mnemonic phrase and had the opportunity to transfer the assets, but did not act in time.
According to the blockchain explorer, the stolen funds were transferred to a specific address via the Symbiosis cross-chain bridge, and then dispersed into three different Wallets. Two of the Wallet addresses are relatively new, with their creation time coinciding with the Twitter release time of a suspicious project. The other address can be traced back six months and has interacted with recharge addresses of multiple centralized exchanges.
This incident has sounded the alarm for us:
1. Remain highly vigilant against programs of unknown origin, especially applications involving wallet operations.
2. Do not easily disclose or enter your mnemonic phrase in an insecure environment.
3. When an anomaly is detected, immediate action should be taken to transfer assets to a secure address.
4. Regularly check device security and update protective software in a timely manner.
5. Use hardware Wallets and other more secure storage methods to protect high-value assets.
The Web3 world is full of opportunities but also harbors risks. Stay vigilant and act with caution to safely explore and develop in this emerging field.