SlowMist Cosine: If you have not received the Monad airdrop, it is recommended to check the airdrop claiming address, as there may be a suspected session hijacking vulnerability attack.
According to ChainCatcher, as disclosed by SlowMist Cosine, some users may not have received the Monad airdrop. It is recommended to check whether the wallet address bound on the airdrop claim page claim.monad.xyz is the expected address.
Cosine stated that if the bound address is not the user's expected one, they may have encountered a problem similar to that of user Onefly (@Onefly)—the wallet address was bound to a hacker's address, causing the official airdrop to be distributed to the hacker. According to Cosine, a white hat hacker previously reported a related vulnerability, which has a prerequisite: if someone hijacks a user's session on the Monad airdrop claim page, they can change the claim wallet address without further confirmation.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Yearn yETH attacked, approximately $3 million worth of ETH flows into Tornado Cash
The on-chain holdings value of US spot Bitcoin ETFs has reached $150 billions.
El Salvador holds 7,485 bitcoins
Vitalik: Token voting mechanisms are terrible, I hope Zcash can resist their erosion
