wat is des
hype is increasing, now I managed to farm 1m in xp and reach position 400 in the rank https://hylo.so/leverage?ref=QGAHPP
update
rank 150
6m xp farmed
5.5k profit so far (This profit is not yet the airdrop, this is just for holding xsol)
https://hylo.so/leverage?ref=QGAHPP
rank 150
6m xp farmed
5.5k profit so far (This profit is not yet the airdrop, this is just for holding xsol)
https://hylo.so/leverage?ref=QGAHPP
ā¤11š6š2
Forwarded from Arcane Gems (Carranza)
they really created a coin to fund this
wat is des
they posted a coin https://x.com/UniswapFND/status/1962937399908171805 https://zora.co/coin/base:0xf41124e1c326e5044d0358d977ca02c0c5276649
both pumping, creator coin is the pair/coin, duni is the coin
Forwarded from infinityhedge
*HACKERS HIJACK NPM PACKAGES IN WHAT IS BEING CALLED THE LARGEST SUPPLY CHAIN ATTACK IN HISTORY
*IF YOU USE A HARDWARE WALLET, PAY ATTENTION TO EVERY TRANSACTION BEFORE SIGNING
*IF YOU DON'T USE A HARDWARE WALLET, REFRAIN FROM MAKING ANY ON-CHAIN TRANSACTIONS FOR NOW: LEDGER CTO
<@INFINITYHEDGE> ā ļø
*The malicious code only impacts individuals accessing the compromised applications over the web, monitoring for cryptocurrency addresses and transactions that are then redirected to attacker-controlled wallet addresses. This causes the transaction to be hijacked by the attackers rather than being sent to the intended address.
*The malware operates by injecting itself into the web browser, monitoring Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash wallet addresses or transfers. On network responses with crypto transactions, it replaces the destinations with attacker-controlled addresses and hijacks transactions before they're signed.
*What makes it dangerous is that it operates at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users' apps believe they are signing: bleepingcomputer ā ļø
*IF YOU USE A HARDWARE WALLET, PAY ATTENTION TO EVERY TRANSACTION BEFORE SIGNING
*IF YOU DON'T USE A HARDWARE WALLET, REFRAIN FROM MAKING ANY ON-CHAIN TRANSACTIONS FOR NOW: LEDGER CTO
<@INFINITYHEDGE> ā ļø
*The malicious code only impacts individuals accessing the compromised applications over the web, monitoring for cryptocurrency addresses and transactions that are then redirected to attacker-controlled wallet addresses. This causes the transaction to be hijacked by the attackers rather than being sent to the intended address.
*The malware operates by injecting itself into the web browser, monitoring Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash wallet addresses or transfers. On network responses with crypto transactions, it replaces the destinations with attacker-controlled addresses and hijacks transactions before they're signed.
*What makes it dangerous is that it operates at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users' apps believe they are signing: bleepingcomputer ā ļø
ā¤2š1