Same news in other sources
220 Jan 2021, 16:24
#Defi #Chai #Terra
🎉Terra Chai continues to lead the race beating all the Dapps in cryptosphere on active user metrics
âś…Chai is the most used Dapp by number of 30d active users and 30d transactions
âś…Chai continues to grow at a phenomenal rate and is the fastest growing payments network in South Korea
âś…Chai plans to expand to more geographies in 2021. This includes expansion to geographies like Thailand, Taiwan and Japan
đź–¨Detailed spreadsheet here:
#Defi #Chai #Terra. Terra Chai continues to lead the race beating all the Dapps in cryptosphere on active user metrics.
#Defi #Chai #Terra
🎉Terra Chai continues to lead the race beating all the Dapps in cryptosphere on active user metrics
âś…Chai is the most used Dapp by number of 30d active users and 30d transactions
âś…Chai continues to grow at a phenomenal rate and is the fastest growing payments network in South Korea
âś…Chai plans to expand to more geographies in 2021. This includes expansion to geographies like Thailand, Taiwan and Japan
đź–¨Detailed spreadsheet here: https://docs.google.com/spreadsheets/d/15JnOgodLXumHjleecBxldRo3BJnNd34foQ4e9lh1mqY/edit?usp=sharing
19 Jan 2021, 22:05
📣 It has come to our attention that recently there were some attacks targeting Conflux users. The goal of these attacks was to gain control of the victim’s CFX, FC, and possibly other digital assets.
The attack process is as follows: The victim receives an executable, e.g. “ConDragonPortable.exe”. This fake executable is actually an installer that installs a remote control software (a modified “NetSupport Client”) on the victim’s computer. The installer requires administrator permissions when it is executed. It starts the remote control software directly after the installation and also configures the software to start automatically when the system boots up. Later, the attacker remotely controls the victim’s computer using this installed software and transfers the cryptocurrency from the victim’s wallet. A number of social media accounts were also targeted to facilitate the spread of the malicious executable.
Please be wary and take the necessary precautions to secure your funds, ex. using a hard wallet to keep your crypto safe. We recommend securing your system by making sure your operating system is up-to-date and you have proper antivirus and firewall software installed. Furthermore, please make sure to only download files from official sources.
❗️Conflux employees will never ask for your private key or wallet seed phrase and we will never send you any executables in private messages. When having doubts, please double-check with us.
It has come to our attention that recently there were some attacks targeting Conflux users.
📣 It has come to our attention that recently there were some attacks targeting Conflux users. The goal of these attacks was to gain control of the victim’s CFX, FC, and possibly other digital assets.
The attack process is as follows: The victim receives an executable, e.g. “ConDragonPortable.exe”. This fake executable is actually an installer that installs a remote control software (a modified “NetSupport Client”) on the victim’s computer. The installer requires administrator permissions when it is executed. It starts the remote control software directly after the installation and also configures the software to start automatically when the system boots up. Later, the attacker remotely controls the victim’s computer using this installed software and transfers the cryptocurrency from the victim’s wallet. A number of social media accounts were also targeted to facilitate the spread of the malicious executable.
Please be wary and take the necessary precautions to secure your funds, ex. using a hard wallet to keep your crypto safe. We recommend securing your system by making sure your operating system is up-to-date and you have proper antivirus and firewall software installed. Furthermore, please make sure to only download files from official sources.
❗️Conflux employees will never ask for your private key or wallet seed phrase and we will never send you any executables in private messages. When having doubts, please double-check with us.