Futures
Hundreds of contracts settled in USDT or BTC
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
#数字资产市场动态 Security vulnerabilities in smart contracts are being maliciously exploited, and the problem is much more serious than imagined.
DeadLock ransomware has already begun dynamically rotating server addresses through smart contracts, rendering traditional detection and protection measures ineffective. According to the latest warning from Group-IB, this is not an isolated incident—more attackers are researching how to abuse smart contract infrastructure on other blockchains. The Polygon network has become the first large-scale exploited case.
The root of the problem lies in the dual nature of decentralized architecture: while it should enhance resistance to censorship, control is deeply embedded in the underlying network, making it impossible for teams to directly shut down or intervene even if malicious nodes are identified. This is similar to UNC5342’s approach of using blockchain as a repository for malicious code—attack methods are becoming increasingly sophisticated.
Future blockchain security challenges may have only just begun. The abuse of smart contracts could evolve into a long-term new threat.