Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Security researchers have successfully null-routed traffic destined for over 550 command-and-control nodes associated with Kimwolf malware since early October 2025. The threat campaign has proven devastating in scale—more than 2 million Android devices have fallen victim to compromise, with attackers primarily exploiting unsecured ADB (Android Debug Bridge) interfaces on unauthorized TV boxes. Once infected, these compromised devices were systematically repurposed and resold into residential proxy networks. This represents a significant supply-chain threat within the broader Web3 infrastructure landscape, as compromised proxies can be weaponized for illicit activities including botnet operations, credential harvesting, and market manipulation. Industry participants should conduct thorough security audits of their network infrastructure and consider implementing stricter device authentication protocols.
---
So funny, 2 million devices compromised and you're still talking about "should be audited"?
操了, the TV box ADB wasn't even turned off, and you still have the nerve to mess around in Web3...
Wait, who is using this proxy network now?🤔 How many projects got caught?
It's the supply chain again... what can you even trust in this circle?
550 C&C nodes, sounds impressive, but at the root, it's still laziness.
卧槽, what if this affects DeFi liquidity pools?
Why do we always have to scramble for security ourselves? Why is the infrastructure so damn bad?
The Web3 infrastructure vulnerabilities are indeed outrageous. It's 2025, and there are still so many exposed ADB interfaces
Proxy networks are being polluted, market manipulation is just a matter of minutes, no wonder scams have been so rampant lately
Honestly, it's still the project teams not taking security seriously, just doing audits for show
Only 550 C&C nodes have been cut off, but who knows how many are still behind the scenes
Wait, are the sold proxies still active now? How can I check if my nodes haven't been compromised?
Running the ADB interface openly is really reckless. How are there still people so careless?
By the way, can those 550 C2s on null-route really be completely cut off? It seems like black market operators can migrate quickly.
The supply chain needs a thorough check of our infrastructure. I'm a bit worried.
---
Once again, the proxy pool is contaminated, making Web3 infrastructure even harder to trust.
---
So, who still uses unencrypted ADB interfaces? Just courting disaster.
---
The supply chain is truly a nightmare; sometimes you don't even know which infected box your proxy is coming from.
---
Null routing 550 C&C servers is truly satisfying, but 2 million devices are already frightening enough.
---
No wonder some network behaviors have been so strange lately; it turns out they are being exploited by black market operators.
---
That's why I say Web3 is still too young; its infrastructure security awareness can't keep up.
---
Who's responsible for these TV boxes? They've been unprotected for so many years?
---
Now they openly sell compromised devices into proxy pools; the industry really needs a reshuffle.
---
No wonder my IP has been flagged recently; it turns out there are so many malicious proxies running.
ADB exposure is really old news, and some people still aren’t taking precautions?
The retail investors are still worried about DeFi flash loans, but little do they know, the proxy layer has been rotten for a long time.
This wave of supply chain attacks directly threatens the entire ecosystem. Who can ensure they haven't used problematic nodes...
Audits are easy to talk about but hard to implement; most are probably just blindfolded.
Cutting off 550 C2 servers—so what? The key is where these devices are headed.
Web3 security is truly an endless arms race, exhausting...
The proxy network has now become the biggest black hole, everyone needs to pay attention
Blocking 550 C2 nodes still doesn't seem enough; fundamentally, the device authentication issue must be addressed
Is Web3 infrastructure this fragile now? It's starting to be hard to hold on
This supply chain attack serves as a huge warning; who still dares to be careless