Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Hyperbridge has released an update on the attack incident; the vulnerability stems from a flaw in the Merkle proof verification logic.
ME News Report, April 13 (UTC+8), the blockchain interoperability protocol Hyperbridge disclosed details of a prior DOT attack incident, with losses of approximately $237k. The root cause of the vulnerability was that the HandlerV1 contract’s VerifyProof() function lacked input validation, failing to verify that leaf_index < leafCount, which allowed attackers to forge Merkle proofs. Using this, the attacker obtained administrator privileges over the bridged DOT token contract on Ethereum, then minted 1 billion bridged DOT tokens (about 2800+ times the legitimate circulating supply of approximately 356k tokens) and cashed out on a decentralized exchange. Hyperbridge stated that they are currently working with security partners to trace the funds, and cross-chain functionality will remain suspended until the investigation is complete. (Source: Foresight News)