亲爱的广场用户们,新年即将开启,我们希望您也能在 Gate 广场上留下专属印记,把 2026 的第一句话,留在 Gate 广场!发布您的 #我的2026第一帖,记录对 2026 的第一句期待、愿望或计划,与全球 Web3 用户共同迎接全新的旅程,创造专属于你的年度开篇篇章,解锁广场价值 $10,000 新年专属福利!
活动时间:2025/12/31 18:00 — 2026/01/15 23:59(UTC+8)
🎁 活动奖励:多发多奖,曝光拉满!
1️⃣ 2026 幸运大奖:从全部有效帖子中随机抽取 1 位,奖励包含:
2026U 仓位体验券
Gate 新年限定礼盒
全年广场首页推荐位曝光
2️⃣ 人气新年帖 TOP 1–10:根据发帖量及互动表现综合排名,奖励包含:
Gate 新年限定礼盒
广场精选帖 5 篇推荐曝光
3️⃣ 新手首帖加成奖励:活动前未在广场发帖的用户,活动期间首次发帖即可获得:
50U 仓位体验券
进入「新年新声」推荐榜单,额外曝光加持
4️⃣ 基础参与奖励:所有符合规则的用户中随机抽取 20 位,赠送新年 F1 红牛周边礼包
参与方式:
1️⃣ 带话题 #我的2026第一条帖 发帖,内容字数需要不少于 30 字
2️⃣ 内容方向不限,可以是以下内容:
写给 2026 的第一句话
新年目标与计划
Web3 领域探索及成长愿景
注意事项
• 禁止抄袭、洗稿及违规
Insider Job? Chainalysis Report Suggests Multichain Attacker Had Inside Connections
On July 6, 2023, the Multichain Protocol was hit by a massive hack, resulting in the loss of over $125 million worth of cryptocurrency. The attack targeted the protocol’s Fantom bridge, resulting in the theft of valuable crypto assets like WBTC, USDC, DAI, wETH, and Link
The stolen funds amounted to a staggering $126 million, with WBTC accounting for $30.9 million, wETH for $13.6 million, and USDC for $57 million. This exploit is one of the biggest crypto hacks on record.
Multichain Attack And Insider Threats
According to a recent report by the analysis and data company Chainalysis, the attack is suspected to be an inside job since Multichain has recently experienced some notable issues unrelated to its protocol design, ing public suspicions that insiders may have carried out this recent exploit
The disappearance of Multichain’s CEO, who is known by the alias Zhaojun, and the subsequent suspension of services for more than 10 chains, including DynoChain, Redlight Chain, and Public Mint has added fuel to this suspicion.
Multichain’s smart contracts are secured by a multi-party computation (MPC) , which functions similarly to a multi-signature wallet . However, like multi-signature wallets, these s are still vulnerable if an attacker possesses sufficient MPC keys.
It is possible that the attacker gained control of Multichain’s MPC keys to pull off this exploit. Interestingly, the attacker did not swap out centrally controlled assets like USDC, which can be frozen by the issuing company (Circle, in the case of USDC), along with the addresses holding those assets
Most hackers typically seek to quickly swap funds for those not vulnerable to those security measures. In total, addresses frozen by Circle and Tether hold approximately $65 million in assets stolen from Multichain.
What’s Next For The Protocol?
After the attack, the Multichain team tweeted that they were beginning an investigation and urged users to pause transactions. A day later, on July 7, the team tweeted that the protocol would be stopping service indefinitely.
Unfortunately, scammers also went on Twitter to spread a “phishing” link and impersonate the Fantom Foundation to trick affected users into claiming an “emergency FTM distribution.”
According to Chainalysis, one way is through rigorous code audits to help developers standardize projects and investors uate protocol viability
While the Multichain hack appears to have resulted from compromised keys rather than faulty code, reputable audit reports often explicitly identify which parts of protocols are vulnerable to private key theft, which may help users better assess risk. Additionally, users of any protocol can research before they transact.
The exploit suffered has left the blockchain community on edge, with many waiting for an official statement from the Multichain team. The team has not made any public pronouncements on the matter, leaving users and investors in the dark about the protocol’s future.
Featured image from Unsplash, chart from TradingView.com