Scan to download
BTC $79,094.36 -2.43%
ETH $2,228.37 -2.03%
BNB $670.27 -1.37%
XRP $1.44 -3.30%
SOL $89.21 -2.93%
TRX $0.3519 -0.20%
DOGE $0.1125 -3.12%
ADA $0.2616 -3.32%
BCH $425.56 -2.24%
LINK $10.08 -3.52%
HYPE $43.59 -5.55%
AAVE $92.76 -5.35%
SUI $1.09 -7.68%
XLM $0.1550 -4.31%
ZEC $513.84 -5.98%
BTC $79,094.36 -2.43%
ETH $2,228.37 -2.03%
BNB $670.27 -1.37%
XRP $1.44 -3.30%
SOL $89.21 -2.93%
TRX $0.3519 -0.20%
DOGE $0.1125 -3.12%
ADA $0.2616 -3.32%
BCH $425.56 -2.24%
LINK $10.08 -3.52%
HYPE $43.59 -5.55%
AAVE $92.76 -5.35%
SUI $1.09 -7.68%
XLM $0.1550 -4.31%
ZEC $513.84 -5.98%

fog

Slow Fog: TRON users should be vigilant against phishing activities involving counterfeit TronLink Chrome extensions

SlowMist has issued a security warning stating that a high-risk phishing activity targeting TRON wallet users has been discovered. Attackers created a fake Chrome extension for the TronLink wallet, using Unicode bidirectional control characters and Cyrillic homographs to disguise the brand name. After installation, the extension loads a complete phishing page through a remote iframe, forming a "shell-core separation" credential theft chain.The malicious extension name uses homographs for disguise, and its Chrome Store page inherits the high user count and positive reviews of the real extension, lowering the review threshold. There is very little local code, only loading remote pages, making static analysis nearly impossible to detect malicious behavior. The remote phishing page perfectly replicates the official TronLink web wallet interface, stealing mnemonic phrases, private keys, Keystore files, and passwords, and relaying them in real-time via a Telegram Bot.Built-in anti-analysis features disable right-click, developer tools, drag-and-drop, and printing, and redirect based on the geographic and language settings of Russian users to evade detection. SlowMist recommends immediately uninstalling suspicious extensions, clearing local storage, checking for abnormal traffic, and if credentials have been entered, creating a new wallet and transferring assets immediately.

Infographic: Crypto.com’s 25 Web3 Business Partners: Full-stack Expansion from Payment Infrastructure to Brand Ecosystem

The Web3 asset data platform RootData has outlined the business partners of Crypto.com. Its strategy goes beyond exchange expansion, advancing through multiple paths such as payments, custody, and brand collaborations, aiming to create a comprehensive digital asset platform covering both institutional and consumer ends. * **Payment Infrastructure**: Crypto.com has integrated with Stripe, Mastercard, Yuno, TripleA, Lynq, etc., covering the complete link from checkout crypto payments to institutional-level real-time clearing. * **Institutional Trading and Custody**: VerifiedX has entrusted Crypto.com with institutional custody for its $1.5 billion digital assets; CoinRoutes provides smart order routing, CryptoStruct connects high-frequency trading, and Doblox offers AI trading terminals. * **Corporate Crypto Treasury**: Crypto.com collaborates with several Nasdaq-listed companies executing treasury strategies, including SOL Strategies, Sharps Technology, and IP Strategy. On the brand side, Crypto.com has formed deep ties with top sports IPs—renewing its partnership with **F1** until 2030 and sponsoring the Miami Grand Prix, as well as **UEFA Champions League**, **UFC**, **NBA Philadelphia 76ers**, **AFL**, and South American CONMEBOL; the long-term partnership with the LeBron James Family Foundation marks an extension of its brand collaboration into the celebrity family philanthropy sector. Additionally, Crypto.com has signed collaborations in the Middle East with Dubai Islamic Bank, DMCC, e& money, Tawasal Al Khaleej super app, and Emarat gas station network, becoming an important participant in the local digital asset compliance ecosystem. Related compilation: 【[Crypto.com Web3 Partner Network Compilation (Continuously Updated)](https://cn.rootdata.com/Archives/detail/Crypto.com%20Crypto%20Business%20Partner?k=NDc0MTU3)】 Cryptocurrency projects actively showcasing their partner networks have become a key way to enhance transparency and market trust. It is reported that RootData welcomes Web3 project parties to [claim data](https://www.rootdata.com/Projects/submit?ft=claimApply) and continues to track and open more project business relationship disclosure channels. The platform has continuously released multiple issues of the cryptocurrency project ecosystem map, nominating Web3 ecosystem partners for upstream clients such as Visa, Stripe, and Coinbase. **If you wish to nominate your project in future ecosystem maps, please fill out the 【[RootData 2026 Industry Ecosystem Mapping](https://forms.gle/tWArmXcpSfZJkh1r8)】 form to supplement your important clients and partners.**
Infographic: Crypto.com’s 25 Web3 Business Partners: Full-stack Expansion from Payment Infrastructure to Brand Ecosystem

Slow Fog: Pay attention to checking for malicious versions of axios and the exposure risk of global installation history for OpenClaw npm

Slow Fog has once again issued a security reminder stating to pay attention to checking for malicious versions of axios and the exposure risk of OpenClaw npm global installation history. axios@1.14.1 and axios@0.3.4 have been confirmed as malicious versions, both of which have injected the dependency plain-crypto-js@4.2.1, delivering cross-platform malicious payloads through the postinstall script.The impact of OpenClaw is assessed based on scenarios: source code builds are not affected, as the locked versions in the lock file are 1.13.5/1.13.6; however, users who installed via npm install -g openclaw@2026.3.28 face historical exposure risks due to the presence of optionalDependencies.axios@^1.7.4 in the dependency chain, which may resolve to axios@1.14.1 during the time window when the malicious version is still online. Currently, npm has reverted the resolution to axios@1.14.0, but environments that were installed during the attack window are still advised to be checked. Slow Fog has provided inspection commands and IoC paths for various platforms; if the plain-crypto-js directory is found, even if the package.json has been cleaned, it should still be regarded as high-risk execution traces. It is recommended that affected hosts immediately rotate credentials and conduct host-side inspections. Previously, Slow Fog founder Yu Xian reminded that OpenClaw version 3.28 may introduce a toxic version of axios, and users need to urgently check.
app_icon
ChainCatcher Building the Web3 world with innovations.