Futures
Hundreds of contracts settled in USDT or BTC
TradFi
Gold
One platform for global traditional assets
Options
HOT
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Participate in events to win generous rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
New
Trade on-chain assets and enjoy airdrop rewards!
Futures Points
New
Earn futures points and claim airdrop rewards
Investment
Simple Earn
Earn interests with idle tokens
Auto-Invest
Auto-invest on a regular basis
Dual Investment
Buy low and sell high to take profits from price fluctuations
Soft Staking
Earn rewards with flexible staking
Crypto Loan
0 Fees
Pledge one crypto to borrow another
Lending Center
One-stop lending hub
VIP Wealth Hub
Customized wealth management empowers your assets growth
Private Wealth Management
Customized asset management to grow your digital assets
Quant Fund
Top asset management team helps you profit without hassle
Staking
Stake cryptos to earn in PoS products
Smart Leverage
New
No forced liquidation before maturity, worry-free leveraged gains
GUSD Minting
Use USDT/USDC to mint GUSD for treasury-level yields
Hackers Forge Google Play Store Page to Launch Cryptocurrency Mining and Wallet Hijacking Attacks Against Brazilian Users
Gate News, March 22 — According to SecureList, hackers recently launched Android malware attacks in Brazil by creating phishing pages that imitate the Google Play Store. All known victims are located in Brazil.
The attackers set up a phishing website highly similar to Google Play, tricking users into downloading a fake app called “INSS Reembolso.” Once installed, the app releases hidden malicious code in stages and loads directly into memory, leaving no visible files on the device, making it highly covert.
One of the core functions of the malware is cryptocurrency mining. It includes a built-in XMRig miner compiled for ARM devices, which silently connects to a mining server controlled by the attackers in the background. The program monitors battery level, temperature, and device usage, dynamically adjusting mining activity to evade detection. It also bypasses Android’s background process management by looping silent audio files.
Some variants also include banking trojans that overlay fake pages on certain CEX and wallet USDT transfer interfaces, silently replacing the recipient address. Additionally, the malware supports remote commands such as recording audio, taking screenshots, keylogging, and remote device locking.