🔥 Gate Square Event: #PostToWinNIGHT 🔥
Post anything related to NIGHT to join!
Market outlook, project thoughts, research takeaways, user experience — all count.
📅 Event Duration: Dec 10 08:00 - Dec 21 16:00 UTC
📌 How to Participate
1️⃣ Post on Gate Square (text, analysis, opinions, or image posts are all valid)
2️⃣ Add the hashtag #PostToWinNIGHT or #发帖赢代币NIGHT
🏆 Rewards (Total: 1,000 NIGHT)
🥇 Top 1: 200 NIGHT
🥈 Top 4: 100 NIGHT each
🥉 Top 10: 40 NIGHT each
📄 Notes
Content must be original (no plagiarism or repetitive spam)
Winners must complete Gate Square identity verification
Gat
North Korean developers hijacked dormant Waves repositories, embedding code to steal credentials in wallet updates.
PANews reported on June 19 that a North Korean developer gained elevated privileges in the Waves Protocol’s Keeper-Wallet codebase. The account “AhegaoXXX” has been pushing updates to the dormant codebase since May 2025, and this account has been confirmed to be linked to a North Korean IT outsourcing organization. Code reviews revealed that a certain submission added functionality to send wallet logs and runtime errors to an external database, potentially stealing mnemonic phrases and Private Keys. Although this branch has not been merged, the attacker has released six long-unupdated malicious NPM packages by controlling the account of former Waves engineer Maxim Smolyakov. The security report indicates that this incident shows North Korean hackers shifting from ordinary outsourcing infiltration to direct control of code repositories. It is recommended that development teams strengthen supply chain protection, including auditing contributor permissions, cleaning up dormant accounts, and monitoring repository redirection. Currently, the download volume of the affected software is low, but there is a risk of credential leakage for Waves users updating the Keeper-Wallet.