A notable Web3 community member recently fell victim to an account compromise. Hackers gained unauthorized access and changed the display name to zkPqss. During the account recovery process, the account was subsequently suspended—potentially by automated security measures triggered during the compromise. This incident highlights a common vulnerability in crypto communities: attackers often target established accounts to exploit their credibility for phishing schemes or malware distribution. The suspension, while protective, created an additional layer of frustration for the legitimate owner attempting to regain control. Such account takeovers underscore the critical importance of enabling two-factor authentication (2FA), using hardware wallets for sensitive transactions, and maintaining strong, unique passwords. Community members and platform support teams are actively investigating this case to help restore legitimate access and prevent similar incidents.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
8 Likes
Reward
8
3
Repost
Share
Comment
0/400
0xInsomnia
· 12-21 13:53
Here we go again, my account has been hacked, and this time even the name has been changed... Seriously, friends who don't enable 2FA should wake up.
View OriginalReply0
StrawberryIce
· 12-21 13:52
Another large account has been hacked, this is happening really frequently, we need to check if our 2FA is enabled.
View OriginalReply0
WalletDoomsDay
· 12-21 13:29
Another account theft, this time luck is really bad, locking the account is even harder to deal with.
A notable Web3 community member recently fell victim to an account compromise. Hackers gained unauthorized access and changed the display name to zkPqss. During the account recovery process, the account was subsequently suspended—potentially by automated security measures triggered during the compromise. This incident highlights a common vulnerability in crypto communities: attackers often target established accounts to exploit their credibility for phishing schemes or malware distribution. The suspension, while protective, created an additional layer of frustration for the legitimate owner attempting to regain control. Such account takeovers underscore the critical importance of enabling two-factor authentication (2FA), using hardware wallets for sensitive transactions, and maintaining strong, unique passwords. Community members and platform support teams are actively investigating this case to help restore legitimate access and prevent similar incidents.