Wu said he learned that @evilcos tweeted to remind users who use Restake to pay attention to the risk of phishing. The well-known phishing group Angel Drainer wrote malicious code targeting the queueWithdrawal (0xf123991e) function of the EigenLayer Strategy Manager contract. If the user signs the queueWithdrawal function on the phishing website, his or her staking reward on EigenLayer will be transferred to the withdrawer specified by the phisher. Please operate with caution to avoid losses.