Web3.0 Wallet遭遇模态钓鱼攻击 警惕伪装DApp诱骗

New Phishing Attack on Web3.0 Mobile Wallets: Modal Window Deception

Recently, a new type of phishing technique targeting Web3.0 mobile Wallets has drawn the attention of security experts. This attack method is known as "Modal Phishing" and primarily exploits modal windows in mobile Wallet applications to mislead users.

Attackers send false information to mobile Wallets, masquerading as legitimate decentralized applications (DApps), and display misleading content in the Wallet's modal window, luring users into approving malicious transactions. This phishing technique has currently been widely used across multiple platforms.

Revealing the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

The Principle of Modal Phishing Attacks

Modal windows are common user interface elements in mobile applications, typically used to display important information such as transaction requests. In Web3.0 Wallets, these windows showcase transaction details, the identity of the requester, and other key information for users to review and decide whether to approve.

However, research has found that certain UI elements within these modal windows can be controlled by attackers, enabling phishing attacks. There are two main vulnerabilities present:

  1. When using the Wallet Connect protocol, attackers can control the information displayed by the DApp, such as name, icon, etc.
  2. In some Wallet applications, attackers can manipulate the display of smart contract information.

Revealing the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

Typical Attack Cases

Case 1: DApp phishing through Wallet Connect

Wallet Connect is a popular open-source protocol used to connect user wallets with DApps. During the pairing process, the wallet displays metadata provided by the DApp, including name, website, icon, etc. However, this information has not been verified.

Attackers can forge this information, impersonating well-known DApps (such as Uniswap) to lure users into connecting. Once the connection is established, the attackers can send malicious transaction requests to steal users' funds.

Unveiling the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

Case 2: MetaMask Smart Contract Information Phishing

Wallets like MetaMask display the method names of smart contracts on the transaction approval interface. Attackers can register smart contract methods with misleading names (such as "SecurityUpdate"), making the transaction request appear as if it comes from the official security update of the wallet.

By combining forged DApp information, attackers can create highly deceptive transaction requests, enticing users to approve malicious actions.

Unveiling the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

Prevention Recommendations

  1. Wallet developers should always treat externally provided data as untrusted and validate all information presented to users.

  2. Protocols like Wallet Connect should consider adding a verification mechanism for DApp information.

  3. Wallet applications should monitor and filter sensitive vocabulary that may be used for phishing.

  4. Users should remain vigilant when approving any unknown transaction requests and carefully verify the transaction information.

  5. Wallet providers should strengthen the security design of key UI elements such as modal windows.

Revealing the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

In summary, with the development of the Web3.0 ecosystem, both users and developers need to enhance their security awareness to collectively address the evolving cyber threats. It is crucial to maintain a moderate level of suspicion and caution for every transaction request.

Revealing the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 3
  • Share
Comment
0/400
LiquidationAlertvip
· 23h ago
Traps are emerging endlessly.
View OriginalReply0
ServantOfSatoshivip
· 23h ago
Beware of counterfeit phishing coin thefts.
View OriginalReply0
LiquidationWatchervip
· 07-03 15:00
Another new type of scam targets wallets.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)