Risk Warning: Beware of illegal fundraising in the name of 'virtual currency' and 'blockchain'. — Five departments including the Banking and Insurance Regulatory Commission
Information
Discover
Search
Login
简中
繁中
English
日本語
한국어
ภาษาไทย
Tiếng Việt
BTC
ETH
HTX
SOL
BNB
View Market
Loot millions of dollars, be wary of Ice Phishing, an upgraded version of Web3.0 unique phishing attack
CertiK
特邀专栏作者
2023-01-23 10:30
This article is about 1642 words, reading the full article takes about 3 minutes
Ice Phishing has already caused millions of dollars in property damage in the Web3.0 field.

baDyVyeadoxZdy0X2LUILVr84WoD9jrnK2Pyp3t0.jpeg

Among the many types of fraud, phishing attacks are one of the most common methods used by fraudsters.

However, in the field of Web3.0, there are not only phishing attacks, but also a kind of "Ice Phishing" attack that will pose a major threat to the community.

Earlier in 2022, Microsoft first explained the specific form of this type of attack in a blog-the scammer does not need to deceive the user's private key and mnemonic, but directly induces the user to approve the operation of transferring assets to the scammer's wallet.

So far, Ice Phishing has caused millions of dollars in property damage in the Web3.0 field.

What is Ice Phishing?

Ice Phishing is a type of attack unique to the Web3.0 world, where users are tricked into signing permissions, allowing fraudsters to directly consume assets within the user's account.

This differs from traditional phishing attacks, which are a type of social engineering attack and are often used to steal user data, including login credentials and wallet or asset information such as private keys or passwords.

Compared with this, Ice Phishing poses a greater threat to Web3.0 users-interaction with DeFi protocols requires users to grant permissions, and fraudsters only need to convince users that the malicious addresses they approve are legitimate. Once a user approves a fraudster to spend their assets, there is a risk that the account will be stolen.

On-chain Ice Phishing

The first stage of an Ice Phishing attack is often: the victim is tricked into approving an EOA or a malicious contract to spend the assets in the victim's wallet.

image description

0ZDKWQCvvrF4FYtbGNCO4NEgROldDBmMkacMHigD.png

Source: Etherescan

image description

OtQTlkvC6IU2VKAzSkjqsgZQ1MdvLHOT8wd7XJDo.png

Source: Etherescan

image description

8fsmrhHkzJ1dt1UlAXU5J7Ffo0imO7xNIXtFYgn4.png

Source: CertiK

image description

SHHdbA2fdQXDXVu0FNhn51wBwfIFZiww4YeL8q3I.png

Source: Etherescan

If you see an address you don't recognize, or one that initiates a transaction without your approval, revoke permissions immediately (either by visiting a site like revoke.cash or connecting your wallet to a scanning system).

How to revoke permissions by scanning websites such as Etherscan?

2. Connect wallet

2. Connect wallet

3. Click on the ERC-20, ERC-721 or ERC-1155 tab to find the address you want to withdraw.

4. Click the Cancel button

How to identify Ice Phishing?

A user's first telltale sign that they are falling into the Ice Phishing trap is to look at the URL or DApp they are using.

Malicious websites copy pages from legitimate projects, or pretend to be partners with legitimate organizations.

For example, we often see some fraudulent websites linking with CertiK or uploading fake CertiK audit reports.

image description

unEJQhUvkcSOi37kxuqzQhqGJUi8AIsxj7VgFA8B.png

YGU5QNceD9iWQiBHN5QWYM0hqbUyIfH2VIDqe1Pg.png

Source: CertiK Investigative Team

image description

nRCxkdP4b003TWIkOMI9t6ThUmoOVsHAg5jWCKyr.png

Source: MetaMask

image description

5MKnGa6qfYZ3Znx9Fxd6pqYHY2a3eBtJxhwrGDZP.png

Users can submit reports of malicious contracts on certik.com

Some on-chain checks can be performed by users through their own DYOR (Do Your Own Research), such as scanning the address presented on the DApp or URL by scanning a website (such as Etherscan) to see if there is any suspicious activity.

image description

P3SqqcIvukFZiBUCVEr5VbPEUI4S2DRW2JWVBAYG.png

Source: Etherescan

Source: Twitter

AqPNg9fK7tN1gb2AkZmre8JfTgdOfnNoq3BvRNZ6.png

Source: Twitter

Investigating some of the victim’s wallets and posting complaints on social media, we discovered a fake Maximus DAO twitter page, which is likely related to the Ice Phishing wallet.

How to protect yourself?

The easiest way to prevent yourself from falling victim to Ice Phishing is to visit trusted websites to verify the authenticity of the information, such as Coinmarketcap.com, coinecko.com, and certik.com.

Many Ice Phishing scams can be found on social media such as Twitter, where fraudulent projects masquerade as legitimate projects and promote fake events like airdrops.

image description

Y4dCy9V3UwkaU8m0tKTLCkcOf4efg3xDZIUFMnQz.png

Source: @CertiKAlert

write at the end

write at the end

Phishing sites are one of the most common types of scams we see in the Web 3.0 world, and users sometimes don't even realize they've fallen for a trap because they don't give out any sensitive information.

So in addition to doing some on-chain checks on your own, you also need to spend more time double-checking that the URL of the interaction is verified by a trusted source-the time spent will pay off for you one day.

Safety
Welcome to Join Odaily Official Community
AI Summary
Back to Top
Ice Phishing has already caused millions of dollars in property damage in the Web3.0 field.
Article Ranking
Daily
Weekly
Download Odaily App
Let Some People Understand Web3.0 First
IOS
Android