Secure Wallet Fraudster Steals $2M In One Week With ‘Address Poisoning’

Secure Wallet Fraudster Steals $2M In One Week With 'Address Poisoning'



A crypto hacker specializing in “address poisoning attacks” stole over $2 million from Safe Wallet users last week alone, bringing the total number of victims to 21.

On December 3, Web3's fraud detection platform Scam Sniffer reported that since November 26, nearly ten secure wallets have lost $2.05 million to tackle poisoning attacks.

According to data compiled by Dune Analytics' Scam Sniffer, the same attacker reportedly stole at least $5 million from 21 victims in the past four months.

Scam Sniffer even reported that one of the victims had $10 million in crypto in his Safe Wallet, but “luckily” only lost $400,000 of that.

okex

An address poisoning attack occurs when a victim creates an address that is identical to the one they regularly send money to – often using the same first and last characters.

The hacker usually sends a small amount of crypto from the newly created wallet to the target to “poison” their transaction history. An unsuspecting victim can mistakenly copy the same address from the transaction history and send money to the hacker's wallet instead of the intended destination.

Cointelegraph has reached out to Safe Wallet for comment on the matter.

A massive address poisoning attack that appears to have been carried out by the same attacker cost real-world real estate lending protocol Florence Finance $1.45 million in USDC on November 30.

At the time, blockchain security firm PeckShield, which reported the incident, showed how the attacker was able to spoof the protocol, revealing that both the poison and the real address start with “0xB087” and end with “5870”.

In November, Scam Sniffer reported that hackers were abusing Ethereum's ‘Create2' Solidity functionality to bypass wallet security alerts. This led to Wallet Drainers stealing nearly $60 million from 100,000 victims in six months, he said. Address poisoning is one of the methods used to accumulate ill-gotten gains.

Related: What are address poisoning attacks in crypto and how to avoid them?

Create2 pre-calculates contract addresses, allowing malicious actors to generate new identical wallet addresses that are transferred after the victim authorizes a fake signature or transfer request.

According to the security team at SlowMist, one group has been using Create2 since August to “consistently steal nearly $3 million in assets from 11 victims, with one victim suffering losses of up to $1.6 million.”

Magazine: Should crypto projects negotiate with hackers? in case



Leave a Reply

Pin It on Pinterest