📢 Gate Square #MBG Posting Challenge# is Live— Post for MBG Rewards!
Want a share of 1,000 MBG? Get involved now—show your insights and real participation to become an MBG promoter!
💰 20 top posts will each win 50 MBG!
How to Participate:
1️⃣ Research the MBG project
Share your in-depth views on MBG’s fundamentals, community governance, development goals, and tokenomics, etc.
2️⃣ Join and share your real experience
Take part in MBG activities (CandyDrop, Launchpool, or spot trading), and post your screenshots, earnings, or step-by-step tutorials. Content can include profits, beginner-friendl
Web3 platform suffers $1.46 billion Cold Wallet attack, front-end security becomes the focus
Web3 Security Incident Analysis: A Certain Platform's Cold Wallet Suffered a Major Attack
On February 21, 2025, the Cold Wallet of a well-known trading platform for Ethereum was attacked, resulting in approximately 401,346 ETH, 15,000 cmETH, 8,000 mETH, 90,375 stETH, and 90 USDT being transferred to an unknown address, with a total value of around $1.46 billion.
The attacker uses phishing tactics to lure the signers of the platform's multi-signature Wallet into signing malicious transactions. The attack steps are as follows:
The security company entrusted with conducting the forensic investigation has currently discovered:
From the existing information, the front end is not the main issue; the key problem lies in the cloud storage service being compromised, leading to the tampering of JavaScript. However, if the security management platform's front end had implemented basic integrity verification, even if the JavaScript was altered, it would not have resulted in such severe consequences. Of course, the trading platform also cannot escape responsibility, as they confirmed transactions without specific transaction information displayed on the hardware wallet, which itself poses a risk to the trust in the security management platform's front end.
Hardware wallets have limitations when handling complex transactions, as they cannot fully parse and display the detailed transaction data of multi-signature wallets, leading signers to perform "blind signing" without fully verifying the transaction content.
Hackers are skilled at exploiting design flaws in interaction processes to deceive users and steal assets, such as UI hijacking, deceptive signatures, using blind signatures, abusing Permit signatures, TransferFrom zero transfer phishing, tail number matching airdrop scams, NFT phishing, and more.
With the development of Web3 technology, the boundaries between front-end security and blockchain security are becoming increasingly blurred. Traditional front-end vulnerabilities are given new attack dimensions in the Web3 context, while issues such as smart contract vulnerabilities and private key management flaws further amplify the risks.
Transaction Parameter Tampering: Interface Displays Transfer, Actual Execution Authorizes
The user sees a wallet pop-up displaying "Transfer 1 ETH to 0xUser...", but the actual on-chain execution is "approve(attacker, unlimited)", allowing the assets to be transferred at any time.
Solution: EIP-712 Structured Signature Verification
In this way, any tampering with front-end parameters will result in a signature mismatch, and the transaction will automatically roll back.
Blind Signing Hijacking: Reasons for Hardware Wallet Breaches
An attacker may hijack the front-end code and send forged calldata to the hardware Wallet. The hardware Wallet screen displays normal transaction information, but what is actually executed is "approve(attacker, unlimited)."
Solution: Hardware Wallet Semantic Analysis + On-chain Secondary Verification
Conclusion
The integration of front-end security and Web3 security is both a challenge and an opportunity. This incident exposed deep-seated issues in security management and technical architecture within the cryptocurrency industry. The industry needs to comprehensively enhance its protective capabilities from various aspects such as device security, transaction verification, and risk control mechanisms to cope with increasingly complex threats. Front-end development should repeatedly verify access to DApps, wallet connections, message signing, transaction signing, and post-transaction processing to achieve a transition from "passive patching" to "active immunity." Only in this way can we safeguard the value and trust of every transaction in the open world of Web3.
Of course, the security audit of on-chain contracts is indispensable for every Dapp. AI-assisted security scanning tools can ensure code correctness through formal verification and AI-assisted security specifications, provide code similarity and intellectual property risk analysis for a large number of deployed contracts, monitor around the clock, and promptly notify of zero-day vulnerabilities and security incidents that may affect the project. Some tools also have AI models optimized based on large-scale vulnerability databases for detecting various real vulnerabilities in smart contracts.