New Threats to Web3 Mobile Wallets: A Detailed Explanation of Modal Phishing Attacks and Prevention

New Security Risks of Web3.0 Mobile Wallet: Modal Phishing Attacks

Recently, security researchers discovered a new phishing technique targeting Web3.0 mobile Wallets, named "Modal Phishing Attack." This attack method exploits the modal window design vulnerability of mobile Wallets, misleading users into approving malicious transactions by displaying deceptive information.

Revealing the new type of scam in Web3.0 mobile wallets: Modal Phishing Attack

The Principle of Modal Phishing Attacks

Modal phishing attacks primarily target modal windows commonly used in cryptocurrency wallet applications. These modal windows are typically used to display transaction request information and obtain user approval. Attackers can manipulate certain user interface elements within these windows to display false or misleading information.

Specifically, the attacker can control the following UI elements:

  1. DApp Information: including name, icon, website address, etc.
  2. Smart Contract Information: such as function names, etc.

Revealing the New Type of Scam in Web3.0 Mobile Wallet: Modal Phishing Attack

Typical Attack Cases

1. Use the Wallet Connect protocol for DApp phishing

Wallet Connect is a widely used protocol for connecting user wallets to DApps. Researchers have found that during the pairing process, wallet applications directly display the metadata provided by the DApp without verifying it. Attackers can exploit this by spoofing the information of well-known DApps to deceive users.

For example, an attacker can create a spoofed Uniswap DApp and connect to the user's Metamask Wallet via Wallet Connect. During the pairing process, the wallet displays seemingly legitimate Uniswap information, including name, website, and icon. Once the user approves the connection, the attacker can send malicious transaction requests.

Revealing the new type of scam in Web3.0 mobile Wallet: Modal Phishing Attack

2. Phishing for smart contract information through Metamask

Wallets like Metamask will display the function name of the smart contract on the transaction approval interface. Attackers can register smart contract functions with misleading names, such as "SecurityUpdate," and use these functions in transaction requests. When users see what seems to be an official update request, they may mistakenly believe it is a legitimate operation and approve the transaction.

Revealing the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

Prevention Suggestions

For Wallet developers:

  1. Always treat externally input data as untrusted.
  2. Carefully select the information to be displayed to users and verify its legality.
  3. Consider implementing additional verification mechanisms, such as verifying DApp information.

Unveiling the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

For users:

  1. Stay vigilant for every unknown transaction request.
  2. Carefully check the transaction details and do not make decisions solely based on the information displayed in the UI.
  3. If you have any questions, please verify the information through official channels.

Unveiling the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

In summary, modal phishing attacks reveal potential vulnerabilities in Web3.0 wallet design and information verification in the user interface. As these types of attack methods continue to evolve, wallet developers and users need to enhance security awareness and work together to maintain the safety of the Web3 ecosystem.

Unveiling the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

Revealing the new type of scam in Web3.0 mobile Wallet: Modal Phishing Attack

Revealing the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

DAPP-3.65%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Share
Comment
0/400
NFT_Therapyvip
· 10h ago
Forget smart contracts, let's just run.
View OriginalReply0
SchrodingerAirdropvip
· 07-23 16:09
Oh no, short positions are too scared to open.
View OriginalReply0
ValidatorVibesvip
· 07-23 16:07
another day, another exploit... when will devs learn proper modal validation smh
Reply0
NFTHoardervip
· 07-23 16:07
Don't think you can trap me, this bad guy actually wants to scam my nft.
View OriginalReply0
SighingCashiervip
· 07-23 16:02
The crypto world old scammer has come up with a new trick.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)