📢 Gate Square #MBG Posting Challenge# is Live— Post for MBG Rewards!
Want a share of 1,000 MBG? Get involved now—show your insights and real participation to become an MBG promoter!
💰 20 top posts will each win 50 MBG!
How to Participate:
1️⃣ Research the MBG project
Share your in-depth views on MBG’s fundamentals, community governance, development goals, and tokenomics, etc.
2️⃣ Join and share your real experience
Take part in MBG activities (CandyDrop, Launchpool, or spot trading), and post your screenshots, earnings, or step-by-step tutorials. Content can include profits, beginner-friendl
New Threats to Web3 Mobile Wallets: A Detailed Explanation of Modal Phishing Attacks and Prevention
New Security Risks of Web3.0 Mobile Wallet: Modal Phishing Attacks
Recently, security researchers discovered a new phishing technique targeting Web3.0 mobile Wallets, named "Modal Phishing Attack." This attack method exploits the modal window design vulnerability of mobile Wallets, misleading users into approving malicious transactions by displaying deceptive information.
The Principle of Modal Phishing Attacks
Modal phishing attacks primarily target modal windows commonly used in cryptocurrency wallet applications. These modal windows are typically used to display transaction request information and obtain user approval. Attackers can manipulate certain user interface elements within these windows to display false or misleading information.
Specifically, the attacker can control the following UI elements:
Typical Attack Cases
1. Use the Wallet Connect protocol for DApp phishing
Wallet Connect is a widely used protocol for connecting user wallets to DApps. Researchers have found that during the pairing process, wallet applications directly display the metadata provided by the DApp without verifying it. Attackers can exploit this by spoofing the information of well-known DApps to deceive users.
For example, an attacker can create a spoofed Uniswap DApp and connect to the user's Metamask Wallet via Wallet Connect. During the pairing process, the wallet displays seemingly legitimate Uniswap information, including name, website, and icon. Once the user approves the connection, the attacker can send malicious transaction requests.
2. Phishing for smart contract information through Metamask
Wallets like Metamask will display the function name of the smart contract on the transaction approval interface. Attackers can register smart contract functions with misleading names, such as "SecurityUpdate," and use these functions in transaction requests. When users see what seems to be an official update request, they may mistakenly believe it is a legitimate operation and approve the transaction.
Prevention Suggestions
For Wallet developers:
For users:
In summary, modal phishing attacks reveal potential vulnerabilities in Web3.0 wallet design and information verification in the user interface. As these types of attack methods continue to evolve, wallet developers and users need to enhance security awareness and work together to maintain the safety of the Web3 ecosystem.