attacks

Slow Fog Cosine: Using wallet whitelist mechanisms and combining hardware wallets for dual verification can resist "transaction record pollution attacks."

ChainCatcher message, Slow Mist's Yu Xian disclosed that the phishing technique of poisoning addresses with similar starting and ending numbers is still widespread, severely impacting the security infrastructure of the blockchain industry.Yu Xian pointed out that this type of poisoning targeting wallet transaction history mainly involves various techniques, including fake token contract codes emitting false event logs to deceive block explorers and wallets, as well as using zero-amount transfer event logs to arbitrarily fill in addresses in the from/to fields. These techniques can mislead users into believing that the transactions are from their own actions. Other common techniques include sending small amounts of funds from source addresses with the same starting and ending characters, combining clipboard hijacking technology, and impersonating well-known decentralized exchanges to output false event logs.Yu Xian recommends that users make good use of wallet whitelisting mechanisms, carefully verify complete addresses, and combine well-known hardware wallets for dual verification as defensive measures.Previously reported, two addresses suffered "transaction history pollution attacks" in the past 14 hours, resulting in a total loss of over $140,000.

Slow Fog CISO: Beware of SMS phishing attacks targeting Binance users, and we recommend that Binance conduct a thorough investigation into this issue

ChainCatcher news, according to a post by Slow Mist CISO 23pd on platform X warning, "Attention, the latest SMS phishing attacks targeting Binance users have emerged. Recently, two individuals received the same phishing SMS on the same day, and the phishing SMS even appeared in the conversation thread of official Binance messages, appearing in the same context as previous genuine official messages, sharing the same channel. Even more astonishingly, there was a significant time span, precisely forging the official SMS environment.The current possible explanation is that the SMS channel has been exploited or hijacked by the phishers. The first SMS indeed came from the official number, but the subsequent scam messages may indicate that:Scammers spoofed the official SMS source (SMS Spoofing)• They used technical means to spoof the SMS sending number, making it appear consistent with the official number, allowing phishing messages to blend into the official conversation thread.They exploited vulnerabilities in the SMS gateway or supply chain attacks• Scammers may have attacked the SMS gateway or exploited security vulnerabilities of carriers/third-party SMS service providers, successfully embedding phishing messages into the official channel.• There may even be collusion with unscrupulous SMS providers to directly spoof official SMS replies, making it difficult for users to discern authenticity.Please have Binance officials investigate the issue, and everyone is advised to enhance security awareness and pay attention to fund safety."
ChainCatcher Building the Web3 world with innovators