Beware of new phishing attacks on Web3.0 mobile Wallets: Modal phishing is coming.

robot
Abstract generation in progress

Web3.0 Mobile Wallet New Type of Phishing Attack: Modal Phishing

Recently, we have discovered a new type of phishing technique specifically targeting the authentication process of connecting to decentralized applications (DApps). We have named this new phishing technique "Modal Phishing Attack".

In this type of attack, criminals can send forged information to mobile Wallets, impersonating legitimate DApps. By displaying misleading information in the modal window of the Wallet, they entice users to approve malicious transactions. This phishing technique is currently being widely used. We have communicated with the relevant component developers, who will release a new verification API to reduce risks.

Unveiling the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

What is Modal Phishing?

In the security research of mobile wallets, we noticed that certain user interface (UI) elements of Web3.0 wallets can be controlled by attackers for phishing attacks. This is called modal phishing because attackers primarily target the modal windows of cryptocurrency wallets.

A modal (or modal window) is a commonly used UI element in mobile applications, typically displayed at the top of the main application window. This design allows users to perform quick actions, such as approving or rejecting Web3.0 wallet transaction requests.

The typical Web3.0 wallet modal design usually provides the necessary information for users to review, such as signature requests, as well as buttons to approve or deny.

Unveiling New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

However, these user interface elements may be controlled by attackers for modal phishing attacks. Attackers can change transaction details, disguising transaction requests as seemingly legitimate actions such as "security updates" to trick users into approving.

Unveiling the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

Attack Case Analysis

Case 1: DApp phishing attack via Wallet Connect

Wallet Connect is a widely popular open-source protocol for connecting user wallets with DApps via QR codes or deep links. During the pairing process, the Web3.0 wallet will display a modal window showing the metadata of the incoming pairing request, including the name, website, icon, and description of the DApp.

However, this information is provided by the DApp, and the Wallet does not verify its authenticity. Attackers can impersonate legitimate DApps to trick users into connecting. During the pairing process, as long as the victim intends to operate on the counterfeit site, the attackers can replace the transaction request parameters (such as the target address and amount) to steal funds.

Revealing the New Type of Scam in Web3.0 Mobile Wallets: Modal Phishing Attack

Unveiling the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

Case 2: Phishing for smart contract information via MetaMask

In the approval modal of MetaMask, there is a UI element that displays the transaction type. MetaMask reads the signature bytes of the smart contract and queries the corresponding method name using the on-chain method registry. However, this also creates another UI element that can be controlled by an attacker.

Attackers can create a phishing smart contract and register method signatures with misleading names like "SecurityUpdate". When MetaMask parses this contract, it will present this name to the user in the approval modal, making the transaction request appear to come from "MetaMask"'s "security update".

Revealing the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

Unveiling the New Scam of Web3.0 Mobile Wallets: Modal Phishing Attack

Prevention Recommendations

  1. Wallet application developers should always assume that externally incoming data is untrustworthy, carefully choose the information displayed to users, and verify its legitimacy.

  2. Users should remain vigilant for each unknown transaction request and carefully verify the transaction details.

  3. Wallet Connect and other protocols should consider validating the effectiveness and legality of DApp information in advance.

  4. Wallet applications should take precautions to filter out misleading terms that could be used for phishing attacks.

Revealing the New Scam of Web3.0 Mobile Wallet: Modal Phishing Attack

In short, certain elements of the Web3.0 wallet user interface may be manipulated by attackers, creating seemingly legitimate phishing traps. Users and developers should remain vigilant and work together to maintain the security of the Web3.0 ecosystem.

Revealing the new type of scam in Web3.0 mobile Wallet: Modal Phishing Attack

DAPP-4.65%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 7
  • Repost
  • Share
Comment
0/400
TokenVelocityTraumavip
· 07-29 14:12
This trap is too ruthless; I've already fallen into it before.
View OriginalReply0
RektCoastervip
· 07-27 23:37
So who is the biggest winner... even the information in my Wallet can be forged.
View OriginalReply0
consensus_failurevip
· 07-26 15:11
Hardcore is hardcore, but if it can't be held down, it still won't be held down.
View OriginalReply0
ProxyCollectorvip
· 07-26 15:11
Is there a new trap again? It should have been regulated long ago!
View OriginalReply0
ExpectationFarmervip
· 07-26 15:10
I've been scammed twice already, very accurate.
View OriginalReply0
OnChain_Detectivevip
· 07-26 15:09
scammers are getting creative af... stay frosty degens
Reply0
SilentObservervip
· 07-26 14:52
Be careful and stay vigilant.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)