#User lost $460,000 in a simulated trading scam.#
Hot Topic Overview
Overview
Recently, a user lost 143.45 ETH, approximately $460,800, due to a transaction simulation scam. The attacker exploited the delay between transaction simulation and execution in Web3 wallets by creating a phishing website. After the user submitted a transaction, the attacker immediately tampered with the on-chain state. Specifically, the attacker initiated a fake "Claim" ETH transfer request. The wallet simulated receiving a small amount of ETH, but the attacker subsequently modified the contract state, resulting in the user's actual transaction depleting their wallet assets. This incident serves as a reminder for users to be extremely cautious of phishing websites and to be aware of the difference between transaction simulation and actual execution when using Web3 wallets.
Ace Hot Topic Analysis
Analysis
Recently, a user lost 143.45 ETH, approximately $460,800, due to a transaction simulation scam. The attacker exploited the delay between transaction simulation and execution in Web3 wallets by creating a phishing website and manipulating the on-chain state immediately after the user submitted the transaction. Specifically, the attacker would initiate a "Claim" ETH transfer request, and the wallet would simulate receiving a small amount of ETH. However, the attacker would then modify the contract state, resulting in the actual transaction draining the user's wallet assets. This incident serves as a reminder for users to exercise extreme caution when conducting Web3 transactions, avoid phishing websites, and be aware of the delay between transaction simulation and execution to prevent similar fraudulent losses.
Public Sentiment · Discussion Word Cloud
Public Sentiment
Discussion Word Cloud
Classic Views
Transaction simulation functionality has a security vulnerability, attackers can exploit the delay to tamper with the on-chain state, resulting in user funds loss.
Attackers can use phishing websites to lure users into making transactions, and exploit the delay in the transaction simulation functionality to commit fraud.
Web3 wallet transaction simulation functionality needs to strengthen security measures to prevent attackers from exploiting delays to commit fraud.
Users should be cautious in identifying phishing websites when making transactions, and avoid clicking on suspicious links.