Disclaimer: Information found on CryptoreNews is those of writers quoted. It does not represent the opinions of CryptoreNews on whether to sell, buy or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk.
CryptoreNews covers fintech, blockchain and Bitcoin bringing you the latest crypto news and analyses on the future of money.
Fraudsters Utilize Etherscan to Conceal Harmful Smart Contracts
The Angel Drainer phishing collective has utilized a novel attack method that leverages Etherscan to mask the harmful characteristics of a smart contract.
Experts at Blockaid have uncovered a new strategy employed by the Angel Drainer group to disseminate harmful smart contracts. The attackers executed the malicious code via the decentralized vault contract known as Safe.
The underlying principle of this approach is that the Etherscan platform automatically assigns a verification flag to Safe contracts, which creates a misleading sense of security for users. By utilizing the harmful smart contract, Angel Drainer managed to siphon off $403,000 in assets from 128 cryptocurrency wallets.
The Blockaid team emphasizes that this incident does not constitute a direct assault on Safe, and the users of the application were minimally impacted. The project team has been informed of the situation and is actively working to mitigate any further repercussions.
As reported by Blockaid, the hackers associated with Angel Drainer have been operational for roughly a year. Throughout this timeframe, they have compromised nearly 35,000 wallets and made off with assets totaling over $25 million. The group’s most notorious operation was the Ledger Connect Kit breach.
It is important to note that a significant exploit of the PlayDapp gaming blockchain platform is also being investigated. This attack began on February 9, but the vulnerability remains unaddressed, with potential damages estimated at $290 million. The PlayDapp team has suspended the protocol and is looking into the incident. Efforts to negotiate with the hacker have not produced any results.
Attention! Reports indicate a rise in cybercriminals enhancing their attack techniques. A new variant of malware was recently identified on the Solana network, allowing for the modification of transaction details that have already been signed by users. Furthermore, due to advancements in crypto ransomware, attackers extorted $1 billion in assets as ransom in 2023.
Сообщение Scammers Use Etherscan to Disguise Malicious Smart Contracts появились сначала на CoinsPaid Media.