Slow Mist: Beware of DeFi Mining Phishing Certificate Theft Attacks

2020-9-6 15:02
share to
Scan QR code with WeChat

According to SlowMist Intelligence, the popularity of DeFi mining projects has led to phishing attacks targeting Ethereum DeFi mining (https://conch.finance/) in addition to bogus discs. Trusting the user to authorize the project itself is the actual authorization to the address over which the attacker has control, and when the authorization is complete, the user's money is immediately transferred. According to monitoring by SlowMist security team, the website is now trying to trick users into recognizing users with address 0x59DFd93D34DFF5D36dEdD539425a7D7D2a77B3e5, which is a general address, protecting the user. , not the address in the contract. 200,000 USDC and 52 YAMV2 were traded requesting browser blocking. The SlowMist security team warns users that when running a DeFi project, they should have a good understanding of the project itself, carefully consider whether the project has passed the security inspection, and once approved, ensure that the approved products are genuine. . Location at the project part, to reduce the capital layer.

Next:
Beware of the DeFi Mining phishing delay scam
According to SlowMist Intelligence, the popularity of DeFi mining projects has led to phishing attacks targeting Ethereum DeFi mining (https://conch.finance/) in addition to bogus discs. When the user accepts the project himself, he grants an address that can be controlled by the attacker, and once the approval is complete, the user's funds are exchanged immediately. According to monitoring by SlowMist security team, the website is now trying to trick users into recognizing users with address 0x59DFd93D34DFF5D36dEdD539425a7D7D2a77B3e5, which is a general address, protecting the user. , not the address in the contract. 200,000 USDC and 52 YAMV2 were traded requesting browser blocking. The SlowMist security team warns users that when running a DeFi project, they should have a good understanding of the project itself, carefully consider whether the project has passed the security inspection, and once approved, ensure that the approved products are genuine. . Location at the project part, to reduce the capital layer.
2020-9-6 15:02