SlowMist Yuxian: We should make good use of the wallet whitelist mechanism and combine well-known hardware wallets for double verification and other
SlowMist Cosine revealed that the phishing technique of poisoning similar addresses at both ends is still widespread, seriously affecting the security infrastructure construction of the blockchain industry. Cosine pointed out that there are various techniques for poisoning the transaction history of wallets, including false token contract code issuing false event logs to deceive block browsers and wallets, and using zero-amount transfer event logs to arbitrarily fill in addresses in the from/to fields. These techniques can make users mistakenly believe that the transaction comes from their own operation. Other common techniques include sending small amounts of funds from addresses with the same starting and ending characters, combining clipboard hijacking technology, and outputting false event logs of well-known decentralized exchanges.
Cosine suggests that users should make good use of wallet whitelisting mechanisms, carefully verify complete addresses, and combine well-known hardware wallets for double verification and other measures for defense.
Earlier news, two addresses were subjected to "transaction history pollution attacks" in the past 14 hours, with a total loss of over $140,000.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
TUTUSDT now launched for futures trading and trading bots
Europol: Artificial intelligence and encryption technologies make crime more efficient
ETH breaks through $2,000
Trending news
MoreCrypto prices
More








