
Cos(余弦)😶🌫️|Mar 18, 2025 04:03
This kind of fishing with similar addresses and poisoning is not close to extinction, and the security infrastructure of this industry will never pass There are several techniques for poisoning and contaminating wallet transaction history, such as two used in this example:
The contract code of 1 fake token emits a fake event log, which not only deceives the naked eye but also causes block browsers and many wallets to output the event log as intended
Zero amount transfer event log, many tokens support the transferFrom operation with token 0. In scenarios where the amount is 0, from/to can be defined arbitrarily
Both of these methods will make users think that it is their own operation, after all, it appears that the tx is indeed sent from their own address to the target wallet address. Unfortunately, the "target wallet address" here only has the first and last few characters that are the same as the real one.
Other techniques include using the same starting and ending characters in the source address and sending real small amounts of funds to the user's address. This has always been common in the gaming world, where whenever you transfer some funds, you will soon receive various small amounts, all of which are clearly used to poison wallet history records.
There are also some advanced techniques, such as combining clipboard hijacking, pasting past addresses, and seeing the same beginning and end characters as previously used addresses. For example, if someone impersonates a well-known DEX and outputs fake event logs, it will make you think that you have actually operated it before
In fact, this defense is very simple, such as being good at using wallet whitelist mechanism, reading more characters in the address (important ones can be read in full), combining well-known hardware wallets for double checks, and so on. However, simple defense is still not easy for many users, who may find it troublesome, especially when it comes to FOMO. This is also a difficult part for wallets. Users are often tricked by various security traps, but they always take the wallet first
Share To
Timeline
HotFlash
APP
X
Telegram
CopyLink