Permit签名钓鱼有多危险?这次失手的加密大户竟然被盗420万美元

币圈资讯 阅读:37 2024-04-22 10:26:35 评论:0
美化布局示例

欧易(OKX)最新版本

【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   全球官网 大陆官网

币安(Binance)最新版本

币安交易所app【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

火币HTX最新版本

火币老牌交易所【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

2024年1月22日,据Beosin旗下EagleEye安全风险监控、预警与阻断平台监测显示,一位加密大户遭受到网络钓鱼攻击,造成了420万美元的损失,而关键点漏洞,是我们经常提及的Permit签名。

在早些时间Beosin与区块链安全研究员菠菜共同研究并发布了《签名就被盗?用过Uniswap的请警惕!揭秘Permit2签名钓鱼》安全研究文章,文中详细描述了攻击者如何利用permit2函数对用户发起钓鱼攻击,而本次事件所利用的攻击原理与文章中描述的permit2攻击方式基本一致,只是permit是针对于支持该函数的erc20合约,而permit2针对的可以是所有erc20合约。

本篇文章我们一起来看看攻击者一般是利用什么来诱骗用户对诈骗信息进行签名的,以及一些安全防范技巧。

什么是Permit签名钓鱼?

Permit签名是一种特定的数字签名机制,用于在某些情况下简化授权操作。它是基于区块链技术和密码学原理的一种安全验证方式。

在传统的数字签名中,签名者需要拥有私钥来对特定的数据进行签名,并将签名后的数据与公钥一起传输给验证方。验证方使用相应的公钥来验证签名的有效性。

然而,Permit签名采用了一种不同的方法。它允许持有者通过签署一份特殊的授权消息,将对特定操作的访问权限授予他人,而无需直接将私钥传输给受许可方。

Permit签名钓鱼则是利用用户对授权操作的不加仔细验证或理解,以获取未经授权的权限或敏感信息。这种攻击利用了用户对授权流程或签名机制的信任,通过欺骗用户产生伪造的授权操作或签名请求。

黑客通常采取哪些Permit签名钓鱼攻击?

伪造授权请求:

攻击者可能创建一个看似合法的授权请求,以骗取用户的信任。这可能涉及伪造的应用或网站,要求用户提供他们的授权或签名来执行某个操作。

误导用户操作:

攻击者可能通过欺骗用户进行误操作来实施攻击。例如,他们可能创建一个看似无害的按钮,但实际上触发了未经用户认可的授权操作。

伪造授权页面:

攻击者可能通过伪造与正常授权页面相似的页面来引诱用户进行授权操作。这些页面通常设计得与正常的授权页面几乎一模一样,以欺骗用户并使其相信他们正在与合法的应用或服务进行交互。

社交工程:

攻击者可能利用社交工程技巧,通过发送钓鱼邮件、短信或社交媒体消息等方式,引导用户点击恶意链接或进入伪造的授权页面。

如何安全防范?

考虑到Permit签名的一些钓鱼攻击,此前研究员菠菜给了我们一些有效的防范手段有:

1 理解并识别签名内容:

Permit的签名格式通常包含Owner、Spender、value、nonce和deadline这几个关键格式,如果你想享受Permit带来的便利和低成本的话一定要学会识别这种签名格式。(下载安全插件是一个很好的选择)

我们向各位读者朋友推荐下面这款Beosin Alert反钓鱼插件,可以识别Web3领域的大部分钓鱼网站,守护大家的钱包和资产安全。

反钓鱼插件下载:

https://chrome.google.com/webstore/detail/beosin-alert/lgbhcpagiobjacpmcgckfgodjeogceji?hl=en

2 放资产的钱包和交互的钱包分离使用:

如果你有大量资产的话,建议资产都放在一个冷钱包中,链上交互的钱包放少量资金,可以大幅减少遇到钓鱼骗局时的损失。

3 识别代币性质,是否支持permit功能:

后续可能越来越多的ERC20代币使用该扩展协议实现permit功能,对于你来说需要关注自己所持有的代币是否支持该功能,如果支持,那么对于该代币的交易或操纵一定要格外小心,对于每条未知签名也要严格检查是否是对permit函数的签名。

4 若被骗后还有代币存在其他平台,需制定完善的拯救计划:

当你发现自己被诈骗,代币被黑客转移出去后,但自己还有代币通过例如质押等方式存在其他平台上,需要提取出来转移到安全地址上,这时需要知道黑客可能时刻监控着你的地址代币余额,因为他拥有你的签名,只要你的被盗地址上出现了代币,那么黑客可以直接转移出去。这时需要制定完善的代币拯救过程,在提取代币和转移代币两个过程需要一起执行,不能让黑客交易插入其中,可以使用MEV转移,这需要一些区块链知识以及代码功底,也可以寻找专业的安全公司比如Beosin团队利用交易抢跑脚本来实现。


According to the monitoring of its security risk monitoring, early warning and blocking platform, a large cryptographer suffered a phishing attack, which caused a loss of 10,000 US dollars. The key vulnerability is that the signature we often mentioned was stolen when we worked with spinach, a blockchain security researcher, earlier. Please be wary of revealing the signature phishing security research article. This article describes in detail how attackers use functions to launch phishing attacks on users, and the attack principles and articles used in this incident. The attack methods described in are basically the same, but only for the contracts that support this function, which can be all contracts. In this article, let's take a look at what attackers generally use to trick users into signing fraudulent information and some security precautions. What is signature phishing signature? It is a specific digital signature mechanism to simplify the authorization operation in some cases. It is a security verification method based on blockchain technology and cryptography principles. In traditional digital signatures, The signer needs to have a private key to sign specific data and transmit the signed data to the verifier together with the public key. The verifier uses the corresponding public key to verify the validity of the signature. However, the signature adopts a different method, which allows the holder to grant access to specific operations by signing a special authorization message without directly transmitting the private key to the licensee. Fishing is to use the user's careless verification or understanding of the authorized operation to obtain unauthorized information. Authorized authority or sensitive information This kind of attack takes advantage of the user's trust in the authorization process or signature mechanism to produce forged authorization operations or signature requests by deceiving users. What signature phishing attacks hackers usually take to forge authorization requests? An attacker may create a seemingly legitimate authorization request to defraud users' trust. This may involve forged applications or websites that require users to provide their authorization or signature to perform an operation to mislead users. An attacker may do so by deceiving users. Misoperation to carry out attacks, for example, they may create a seemingly harmless button, but actually trigger an unauthorized operation by users. Attackers may induce users to carry out authorized operations by forging pages similar to normal authorized pages. These pages are usually designed almost exactly like normal authorized pages to deceive users and make them believe that they are interacting with legitimate applications or services. Social engineering attackers may use social engineering skills to send Sending phishing emails, text messages or social media messages to guide users to click on malicious links or enter forged authorization pages. How to prevent some phishing attacks considering signatures? Previously, researcher Spinach gave us some effective preventive measures to understand and identify the signature format of signature content, which usually includes and these key formats. If you want to enjoy the convenience and low cost, you must learn to identify this signature format. It is a good choice for us to download security plug-ins. Readers and friends recommend that the following anti-phishing plug-in can identify most phishing websites in the field and protect everyone's wallets and assets. Anti-phishing plug-ins download and store assets separately from interactive wallets. If you have a large number of assets, it is recommended that all assets be put in a cold wallet. Putting a small amount of money in an interactive wallet on the chain can greatly reduce the loss when encountering phishing scams. Identify whether the nature of tokens supports the function. More and more tokens may use this extended protocol to realize the function. You need to pay attention to whether the token you hold supports this function. If so, you must be extra careful about the transaction or manipulation of the token. For each unknown signature, you must also strictly check whether it is the signature of the function. If you are cheated, there are still tokens on other platforms. You need to make a perfect rescue plan. When you find that you have been cheated, but you still have tokens on other platforms by means of pledge, you need to extract them and transfer them to a safe address. You need to know that the hacker may always monitor the balance of your address tokens, because he has your signature. As long as tokens appear on your stolen address, the hacker can directly transfer them out. At this time, it is necessary to formulate a perfect token rescue process. The two processes of extracting tokens and transferring tokens need to be carried out together, and hacker transactions cannot be inserted into them. Transfer can be used, which requires some blockchain knowledge and code skills. You can also find a professional security company, such as a team, to use the transaction escape script to achieve it. 比特币今日价格行情网_okx交易所app_永续合约_比特币怎么买卖交易_虚拟币交易所平台

文字格式和图片示例

注册有任何问题请添加 微信:MVIP619 拉你进入群

弹窗与图片大小一致 文章转载注明 网址:https://netpsp.com/?id=61352

美化布局示例

欧易(OKX)最新版本

【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   全球官网 大陆官网

币安(Binance)最新版本

币安交易所app【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址

火币HTX最新版本

火币老牌交易所【遇到注册下载问题请加文章最下面的客服微信】永久享受返佣20%手续费!

APP下载   官网地址
可以去百度分享获取分享代码输入这里。
声明

1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。

发表评论
平台列表
美化布局示例

欧易(OKX)

  全球官网 大陆官网

币安(Binance)

  官网

火币(HTX)

  官网

Gate.io

  官网

Bitget

  官网

deepcoin

  官网
关注我们

若遇到问题,加微信客服---清歌

搜索
排行榜
扫一扫,加我为微信好友加我为微信好友