SlowMist: Web3 Phishing Technique Analysis

By: blockbeats|2025/02/03 09:15:04
0
Share
copy
Original Article Title: "SlowMist: Web3 Phishing Tactics Analysis"
Original Source: SlowMist Security Team

Lately, SlowMist was invited to participate in the Ethereum Web3 Security BootCamp organized by DeFiHackLabs. As a speaker, SlowMist's Head of Security Audit, Thinking, delved into the malicious ways and covert methods of phishing hackers across eight chapters titled "Fake, Bait, Lure, Attack, Conceal, Skill, Distinguish, Defend," combining practical examples to lead students to a deep understanding of phishing attacks and proposing relevant preventive measures. Phishing is one of the heavily targeted areas in the industry. Understanding the enemy is necessary to defend effectively. This article will extract key content from the sharing session to help users understand the current state of phishing attacks and effectively mitigate the threat of phishing attacks.

Why Phishing Happens

SlowMist: Web3 Phishing Technique Analysis

In the Web3 world, phishing attacks have become one of the major security threats. Let's first look at why users fall victim to phishing. In fact, even users with high security awareness sometimes feel the saying "if you walk by the river often, you will eventually get your shoes wet" applies to them. After all, maintaining the highest level of vigilance at all times is difficult. Attackers analyze factors such as recent hot projects, community activity, and user base to select highly visible targets, disguise them carefully, and then lure users using airdrops, high returns, and other baits. These attack methods are usually accompanied by social engineering. Attackers are adept at exploiting user psychology to achieve their fraudulent goals:

·  Enticement: Airdrop whitelist qualification, mining rewards, private key of wealth, etc.

·  Curiosity / Greed: Fearless exit strategy for a rug pull, can't miss the potential 100x coin, don't miss out at 10 PM tonight, meeting link https://us04-zoom[.]us/ (malicious); $PENGU airdrop whitelist must not be missed, https://vote-pengu[.]com/ (malicious).

·  Fear: Urgent alert: XX project has been hacked, please use revake[.]cash (malicious) to revoke authorization and prevent fund loss.

·  Efficient Tools: Airdrop farming tools, AI quantitative tools, one-click mining fleeceware, etc.

Attackers invest time in creating and deploying baits simply because it is profitable. Through the above means, attackers can easily obtain users' sensitive information/permissions, thereby stealing user assets:

·  MNEMONIC / Private Key Theft: Deceiving users into inputting their mnemonic phrase or private key.

·  Deceiving User to Sign with Wallet: Authorization signature, transaction signature, etc.

·  Account Password Theft: Telegram, Gmail, X, Discord, etc.

·  Social App Permission Theft: X, Discord, etc.

·  Inducing Installation of Malicious Programs: Fake wallet apps, fake social apps, fake conference apps, etc.

Phishing Techniques

Next, let's take a look at some common phishing techniques:

Account Theft / Impersonation

Recently, there has been a surge in incidents where Web3 projects' / KOLs' X accounts were hacked. After hijacking the account, attackers often promote fake tokens or construct similar domain names in the "good news" they release to deceive users into clicking. Of course, there are cases where the domain is legitimate because the attacker may have taken over the project's domain. Once the victim clicks on the phishing link, performs a signature, or downloads malicious software, their assets will be stolen.

In addition to stealing accounts, attackers on X often use impersonated accounts to comment in the comments section of legitimate accounts to deceive users. The SlowMist Security Team has conducted targeted analysis and statistics: about 80% of well-known projects have the comments section of their tweets occupied by scam phishing accounts. Attackers use automated bots to follow the activities of well-known projects. After a project releases a tweet, the phishing group's bots will automatically leave a comment in the comments section to ensure they occupy the first comment position for high visibility. Since the post the user is viewing is sent by a real project and the disguised phishing group account and the project account are highly similar, as long as the user is not vigilant enough and clicks on the high-imposter account's phishing link under the guise of an airdrop or similar pretext, and then authorizes or signs, they will lose their assets.

Attackers will also impersonate administrators to post fake news, especially on platforms like Discord where this phenomenon is more common. Discord supports user-customized nicknames and usernames, so attackers will change their profile picture and nickname to match those of an administrator, then post phishing information in the channel or private message users. If users do not click on the account profile to view the username, it is difficult to detect the issue. Furthermore, although Discord usernames cannot be duplicated, attackers can use names that are highly similar to the administrator's username, such as adding an underscore or a period in the username, making it difficult for users to distinguish between real and fake accounts.

Invite Phishing

Attackers often establish contact with victims on social platforms, recommend "high-quality" projects or invite users to meetings, guide victims to visit malicious phishing sites, or download malicious applications. In the past, users have been hacked after downloading a fake Zoom app. Attackers use domains like "app[.]us4zoom[.]us" to disguise themselves as legitimate Zoom meeting links, with the page closely resembling the actual Zoom interface. When users click the "Start Meeting" button, they trigger the download of a malicious installation package instead of launching the local Zoom client or downloading Zoom's official client. As the malicious program prompts users to enter their passwords at runtime, and subsequent malicious scripts collect browser plugin wallet data and KeyChain data (potentially including various passwords saved on the computer), attackers collect this data to attempt decryption and obtain sensitive information such as the user's wallet mnemonic phrase/private key, leading to asset theft.

Search Engine Ranking Manipulation

Search engine ranking results can be boosted through ad promotion, leading to phishing sites potentially ranking higher than the genuine official websites. In cases where users are unaware of the official website's URL, it's challenging to differentiate a phishing site solely based on the site's appearance. Phishing sites can customize the URL displayed in Google Ads promotions, where the URL shown in the Sponsored section may be identical to the official URL, but when users click the ad's URL, they are redirected to the attacker's constructed phishing site. Because phishing sites created by attackers closely resemble genuine official sites, it's challenging to distinguish between them, making it inadvisable for users to directly search for official websites using search engines as they are likely to land on a phishing site.

TG Advertisement Scam

Recently, there has been a significant increase in users falling victim to fake TG Bots. Multiple users reported encountering a new bot at the top of the channel while using a trading bot, assuming it was an official new release and proceeding to import private keys to link wallets, only to be hacked. Attackers utilize Telegram to precisely target advertisements in official channels, enticing users to click. This form of phishing is highly covert because the ad appears in an official channel, leading users to instinctively believe it is an official robot release. Lacking vigilance, if users click the phishing bot and upload private keys to link, they risk being hacked.

In addition, we recently disclosed a new type of scam, the Telegram Fake Safeguard scam, where many users were stolen from because they ran malicious code following the attacker's tutorial.

App Store

Not all software on the app stores (Google Play, Chrome Store, App Store, APKCombo, etc.) are genuine. Often, the stores cannot fully review the software. Some attackers lure users into downloading fraudulent apps through methods like buying keyword rankings. Dear readers, please pay attention to verification. Before downloading, make sure to check the app developer information to ensure it matches the officially announced developer identity. You can also refer to app ratings, download counts, and other information.

Phishing Email

Email phishing is the most classic trick, known for being "simple and unadorned." Attackers use phishing templates and combine them with Evilngins reverse proxy to create emails like the one in the image below: when users click on "VIEW THE DOCUMENT," they will be redirected to a fake DocuSign interface (now unable to open). Subsequently, if a user clicks on Google Login on that interface, they will be redirected to a reverse-proxied Google login window. Once the user enters their account, password, and 2FA on that window, the account will be taken over by the attacker.

The phishing email in the image above is obviously not well-crafted because the sender's email address is not disguised. Let's see how the attacker in the image below disguises their identity: the attacker's email address differs from the official address by just a small dot. Attackers can use DNSTwist to find special characters supported by Gmail to make their email address look legitimate. If you don't look closely, you might think it's just a dirty computer screen.

Browser Feature Exploitation

See SlowMist's article: Revealing how malicious browser bookmarks can steal your Discord Token.

Defense Challenge

The tactics used by attackers are constantly evolving, generally moving towards a more sophisticated and standardized direction. In our previous analysis, we found that attackers are not only able to create web pages highly similar to those of well-known projects and take over the project's domain, but there are also cases where an entire project is fictitious. These fake projects not only have many (purchased) fans on social media but also have GitHub repositories, posing a greater challenge for users to identify phishing threats. Additionally, attackers' adept use of anonymous tools has made tracing their tracks more difficult and complex. To conceal their identities, attackers often use VPNs, Tor, or even control compromised hosts to carry out malicious activities.

With an anonymous identity established, attackers, to build a phishing network, also need to purchase basic service infrastructure, such as Namecheap, with support for cryptocurrency payments. Some services only require an email for registration, without the need for KYC verification, allowing attackers to avoid being traced.

Once the aforementioned preparations are in place, attackers can launch phishing attacks. After profiting, the funds are further obfuscated using services like Wasabi, Tornado, etc., to confuse the fund's path. To enhance anonymity, funds may also be converted into highly anonymous cryptocurrencies such as Monero.

To avoid leaving samples and evidence, attackers will cover their tracks by deleting related domain resolutions, malicious programs, GitHub repositories, platform accounts, etc. This often results in security personnel encountering situations where phishing websites cannot be accessed or malicious programs cannot be downloaded, increasing the difficulty of analysis and tracking.

Defense Strategy

Users can identify phishing threats based on the characteristics in the above image and learn basic methods to verify information authenticity. They can also use some defense tools to enhance phishing defense capabilities:

·  Phishing Risk Blocking Plugins: Tools like Scam Sniffer can detect risks from multiple dimensions. When users open suspicious phishing pages, the tool will promptly display a risk warning.

·  Secure Wallets with High Interaction Security: Such as Rabby's Watch-only wallet (no private key required), phishing website identification, see-and-sign, high-risk signature identification, history record Scam identification, etc.

·  Internationally Recognized Antivirus Software: Such as AVG, Bitdefender, Kaspersky, etc.

·  Hardware Wallet: A hardware wallet provides an offline way to store private keys. When interacting with a hardware wallet and DApp, the private key is not exposed online, effectively reducing the risk of asset theft.

Final Thoughts

In the blockchain dark forest, phishing attacks are omnipresent. Cultivation lies in the arising of every thought—being mindful of one's intentions to avoid unconsciously falling into a mental state. When navigating the blockchain dark forest, the most fundamental practice is to cultivate a habit of maintaining zero trust and continuous verification. It is recommended that everyone deeply read and gradually master the "Blockchain Dark Forest Survival Manual."

Due to space constraints, this article only introduces the main contents of the sharing session. The nearly seventy-page PPT is now publicly available.

Original Article Link

You may also like

a16z Leads $18M Seed Round for Catena Labs, Crypto Industry Bets on Stablecoin AI Payment

Traditional finance is still stuck in a "human-to-human" model, while Catena aims to achieve "AI-to-AI" interaction.

Pharos, deeply integrated with AntChain, is about to launch. How can we get involved?

What is the relationship between the $8 million funded NewChain and Ant, and how will they interact?

$COIN Joins S&P 500, but Coinbase Isn't Celebrating

On May 13, S&P Dow Jones Indices announced that Coinbase would officially replace Discover Financial Services in the S&P 500 on May 19. While other companies like Block and MicroStrategy, closely tied to Bitcoin, were already part of the S&P 500, Coinbase became the first cryptocurrency exchange whose primary business is in the index. This also signifies that cryptocurrency is gradually moving from the fringes to the mainstream in the U.S.



On the day of the announcement, Coinbase's stock price surged by 23%, surpassing the $250 mark. However, just 3 days later, Coinbase was hit by two consecutive events: a hack where employees were bribed to steal customer data and a demand for a $20 million ransom, and an investigation by the U.S. Securities and Exchange Commission (SEC) into the authenticity of its claim of having over 100 million "verified users" in its securities filings and marketing materials. These two events acted as mini-bombs, and at the time of writing, Coinbase's stock had already dropped by over 7.3%.


Coincidentally, Discover Financial Services, being replaced by Coinbase, can also be considered the "Coinbase" of the previous payment era. Discover is a U.S.-based digital banking and payment services company headquartered in Illinois, founded in 1960. Its payment network, Discover Network, is the fourth largest payment network apart from Visa, Mastercard, and American Express.


In April, after the approval of the acquisition of Discover by the sixth-largest U.S. bank, Capital One, this well-established digital banking company of over 60 years smoothly handed over its S&P 500 "seat" to this emerging cryptocurrency "bank." This unexpected coincidence also portrayed the handover between the new and old eras in Coinbase's entry into the S&P 500, resembling a relay race scene. However, this relay baton also brought Coinbase's accumulated "external troubles and internal strife" to a tipping point.


Side Effects of ETFs


Over the past decade, cryptocurrency exchanges have been the most stable "profit machines." They play a role in providing liquidity to the entire industry and rely on trading fees to sustain their operations. However, with the comprehensive rollout of ETF products in the U.S. market, this profit model is facing unprecedented challenges. As the leader in the "American stack," with over 80% of its business coming from the U.S., Coinbase is most affected by this.



Starting from the approval of Bitcoin and Ethereum spot ETFs, traditional financial capital has significantly onboarded users and funds that originally belonged to exchanges in a more cost-effective, compliant, and transparent manner. The transaction fee revenue of cryptocurrency exchanges has started to decline, and this trend may further intensify in the coming months.


According to Coinbase's 2024 Q4 financial report, the platform's total trading revenue was $417 million, a 45% year-on-year decrease. The contribution of BTC and ETH's trading revenue dropped from 65% in the same period last year to less than 50%.


This decline is not a result of a decrease in market enthusiasm. In fact, since the approval of the Bitcoin ETF in January 2024, the inflow of BTC into the U.S. market has continued to reach new highs, with asset management giants like BlackRock and Fidelity rapidly expanding their management scale. Data shows that BlackRock's iShares Bitcoin ETF (IBIT) alone has surpassed $17 billion in assets under management. As of mid-May 2025, the cumulative net inflow of 11 major institutional Bitcoin spot ETFs on the market has exceeded $41.5 billion, with a total net asset value of $1214.69 billion, accounting for approximately 5.91% of the total Bitcoin market capitalization.


Chart showing the trend of net outflows for Grayscale among the 11 institutions


Institutional investors and some retail investors are shifting towards ETF products, partly due to compliance and tax considerations. On one hand, ETFs have much lower trading costs compared to cryptocurrency exchanges. While Coinbase's spot trading fee rate varies annually in a tiered manner but averages around 1.49%, for example, the management fee for IBIT ETF is only 0.25%, and the majority of ETF institution fees fluctuate around 0.15% to 0.25%.



In other words, the more rational users are, the more likely they are to move from exchanges to ETF products, especially for investors aiming for long-term holdings.


According to multiple sources, several institutions, including VanEck and Grayscale, have submitted applications to the SEC for a Solana (SOL) ETF, with some institutions also planning to submit an XRP ETF proposal. Once approved, this may trigger a new round of fund migration. According to a report submitted by Coinbase to the SEC, as of April, the platform's trading revenue from XRP and Solana accounted for 18% and 10%, nearly one-third of the platform's fee revenue.



However, the Bitcoin and Ethereum ETFs passed in 2024 also reduced the fees for these two tokens on Coinbase from 30% and 15% to 26% and 10%, respectively. If the SOL and XRP ETFs are approved, it will further undermine the core fee revenue of exchanges like Coinbase.


The expansion of ETF products is gradually weakening the financial intermediary status of cryptocurrency exchanges. From their original roles as matchmakers and clearers to now gradually becoming mere "on-ramps and off-ramps" for funds, exchanges are seeing their marginal value squeezed by ETFs.


Robinhood Takes a Stand, Traditional Brokerages Join the Fray


On May 12, 2025, SEC Chairman Paul S. Atkins gave a keynote speech at the Tokenization and Cryptocurrency Working Group roundtable. The theme of his speech revolved around "It is a new day at the SEC," where he indicated that the SEC would not approach enforcement and regulation the same way as before but would instead pave the way for cryptocurrency assets in the U.S. market.



With signs of cryptocurrency compliance such as the SEC's "NEW DAY" declaration, an increasing number of traditional brokerages are attempting to enter the cryptocurrency industry. One of the most representative cases is the well-known U.S. brokerage Robinhood, which began expanding its crypto business in 2018. By the time of its IPO in 2021, Robinhood's crypto business revenue accounted for over 50% of the company, with a significant boost from the Dogecoin "moonshot" promoted by Musk.


In Q1 2025 earnings report, Robinhood showcased strong growth, especially in revenue from cryptocurrency and options trading. Fueled by Trump's Memecoin, cryptocurrency-related revenue reached $250 million, nearly doubling year-over-year. Consequently, Robinhood Gold subscription users reached 3.5 million, a 90% increase from the previous year, with the rapid growth of Robinhood Gold providing the company with a stable source of income.



Meanwhile, RobinHood is actively pursuing acquisitions in the cryptocurrency space. In 2024, it announced a $2 billion acquisition of the long-standing European cryptocurrency exchange Bitstamp. Additionally, Canada's largest cryptocurrency CEX, WonderFi, which recently went public on the Toronto Stock Exchange, also announced its integration with RobinHood Crypto. After obtaining virtual asset licenses in the UK, Canada, Singapore, and other markets, RobinHood has taken a proactive approach in the compliant cryptocurrency trading market.



Furthermore, an increasing number of brokerage firms are exploring the same path. Futu Securities, Tiger Brokers, and others are also dipping their toes into cryptocurrency trading, with some having applied for or obtained the VA license from the Hong Kong SFC. Although their user bases are currently small, traditional brokerages have a natural advantage in user trust, regulatory licenses, and low fee structures. This could pose a threat to native cryptocurrency platforms in the future.



User Data Breach: Is Coinbase Still Secure?


In April 2025, security researchers discovered that some Coinbase user data was leaked on the dark web. While the platform initially responded by attributing it to a "technical misinformation," it still raised concerns among users regarding its security and privacy protection. Just two days before Dow Jones Indexes announced Coinbase's addition to the S&P 500 Index, on May 11, 2025, Coinbase received an email from an unknown threat actor claiming to have obtained customer account information and internal documents, demanding a $20 million ransom to keep the data private. Subsequent investigations confirmed the data breach.


Cybercriminals obtained the data by bribing overseas customer service agents and support staff, mainly in "non-U.S. regions such as India." These agents abused their access to Coinbase's internal customer support system and stole customer data. As early as February this year, blockchain detective ZachXBT revealed on X platform that between December 2024 and January 2025, Coinbase users lost over $65 million to social engineering scams, with the actual amount potentially higher.


Among the victims was a well-known figure, 67-year-old Ed Suman, an established artist in the art world for nearly two decades, having been involved in the creation of artworks such as Jeff Koons' "Balloon Dog" sculpture. Earlier this year, he fell victim to an impersonation scam involving fake Coinbase customer support, resulting in a loss of over $2 million in cryptocurrency. ZachXBT critiqued Coinbase for its inadequate handling of such scams, noting that other major exchanges have not faced similar issues and recommending Coinbase to enhance its security measures.


Amidst a series of ongoing social engineering incidents, although there has not been any impact on user assets at the technical level so far, it has raised concerns among many retail and institutional investors. Especially institutions holding massive assets on Coinbase. Just considering the U.S. BTC ETF institutions, as of mid-May 2025, they collectively hold nearly 840,000 BTC, and 75% of these are custodied by Coinbase. If we price BTC at $100,000, this amount reaches a staggering $63 billion, which is equivalent to the nominal GDP of two Iceland in the year 2024.


Visualization: ChatGPT, Source: Farside


In addition, Coinbase Custody also serves over 300 institutional clients, including hedge funds, family offices, pension funds, and endowments. As of the Q1 2025 financial report, Coinbase's total assets under management (including institutional and retail clients) reached $404 billion. The specific amount of institutional custodied assets was not explicitly disclosed in the latest report, but it should still be over 50% based on the Q4 2024 report.


Visualization: ChatGPT


Once this security barrier is breached, not only could the rate of user attrition far exceed expectations, but more importantly, institutional trust in it would undermine the foundation of its business. Therefore, after a hacking event, Coinbase's stock price plummeted significantly.


CEXs are All in Self-Rescue Mode


Facing a decline in spot trading fee revenue, Coinbase is also accelerating its transformation, attempting to find growth opportunities in derivatives and emerging assets. Coinbase acquired a stake in the options platform Deribit at the end of 2024 and announced the official launch of perpetual contract products in 2025. This acquisition fills in Coinbase's gap in options trading and its relatively small global market share.



Deribit has a strong presence in non-U.S. markets, especially in Asia and Europe. The acquisition has enabled Coinbase to gain a dominant position in bitcoin and ethereum options trading on Deribit, accounting for approximately 80% of the global options trading volume, with daily trading volume remaining above $2 billion.


Meanwhile, 80-90% of Deribit's customer base consists of institutional investors, with their professionalism and liquidity in the Bitcoin and Ethereum options market highly favored by institutions. Coinbase's compliance advantage, coupled with its already robust institutional ecosystem, makes it even more suitable. By using institutions as an entry point, it can face the squeeze from giants like Binance and OKX in the derivatives market.



Facing a similar dilemma is Kraken, which is attempting to replicate Binance Futures' model in non-U.S. markets. Since the derivatives market relies more on professional users, fee rates are relatively higher and stickiness is stronger, making it a significant source of revenue for exchanges. In the first half of 2025, Kraken completed the acquisition of TradeStation Crypto and a futures exchange, aiming to build a complete derivatives trading ecosystem to hedge the risk of declining spot transaction fee income.


With the surge of Memecoin in 2024, Binance, OKX, and various CEX platforms began massively listing small-market-cap, highly volatile tokens to activate active trading users. Due to the wealth effect and trading activity of Memecoins, Coinbase was also forced to join the battle, successively listing popular tokens from the Solana ecosystem such as BOOK OF MEME and Dogwifhat. Although these coins are controversial, they are frequently traded, with fee rates several times higher than mainstream coins, serving as a "blood-boosting" method for spot trading.


However, due to its status as a publicly traded company, this practice is a riskier endeavor for Coinbase. Even in the current crypto-friendly environment, the SEC is still investigating whether tokens like SOL, ADA, and SAND constitute securities.


In addition to the forced transformation strategies carried out by the aforementioned CEXs, they are also starting to lay out RWAs and the most talked-about stablecoin payment fields, such as the PYUSD launched through a collaboration between Coinbase and Paypal, Coinbase's support for the Euro stablecoin EURC by Circle that complies with EU MiCA regulatory requirements, or the USD1 launched through a collaboration between Binance and WIFL. In the increasingly crowded trading field, many CEXs have shifted their focus from just the trading market to the application field.


The golden age of transaction fees has quietly ended, and the second half of the crypto exchange platform game has silently begun.


Key Market Insights for May 16th, how much did you miss out on?

1. On-chain Flows: $111.3M inflow to Ethereum this week; $237.6M outflow from Berachain 2. Largest Price Swings: $ETHFI, $NEIRO 3. Top News: Data: Solana Network's revenue reached $7.9M on the 13th, surpassing the sum of all other L1 and L2 chains

MOG Coin Skyrockets as Elon Musk and Garry Tan Embrace "mog/acc" Identity

「mog/acc」 is rapidly sweeping through various figures, from Elon Musk to Garry Tan, boosting the project's visibility and ultimately driving up the price.

The End and Rebirth of NFTs: How the Meme Coin Craze Ended the PFP Era?

There must be another Labubu hidden beneath the ruins.

Popular coins

Latest Crypto News

Read more