How to identify onchain scams and secure your wallet

As Web3 continues to evolve at pace, the onchain ecosystem is flourishing, with rising numbers of users participating in onchain transactions and other activities. Simultaneously, various onchain scams are emerging, with fraudsters tricking users into authorizing transactions or revealing their keys to steal assets.

To help users safeguard their Web3 security, OKX offers multi-layered security measures. We also advise users to remain vigilant and educate themselves on the threats out there, especially in high-risk scenarios.

In this article, we'll spotlight some common onchain scam cases, alongside OKX's countermeasures and user recommendations. By the end, you should be wel placed to identify and avoid major Web3 risks.

Induced authorization theft

Gaining authorization maliciously is a common tactic used to commit a Web3 scam. Here, fraudsters would create false authorization transactions to trick users into signing, thereby gaining operational control over the user's assets.

Approval authorization scams

Approval authorization scams see the criminal use methods for stealing authorization from users. Here are two common examples to look out for.

  • Phishing links: Fraudsters share so-called "high-yield" trading information in communities, guiding users to click on links to steal authorization for "deposit mining" or "staking airdrops."

  • OTC disguise: Scammers pose as OTC merchants, asking users to make a small test transfer of $1. This is actually an authorization transaction, granting them control over the user's assets.

OKX Wallet security measures

  • First defense: Malicious detection of login URLs, blocking access if the URL is identified as malicious.

  • Second defense: Intercepting authorization to externally owned accounts (EOA) addresses even if the site isn’t flagged as malicious.

  • Third defense: Blocking authorization to contracts identified as malicious.

  • Fourth defense: For specific networks (such as Tron), intercepting transactions if the signature content and description don't match.

Approval authorization scams example
Source: OKX

Permit and Permit2 authorization scams

Permit and Permit2, introduced by Uniswap to save Gas fees, can be exploited by hackers to trick users into authorizing transactions.

OKX Wallet security measures

  • First line of defense: Clearly displays transaction types as permit authorizations, marking involved tokens, scope of permissions, and expiration times.

  • Second line of defense: Automatically block and prompt users to review transaction risks for potentially risky decentralized application (DApp) requests.

Permit authorization scams
Source: OKX

eth_sign authorization scams

eth_sign allows a user to sign any transaction hash, which is like providing a "blank check" on Ethereum. Fraudsters trick users into using eth_sign to construct custom transactions and steal assets.

OKX Wallet security measures

  • Automatic interception: Automatically identifies and blocks eth_sign transactions due to their high phishing nature.

How to protect yourself

  • Stay vigilant: Don't blindly follow financial advice from social media or group chats, especially those involving unknown links or supposedly high-yield projects.

  • Avoid interacting with unknown contracts: Verify the reliability of contract sources before authorizing them. Interact only with well-known platforms or DApps you fully understand.

  • Refuse unknown transaction signatures: Carefully check the authorization target and amount before approving transactions, especially for "approve" and "increase allowance" operations.

  • Understand new authorization risks: Although new authorizations like Permit and Permit2 save gas fees, they may pose security risks.

Screenshot and screen recording key theft

Scammers also sometimes pose as investment advisors or trading experts to trick new users into revealing their private keys or mnemonic phrases through screenshots or screen sharing.

OKX Wallet security measures

  • First line of defense: Disable screenshot and screen recording on sensitive interfaces and warn users of the risks.

  • Second line of defense: Prevent screen sharing of mnemonic phrases.

How to protect yourself

  • Handwrite and securely store mnemonic phrases: Record mnemonic phrases on paper, avoiding screenshots or electronic storage.

  • Beware of strangers requesting mnemonic phrases: Never share mnemonic phrases with anyone.

  • Avoid remote assistance: Dont' display mnemonic phrases or private keys during remote assistance.

Screenshot and screen recording key theft 1
Source: OKX
Screenshot and screen recording key theft 2
Source: OKX
Screenshot and screen recording key theft 3
Source: OKX
Screenshot and screen recording key theft 4
Source: OKX

Malicious airdrop theft

Fraudsters use malicious airdrops as another way of scamming users. Here, the scammer sends worthless tokens to many addresses, tricking users into interacting with phishing sites to sell these tokens, leading to asset theft.

Malicious airdrop theft
Source: OKX

OKX Wallet security measures

  • Hide suspicious airdrop tokens: Automatically hides suspected malicious airdrop tokens to prevent users from interacting with them.

How to protect yourself

  • Don't interact with unknown airdrop tokens: Be cautious of unknown airdrop tokens and verify their information before interacting.

  • Avoid logging into suspicious sites: Never trust non-official channels for selling tokens that can't be traded on regular platforms.

Similar address scams

Fraudsters create addresses similar to those users interact with, tricking them into transferring assets to the wrong address.

OKX Wallet security measures

  • Highlight similar addresses: We list similar addresses on the transfer page to prompt users to verify the correct address.

Similar address scams
Source: OKX

How to protect yourself

  • Carefully verify transfer addresses: Check the first and last few characters of the address before transferring.

  • Support address labels: Use address labels to quickly identify and avoid errors.

Project team exit scams

Some project teams may misuse user authorizations to transfer assets before disappearing, leaving users with nothing.

OKX Wallet security measures

  • Authorization reminders: Reminds users to cancel unnecessary authorizations for DApps not used for a long time.

Project team exit scams
Source: OKX

How to protect yourself

  • Be Cautious with authorizations: Don't easily authorize DApps or contracts, especially those promising "high returns" or "no risk."

  • Regularly manage authorizations: Regularly check for and cancel DApp authorizations that haven't been used in a long time.

Rug pull scams

Similar to project team exit scams is the rug pull. Here, fraudsters promote tokens to attract users, then manipulate prices higher so they can exit with a massive gain. Meanwhile, users are prevented from selling their assets, causing losses.

OKX Wallet security measures

  • Risk assessment interception: Our built-in engine evaluates token risks and blocks high-risk purchases.

  • Onchain risk detection: Provides risk token detection for supported chains.

How to protect yourself

  • Be aware of rug pull risks: Verify token information on official platforms before purchasing.

  • Avoid following the hype: Stay cautious and don't participate in hype, especially if it's a project you're not familiar with.

The final word

Crypto scams are constantly evolving, presenting traders like you with new threats to understand and mitigate. Taking the time to regularly educate yourself about new risks and how to manage them is key, and we're here to help.

Read our guide on how to spot crypto scams in 2024 for more insight, and check out our wider scam guides to understand other crypto threats.

إخلاء المسؤولية
يتم توفير المحتوى لأغراض إعلامية فقط وقد يغطي المنتجات غير المتوفرة في منطقتك. وليس المقصود منها تقديم (1) نصيحة أو توصية استثمارية؛ أو (2) عرض أو التماس لشراء أصول رقمية، أو بيعها، أو تخزينها، أو (3) مشورة مالية أو محاسبية أو قانونية أو ضريبية. ينطوي تخزين عملات الأصول الرقمية، بما في ذلك العملات المستقرة والرموز المميزة غير القابلة للاستبدال (NFT)، على درجة عالية من المخاطر، ويمكن أن تتقلب بشكل كبير. يجب عليك أن تفكر بعناية فيما إذا كان تداول أو تخزين عملات الأصول الرقمية مناسبًا لك في ضوء حالتك المالية. يُرجى استشارة أخصائي الشؤون القانونية أو الضريبية أو الاستثمارية لديك لطرح الأسئلة حول ظروفك المحددة. والمعلومات (التي تشمل بيانات السوق والمعلومات الإحصائية، إن وجدت) التي تظهر في هذا المنشور هي لأغراض إعلامية عامة فقط. وعلى الرغم من بذل كل العناية المعقولة في إعداد هذه البيانات والرسوم البيانية، لا يُقبل تحمل أي مسؤولية أو التزام قانونية تجاه أية أخطاء في الحقائق أو حذف صريح في هذه المقالة. يخضع سوق محافظ OKX عبر Web3 ورموز OKX المميزة غير القابلة للاستبدال لشروط خدمة منفصلة على www.okx.com.
© 2024 ‎OKX‎. يجوز إعادة إنتاج هذه المقالة أو توزيعها بالكامل، أو يجوز استخدام مقتطفات من 100 كلمة أو أقل من هذه المقالة، شريطة أن يكون هذا الاستخدام لأغراض غير تجارية. يجب أيضًا أن تنص أي إعادة إنتاج أو توزيع للمقالة بالكامل بوضوح على ما يلي: "هذه المقالة تحمل حقوق الطبع والنشر © 2024 ‎OKX‎ ويجب استخدامها بإذن." ويجب أن تشير المقتطفات المسموح بها إلى اسم المقالة وتتضمن إسنادًا، على سبيل المثال "اسم المقالة، و[اسم المؤلف إن أمكن]، و© 2024 ‎OKX‎." ولا يُسمح بأية أعمال مشتقة أو استخدامات أخرى لهذه المقالة.
توسيع
المقالات ذات الصلة
عرض المزيد
عرض المزيد