Skip to content

Commit

Permalink
Merge pull request #734 from chartingshow/summercms-patch-115267
Browse files Browse the repository at this point in the history
Add Transaction Simulation Spoofing Attack to Doc's
  • Loading branch information
summercms authored Jan 11, 2025
2 parents 801b65a + 4af355b commit a7d0995
Showing 1 changed file with 33 additions and 0 deletions.
33 changes: 33 additions & 0 deletions docs/scams/transaction-simulation-spoofing-attack.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
# Transaction Simulation Spoofing Attack

### How the attack works

**Transaction simulation** is a feature that allows users to preview the expected outcome of a blockchain transaction before signing and executing it.

It is designed to enhance security and transparency by helping users verify what the transaction will do, like the amount of transferred cryptocurrency, gas fees and other transaction costs and other on-chain data changes.

### Attack Sequence Breakdown

1. The attackers lure victims to a malicious website that mimics a legitimate platform
2. The attackers initiates what is made to appear as a "**Claim ETH function**".
3. The transaction simulation shows that the user will receive a small amount in ETH.
4. However, a time delay between the simulation and the execution allows the attackers to alter the on-chain contract state to change what the transaction will actually do if "approved".
5. The victim, trusting the wallet's transaction simulation result, signs the transaction, allowing the website to **drain their wallet of all crypto and send it to the attacker's wallet**.

The core vulnerability lies in the time gap between transaction simulation and execution. Malicious actors have developed phishing sites that can manipulate on-chain states during this crucial window, leading to devastating results.

<p align="center"><img src="https://github.com/chartingshow/crypto-firewall/blob/master/assets/images/transaction-simulation-spoofing/transaction-simulation-spoofing.jpg" alt="Transaction Simulation Spoofing"></p>

This new attack vector represents a significant evolution in phishing techniques.

Rather than relying on simple deception, attackers are now exploiting trusted wallet features that users rely on for security. This sophisticated approach makes detection particularly challenging.

The blockchain monitoring platform suggests that Web3 wallets reduce the simulation refresh rates to match blockchain block times, force refresh simulation results before critical operations, and add expiration warnings to warn users about the risk.

> From the user's perspective, this new attack shows why **wallet simulation shouldn't be trusted!**
>
> Cryptocurrency holders should treat "**free claim**" offers such as "**Air Drops**" on obscure websites with caution and only trust verified dApps!
## Learn More

https://drops.scamsniffer.io/transaction-simulation-spoofing-a-new-threat-in-web3/

0 comments on commit a7d0995

Please sign in to comment.