Unveiling the Principles of Web3 Signature Phishing: A Comprehensive Analysis of Underlying Logic and Preventive Measures

The Underlying Principles of Web3 Signature Phishing and Prevention Measures

Recently, "signature phishing" has become one of the most common scam tactics used by Web3 hackers. Despite security experts and wallet companies continuously promoting relevant knowledge, many users still fall into traps every day. One important reason for this situation is that most people lack an understanding of the underlying logic of wallet interactions, and the learning curve is high for non-technical individuals.

In order to help more people understand this issue, this article will explain the underlying logic of signature phishing in a simple and easy-to-understand manner.

Two Basic Types of Wallet Operations

When using a cryptocurrency wallet, we mainly have two operations: "signing" and "interacting".

  • Signature: Occurs outside the blockchain (off-chain), no Gas fees are required.
  • Interaction: Occurs on the blockchain (on-chain) and requires payment of Gas fees.

Signatures are typically used for authentication, such as logging into a wallet or connecting to a DApp. This process does not change any data or state on the blockchain, so there is no cost involved.

Interaction involves actual blockchain operations. For example, when swapping tokens on a DEX, you first need to authorize the smart contract to use your tokens (approve), and then execute the actual swap operation. Both of these steps require paying Gas fees.

Plain Interpretation of Web3 Signature Phishing Underlying Logic: Authorization Phishing, Differences Between Permit and Permit2

Common Phishing Methods

1. Authorized Phishing

This is a traditional Web3 phishing technique. Hackers usually create a website disguised as a legitimate project to lure users into clicking buttons like "Claim Airdrop." In reality, after clicking, users will be asked to approve the hacker's address to use their tokens.

Although this method requires paying Gas fees, there are still users who may accidentally fall for it.

Plain Language Interpretation of the Underlying Logic of Web3 Signature Phishing: The Difference Between Authorization Phishing, Permit, and Permit2

2. Permit signature phishing

Permit is an extension feature of the ERC-20 standard that allows users to authorize others to use their tokens through a signature. Unlike traditional authorization, Permit does not require users to pay Gas fees.

Hackers can exploit this mechanism to lure users into signing a seemingly harmless message, which is actually a Permit that authorizes the hacker to use the user's tokens.

Plain Language Interpretation of the Underlying Logic of Web3 Signature Phishing: Differences Between Authorization Phishing, Permit, and Permit2

3. Permit2 signature phishing

Permit2 is a feature launched by a certain DEX, aimed at simplifying user operations and saving Gas fees. Users can authorize a large amount to the Permit2 smart contract in one go, after which they only need to sign for each transaction, and the Gas fees are paid by the contract (deducted from the final exchanged tokens).

However, this also provides new attack vectors for hackers. If users have ever used this DEX and authorized an unlimited amount to the Permit2 contract, hackers can induce users to sign and transfer their tokens.

Plain Language Interpretation of the Underlying Logic of Web3 Signature Phishing: Differences Between Authorization Phishing, Permit, and Permit2

Preventive Measures

  1. Increase security awareness: Every time you perform a wallet operation, you should carefully check the specific action you are executing.

  2. Fund Separation: Separate large funds from the wallet used for daily transactions to reduce potential losses.

  3. Learn to recognize the signature formats of Permit and Permit2: Be especially cautious when you see signature requests containing the following information:

    • Interactive: Interactive website
    • Owner: Authorizing party address
    • Spender: Authorized party address
    • Value: Authorized Quantity
    • Nonce: random number
    • Deadline: Expiration Time

By understanding these underlying mechanisms and taking appropriate precautions, users can significantly reduce the risk of becoming victims of signature phishing. In the Web3 world, staying vigilant and continuously learning is key to protecting one's assets.

GAS-3.56%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Share
Comment
0/400
shadowy_supercodervip
· 07-10 09:20
Suckers have been baited again.
View OriginalReply0
ConsensusBotvip
· 07-10 06:27
Wallet Airdrop gets scammed every day, it's so tragic.
View OriginalReply0
TokenVelocityTraumavip
· 07-10 06:26
Sigh, it seems that too many people are still being scammed by signatures.
View OriginalReply0
BankruptWorkervip
· 07-10 06:16
Suckers will eventually be reborn.
View OriginalReply0
NeverPresentvip
· 07-10 06:01
I have to learn Blockchain again... It's overwhelming.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)