Skip to content

Criminals Successfully Lift 143 ETH through Manipulation of Transactional Simulations

Cryptocurrency thieves employ a novel method called "transaction simulation fraud" according to Scam Sniffer's security specialists, potentially draining digital assets. This deceitful strategy might result in substantial losses in a single instance.

Cybercriminals Swipe 143 Ether by Manipulating Transactional Technique
Cybercriminals Swipe 143 Ether by Manipulating Transactional Technique

Criminals Successfully Lift 143 ETH through Manipulation of Transactional Simulations

In the rapidly evolving world of cryptocurrencies, the security of Web3 wallets has become a paramount concern. Recently, a new vulnerability has been identified that could potentially put users' funds at risk.

This vulnerability, known as transaction simulation spoofing, involves a time delay between the simulation and the actual execution of transactions. Scam Sniffer experts advise that Web3 wallet developers synchronize transaction simulation updates with the actual block creation time to mitigate this risk.

To prevent cryptocurrency theft, developers can implement transaction assertion guards or simulation-based validation techniques. For instance, Solana blockchain developers use tools like Lighthouse assertion guards to simulate transactions and assert critical conditions, effectively blocking attack instructions that would illegally drain funds.

Enhancing wallet interfaces is another crucial step. Developers should require manual address confirmation before a transaction is sent, reducing the risk of spoofed or "poisoned" addresses being used unknowingly by the user. Address verification alerts for new or infrequently used recipients, checksum schemes, and user education are also key prevention methods.

On the user side, vigilance is essential. Users should be alerted to the heightened risk before critical operations in Web3 wallets. They should avoid relying on auto-populated addresses, double-check recipient addresses, and use safer methods like QR codes or copy-paste to input addresses.

Protecting against malicious browser extensions or software that might steal wallet secrets or seed phrases is equally important. These can enable attackers to submit spoofed transactions directly.

In sum, preventing transaction simulation spoofing relies on a combination of technical safeguards at the wallet and smart contract level, careful user interface design, and user vigilance to avoid social engineering or software-based attacks. No single approach suffices alone; rather, layered defenses that combine simulation validation, user confirmation, and education form the best strategy against these threats.

It is important to note that this new vulnerability was not present in the earlier scheme exposed by Scam Sniffer in late 2024, which involved fake influencers and malicious Telegram bots to steal crypto assets.

On January 10, 2025, a vulnerability in Web3 wallets was discovered where attackers can change contract states on-chain between simulation and execution, potentially draining users' wallets if they sign the transaction. This vulnerability can be exploited by attackers to change the state of contracts on-chain, and it is crucial for developers and users to be aware of this risk and take appropriate measures to secure their wallets.

  1. To address the issue of transaction simulation spoofing, Ethereum developers could consider implementing simulation-based validation techniques, similar to those used on the Solana blockchain, in their Web3 wallets.
  2. As the risk of cybersecurity threats increases with the use of Web3 wallets, it's essential for users to be vigilant and avoid relying on auto-populated addresses, while also educating themselves about protection measures related to Ethereum technology.

Read also:

    Latest