{"id":79618,"date":"2024-05-27T12:44:36","date_gmt":"2024-05-27T16:44:36","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=79618"},"modified":"2024-05-27T12:44:40","modified_gmt":"2024-05-27T16:44:40","slug":"ethereum-re-staking-exploit-victim-gets-funds-back","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/ethereum-re-staking-exploit-victim-gets-funds-back\/","title":{"rendered":"Ethereum Re-staking Exploit Victim Gets Funds Back"},"content":{"rendered":"\n<p>On May 26, an unlucky victim lost 1,807 <a href=\"https:\/\/coinscreed.com\/staging\/hacker-transfers-10m-worth-of-ether-from-2023-phishing-attack.html\" target=\"_blank\" rel=\"noreferrer noopener\">liquid staked Ethers<\/a> valued at $6.91 million. The hacker has returned a substantial portion of the stolen funds.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"988\" height=\"406\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-74.png\" alt=\"Ethereum Re-staking Exploit Victim Gets Funds Back\" class=\"wp-image-79627\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-74.png 988w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-74-300x123.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-74-768x316.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-74-750x308.png 750w\" sizes=\"(max-width: 988px) 100vw, 988px\" \/><figcaption class=\"wp-element-caption\">Ethereum Re-staking Exploit Victim Gets Funds Back<\/figcaption><\/figure>\n\n\n\n<p>Yu Xian, co-founder of blockchain analytics firm SlowMist, wrote, &#8220;Yesterday, the old phishing group Inferno Drainer used the permit offline authorization signature to phish away nearly US$7 million in ETH ETH-pledged assets from a user.&#8221; &#8220;They received a refund today, which is extremely uncommon.&#8221;&nbsp;<\/p>\n\n\n\n<p>Scam Sniffer reported on X, the same day that the victim recovered 1,445 Ether, or 80%, of the stolen funds after the con artists purportedly retained a 20% bounty.&nbsp;<\/p>\n\n\n\n<p>Permit phishing is a malicious attack in which a malicious actor generates an authentic off-chain authorization signature for the designated recipient to transfer <a href=\"https:\/\/coinscreed.com\/staging\/coinbase-introduces-recovery-tool-for-lost-erc-20-tokens.html\" target=\"_blank\" rel=\"noreferrer noopener\">ERC-20 tokens<\/a> from a wallet that is not theirs. Analysts assert that the wallet address associated with the breach was the target of this breach.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-jnews-featured-750\"><img decoding=\"async\" width=\"750\" height=\"439\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-73-750x439.png\" alt=\"The victim who allegedly lost $7 million from a permit phishing attack. Source: Scam Sniffer\" class=\"wp-image-79625\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-73-750x439.png 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-73-300x176.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-73-768x449.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-73.png 940w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><figcaption class=\"wp-element-caption\">The victim allegedly lost $7 million from a permit phishing attack. Source: Scam Sniffer<\/figcaption><\/figure>\n\n\n\n<p>EIP-2612, according to SlowMist, introduced a neglected feature in Ethereum permits that renders the attack executable. The EIP permits users to engage with smart contracts without prior approval by including a digital signature as authorization.&nbsp;<\/p>\n\n\n\n<p>Nevertheless, regardless of ownership, the permit function remains executable from any account. Therefore, if users had previously compromised their wallet signatures on phishing websites, fraudsters could still siphon tokens from their wallets using the permit exploit, even if they did not approve of any transactions.&nbsp;<\/p>\n\n\n\n<p>To mitigate the risk of such attacks, SlowMist proposed:&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>&#8220;It is recommended to periodically use authorization tools like RevokeCash (<a href=\"https:\/\/revoke.cash\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/revoke.cash<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>) to identify any abnormal authorizations. For Uniswap Permit2, the authorization management tool at https:\/\/app.scamsniffer.io\/permit2 can be utilized for verification. If any irregular authorizations are detected, it is crucial to promptly revoke them.&#8221;<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>However, not everyone felt compassion for the victim in this particular incident.&nbsp;<\/p>\n\n\n\n<p>&#8220;How did you fall victim to phishing last year for $638,000 and again this year for $698,000?&#8221; &#8220;A few individuals are simply irresponsible with their assets,&#8221; remarked renowned DeFi investigator ZachXBT.&nbsp;<\/p>\n\n\n\n<p>Cointelegraph reported in March that schemes involving cryptocurrencies have increased by 53% over the past year. The Federal Bureau of Investigation (FBI) reported that investment fraud associated with cryptocurrencies constituted 86% of the total investment losses reported globally in 2023.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On May 26, an unlucky victim lost 1,807 liquid staked Ethers valued at $6.91 million. The hacker has returned a substantial portion of the stolen funds.\u00a0 Yu Xian, co-founder of blockchain analytics firm SlowMist, wrote, &#8220;Yesterday, the old phishing group Inferno Drainer used the permit offline authorization signature to phish away nearly US$7 million in [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":79627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[6921,19737,2118],"class_list":["post-79618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-exploits","tag-ethereum-re-staking","tag-hacker"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/05\/image-74.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/79618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=79618"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/79618\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/79627"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=79618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=79618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=79618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}