{"id":93370,"date":"2024-09-15T04:57:51","date_gmt":"2024-09-15T08:57:51","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=93370"},"modified":"2024-09-15T04:57:58","modified_gmt":"2024-09-15T08:57:58","slug":"phishing-attack-drains-36k-approves-setowner","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/phishing-attack-drains-36k-approves-setowner\/","title":{"rendered":"Phishing Attack Drains $36K After Victim Approves Malicious &#8216;SetOwner&#8217;"},"content":{"rendered":"\n<p>A <a href=\"https:\/\/coinscreed.com\/staging\/crypto-phishing-attacks-over-1-million-decrease-75-in-february.html\" target=\"_blank\" data-type=\"post\" data-id=\"73306\" rel=\"noreferrer noopener\">phishing attack<\/a> drained $36,316 after the victim unknowingly approved a malicious transfer. Scam Sniffer reported the incident on its official X account, revealing details of the attack.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/blog-phishing-1200x900-1-1024x768.jpg\" alt=\"Phishing Attack Drains $36K After Victim Approves Malicious 'SetOwner'\" class=\"wp-image-93371\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/blog-phishing-1200x900-1-1024x768.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/blog-phishing-1200x900-1-300x225.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/blog-phishing-1200x900-1-768x576.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/blog-phishing-1200x900-1-860x645.jpg 860w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/blog-phishing-1200x900-1.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Phishing Attack Drains $36K After Victim Approves Malicious &#8216;SetOwner'<\/figcaption><\/figure>\n\n\n\n<p>The victim inadvertently authorized a malicious transfer, which resulted in a $36,316 loss as a result of a phishing attack. Scam Sniffer disclosed the specifics of the assault on its official X account.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">\ud83d\udea8 5 hours ago, another victim lost $36,316 due to signing a &quot;setOwner&quot; phishing signature that changed its DSProxy&#39;s ownership. \ud83d\udcb8 <a href=\"https:\/\/t.co\/xCFQ9dzzj7\" target=\"_blank\">https:\/\/t.co\/xCFQ9dzzj7<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> <a href=\"https:\/\/t.co\/hVoyDvwnNv\" target=\"_blank\">pic.twitter.com\/hVoyDvwnNv<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) <a href=\"https:\/\/twitter.com\/realScamSniffer\/status\/1834967851327013381?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 14, 2024<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Swindle Ultimately, the phishing assault facilitated the transfer of ownership of the victim's DSProxy, as noted by Sniffer. DSProxy functions as a smart contract wallet that is integrated into <a href=\"https:\/\/coinscreed.com\/staging\/addressing-scalability-and-interoperability-in-defi-applications.html\" target=\"_blank\" data-type=\"post\" data-id=\"79725\" rel=\"noreferrer noopener\">DeFi applications.<\/a><\/p>\n\n\n\n<p>The fraud was significantly influenced by a phishing signature known as &#8220;setOwner.&#8221; It functions as a deceptive strategy employed by assailants to gain access to a victim's digital assets.<\/p>\n\n\n\n<p>The victim inadvertently authorized the signature in question. The exploiter was under the impression that the signature was a legitimate transfer when he approved it.<\/p>\n\n\n\n<p>Nevertheless, the victim transferred their DSProxy to the fraudster by signing the malicious transfer. The exploiter then drained the wallet, culminating in the loss of 36,000 in digital assets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing Attacks are Rising, underscoring the Necessity for Increased Security Measures and Awareness<\/h2>\n\n\n\n<p>In the field of DeFi, this type of fraud attack is particularly hazardous. Consequently, it frequently engages in communication with smart contracts and <a href=\"https:\/\/www.investopedia.com\/decentralized-finance-defi-5113835\" target=\"_blank\" rel=\"noreferrer noopener\">decentralized platforms<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>.<\/p>\n\n\n\n<p>By making certain transfers appear to be routine with malicious intent, exploiters exploit the users' trust in the respective systems. The necessity for increased security measures and increased consumer awareness in the Web3 sector is underscored by the increase in these attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A phishing attack drained $36,316 after the victim unknowingly approved a malicious transfer. Scam Sniffer reported the incident on its official X account, revealing details of the attack. The victim inadvertently authorized a malicious transfer, which resulted in a $36,316 loss as a result of a phishing attack. Scam Sniffer disclosed the specifics of the [&hellip;]<\/p>\n","protected":false},"author":36,"featured_media":93371,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[21839,8194,21840,21838],"class_list":["post-93370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-malicious","tag-phishing-attack","tag-setowner","tag-victim"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/blog-phishing-1200x900-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/93370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=93370"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/93370\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/93371"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=93370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=93370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=93370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}