Fake identity, email link, website form. While this scam still catches some people off guard, most of the crypto community is way too familiar with it. You know you’re safe as long as you don’t share your private keys, or are you?
Microsoft has discovered a “one-click” phishing variant on this Web3 security article. It seems scammers don’t need your keys anymore to steal your coins. They only need you to click the “Approve” button.
Here’s how it’s possible and how to protect your crypto from ice phishing.
Simply put, ice phishing allows someone to spend your coins without access to your wallet. It’s a deceptive smart contract that, once signed, authorizes sending an unlimited amount of one token to the attacker-managed address.
Note that access without private keys isn’t always bad. Decentralized applications (dApps) do this all the time to exchange your tokens. The difference is that those smart contracts have a short expiration time and rarely request more than the set amount to spend.
Suppose you own 10,000 USDC and want to convert only 1,000 USDC to ETH. When the wallet signature window pops up, the permission requested should be up to the specified 1,000 USDC on the previous window (or exchange). If the transaction needs more, it may not go through.
If instead, the contract asks for all your 10,000 USDC (or limit of, say, 986732948), it’s either a scam or a misdesigned contract that can spend more than you intended.
Regardless of how of you found that contract, you can recognize ice fishing with three signs:
This is why it’s called ice phishing. Since you fall into the trap until you add more funds, months might pass. But there’s an attacker ready to steal them, or maybe the contract instantly transfers coins as soon as you deposit. The name also comes from the lack of keys needed to spend.
The biggest difference between traditional and ice phishing is that you don’t have to enter your keys/password/username. You just click the Approve button. And reading smart contracts isn’t as easy as detecting fake emails or domain typos.
Before getting into how ice phishing is possible, here’s what it looks like from the user’s perspective:
You might worry that someone stole your private keys, so you create a new wallet and send all other coins there as soon as possible. This would work until you interact again with the same contract that compromised the first one. To clarify, opening fraudulent contracts is safe as long as you don’t sign them.
Luckily, smart contracts don’t typically allow more than one token to authorize. That’s the only one they can steal, and everything else is safe (hypothetically, however, multi-token contracts should eventually be possible and common). Also, hackers can keep stealing the same token for years after the attack, unless you revoke the contract.
So how is ice phishing even possible?
The first and simplest method is a phishing website. As the attacker, you create a convincing copy of another website, send users there, and hope that they don’t notice the domain misspelling. Then, you create your own smart contract for this website, so you don’t have to actually hack the official one.
Another advanced variant is DNS poisoning. The attacker employs tactics like DDoS (Distributed Denial-of-Service) to overwhelm the platform’s servers and redirect users to another website with the exact same domain. This means that a fake Uniswap website could actually have the “app.uniswap.org” domain while the real Uniswap is being attacked. Temporarily.
Of course, within the fake website, attackers can create malicious contracts without hacking real ones.
Some attackers might try spear-phishing to access admin rights for the website or smart contracts, manipulate them, and profit until someone notices and undoes changes. But it’s unlikely.
More realistic is that developers place those traps themselves as a rug pull opportunity. For context, that’s when founders abandon their new dApp without warning users and taking all funds with them. Usually using admin keys for a protocol wallet that was supposedly inaccessible.
Ice phishing is unlikely to affect you if you already know the usual phishing traps. One obvious solution is to choose reputable dapps and stay away from little-known ones. Another is to directly search for those platforms rather than clicking links.
But assuming you didn’t see it coming, what else?
There are two common ways scammers accidentally reveal. Either they promise something valuable for free (airdrop websites) or they pose as companies to warn you about security issues. There’s a sense of urgency in that by signing the contract, everything resolves instantly.
If you still decide to use new dApps, check the expiration, amount, and address. Some scammers might use tools to make their wallets have the same first and last letters to look like yours (AKA address poisoning. E.g, You might confuse a contact’s phone number if another calls you with the same number except one different digit in the middle).
Review the full address.
If worst comes to worst, you can limit your losses by keeping most coins on another cryptocurrency or network. It’s good practice to review your permissions before you add more funds to your non-custodial wallet. To revoke Metamask permissions, you will need an approval checker (e.g. Etherscan) and revoking dApp (RevokeCash, Unrekt, approved.zone…) It costs gas, but not as much as losing your tokens.
Join The Leading Crypto Channel
JOINDisclaimer:Please note that nothing on this website constitutes financial advice. Whilst every effort has been made to ensure that the information provided on this website is accurate, individuals must not rely on this information to make a financial or investment decision. Before making any decision, we strongly recommend you consult a qualified professional who should take into account your specific investment objectives, financial situation and individual needs.
Max is a European based crypto specialist, marketer, and all-around writer. He brings an original and practical approach for timeless blockchain knowledge such as: in-depth guides on crypto 101, blockchain analysis, dApp reviews, and DeFi risk management. Max also wrote for news outlets, saas entrepreneurs, crypto exchanges, fintech B2B agencies, Metaverse game studios, trading coaches, and Web3 leaders like Enjin.
Development
Knowledge
Subscribe To Newsletter
Stay up-to-date with all the latest news about
Liquid Loans, Fetch Oracle and more.
Copyright © 2024 Crave Management.
All Rights Reserved.
Your Genius Liquid Loans Knowledge Assistant