Web3 Signature Phishing Analysis: Understand the Principles to Enhance Asset Security Awareness

Signature phishing is becoming the most favored scam method among Web3 hackers. Although industry experts continuously promote educational knowledge on the topic, a large number of users fall victim to scams every day. One important reason for this situation is that most people do not understand the underlying logic of wallet interactions, and for non-technical individuals, the learning curve is quite steep.

In order to help more people understand the principle of signature phishing, we will try to explain its underlying logic in a simple and easy-to-understand way.

First, we need to understand that there are mainly two operations when using a Wallet: "signing" and "interacting". Simply put, signing occurs off the blockchain (, and does not require paying Gas fees; while interacting occurs on the blockchain ), and requires paying Gas fees.

Plain Explanation of the Underlying Logic of Web3 Signature Phishing: Differences Between Authorization Phishing, Permit, and Permit2

Signatures are usually used for authentication, such as logging into a Wallet. For example, when you want to swap tokens on a certain DEX, you first need to connect your Wallet. At this point, you need to sign to prove that you are the owner of that Wallet. This step does not affect the blockchain, so there is no need to pay a fee.

The interaction occurs when you actually perform the token exchange. You need to first pay a fee to inform the DEX's smart contract: "I want to exchange 100USDT for a token, I authorize you to use my 100USDT". This step is called authorization (approve). Then you also need to pay another fee to inform the smart contract: "I am now going to exchange 100USDT for a token, you can execute the operation now". This completes the token exchange.

After understanding the difference between signatures and interactions, let's introduce three common phishing methods: authorization phishing, Permit signature phishing, and Permit2 signature phishing.

Authorization phishing is one of the most classic scams in the early days of Web3. Hackers create a phishing website disguised as an NFT project to lure users into clicking the "Claim Airdrop" button. In reality, the wallet interface that pops up after the user clicks is requesting authorization to transfer tokens to the hacker's address. Once the user confirms, the hacker can successfully steal the assets.

However, there is a problem with authorization phishing: because it requires paying Gas fees, many users become more vigilant when it comes to fund operations, making it relatively easy to guard against.

Signature phishing with Permit and Permit2 is currently a major issue in the security field of Web3 assets. It is difficult to prevent because users need to sign in to their Wallet before using DApps each time. Many people have developed a habitual mindset, believing that this operation is safe. Coupled with the fact that no fees are required, and that most people do not understand the implications behind each signature, this phishing method becomes even more deceptive.

Plain Interpretation of the Underlying Logic of Web3 Signature Phishing: Differences Between Authorization Phishing, Permit, and Permit2

The Permit mechanism is an extended feature of authorization under the ERC-20 standard. Simply put, you can authorize others to move your tokens through a signature. Unlike regular authorization, Permit allows you to sign on a "note" indicating "I allow someone to move my xxx amount of tokens." The holder of this "note" can pay the Gas fee to the smart contract, informing the contract: "He allows me to move his xxx amount of tokens." In this process, you just signed your name, but in reality, you authorized another party to call the approve function and transfer your tokens. Hackers can create phishing websites, replacing the wallet login button with Permit phishing, thereby easily stealing user assets.

Plain Explanation of the Underlying Logic of Web3 Signature Phishing: The Difference Between Authorization Phishing, Permit, and Permit2

Permit2 is not a feature of ERC-20, but rather a feature introduced by a certain DEX for user convenience. It allows users to authorize a large amount at once, and then for each subsequent swap, only a signature is required, with the Permit2 contract paying the Gas fee (deducted from the tokens exchanged at the end). However, to fall victim to Permit2 phishing, the prerequisite is that the user has previously used that DEX and has authorized unlimited access to the Permit2 smart contract. As the default operation of that DEX is unlimited authorization, the number of users meeting this condition is quite large.

In summary, authorization phishing essentially means that the user spends money to inform the smart contract: "I authorize you to give my tokens to the Hacker." Signature phishing involves the user signing a "note" that allows others to move assets to the Hacker, who then spends money to inform the smart contract: "I want to transfer his tokens to me."

To prevent these phishing attacks, we can take the following measures:

  1. Cultivate security awareness, and carefully check the specific content every time you perform wallet operations.

  2. Separate large amounts of funds from your daily use Wallet to reduce potential losses.

  3. Learn to recognize the signature formats of Permit and Permit2. Be especially cautious when you see the following signature format:

  • Interactive: Interactive Website
  • Owner: Authorizer's address
  • Spender: Authorized party address
  • Value: Authorized Quantity
  • Nonce: Random number
  • Deadline: Expiration Time

By understanding the principles of these phishing methods and preventive measures, we can better protect the security of our digital assets.

Plain explanation of the underlying logic of Web3 signature phishing: the difference between authorization phishing, Permit, and Permit2

GAS2.37%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 7
  • Share
Comment
0/400
GasBanditvip
· 07-09 21:33
What article are you looking at? I'm so frustrated.
View OriginalReply0
hodl_therapistvip
· 07-07 03:32
Suckers should have been played people for suckers long ago.
View OriginalReply0
HackerWhoCaresvip
· 07-07 00:53
Be careful, as interactions may also incur gas losses.
View OriginalReply0
PumpingCroissantvip
· 07-07 00:51
That's really outrageous, how can there still be people falling for it?
View OriginalReply0
GweiTooHighvip
· 07-07 00:50
I'm so confused, I don't understand gas.
View OriginalReply0
ValidatorVikingvip
· 07-07 00:39
lmao another day another noob getting rekt by signature scams... battle-tested validators never fall for this amateur bait
Reply0
degenwhisperervip
· 07-07 00:37
Newbies never learn their lesson.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)