GoPlus Security: A user mistakenly transferred 100,000 DAI due to an address poisoning attack

robot
Abstract generation in progress

ME News Report, May 14 (UTC+8), GoPlus Security stated that a user experienced a typical address poisoning attack, mistakenly transferring 100,000 DAI to a forged attacker address after copying a similar address from transaction history. In the incident, the user had previously transferred 300,000 DAI to the target address, and the attacker then sent 0.0003 DAI using an address with similar characters before and after, tricking the user into selecting the wrong address during the second transfer. GoPlus Security warns not to copy addresses from transaction history, to verify the full address before transferring, and to perform small test transfers before large transactions. (Source: ChainCatcher)

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pinned