SlowMist: Web3 Phishing Technique Analysis
Original Article Title: "SlowMist: Web3 Phishing Tactics Analysis"
Original Source: SlowMist Security Team
Lately, SlowMist was invited to participate in the Ethereum Web3 Security BootCamp organized by DeFiHackLabs. As a speaker, SlowMist's Head of Security Audit, Thinking, delved into the malicious ways and covert methods of phishing hackers across eight chapters titled "Fake, Bait, Lure, Attack, Conceal, Skill, Distinguish, Defend," combining practical examples to lead students to a deep understanding of phishing attacks and proposing relevant preventive measures. Phishing is one of the heavily targeted areas in the industry. Understanding the enemy is necessary to defend effectively. This article will extract key content from the sharing session to help users understand the current state of phishing attacks and effectively mitigate the threat of phishing attacks.
Why Phishing Happens

In the Web3 world, phishing attacks have become one of the major security threats. Let's first look at why users fall victim to phishing. In fact, even users with high security awareness sometimes feel the saying "if you walk by the river often, you will eventually get your shoes wet" applies to them. After all, maintaining the highest level of vigilance at all times is difficult. Attackers analyze factors such as recent hot projects, community activity, and user base to select highly visible targets, disguise them carefully, and then lure users using airdrops, high returns, and other baits. These attack methods are usually accompanied by social engineering. Attackers are adept at exploiting user psychology to achieve their fraudulent goals:
· Enticement: Airdrop whitelist qualification, mining rewards, private key of wealth, etc.
· Curiosity / Greed: Fearless exit strategy for a rug pull, can't miss the potential 100x coin, don't miss out at 10 PM tonight, meeting link https://us04-zoom[.]us/ (malicious); $PENGU airdrop whitelist must not be missed, https://vote-pengu[.]com/ (malicious).
· Fear: Urgent alert: XX project has been hacked, please use revake[.]cash (malicious) to revoke authorization and prevent fund loss.
· Efficient Tools: Airdrop farming tools, AI quantitative tools, one-click mining fleeceware, etc.
Attackers invest time in creating and deploying baits simply because it is profitable. Through the above means, attackers can easily obtain users' sensitive information/permissions, thereby stealing user assets:
· MNEMONIC / Private Key Theft: Deceiving users into inputting their mnemonic phrase or private key.
· Deceiving User to Sign with Wallet: Authorization signature, transaction signature, etc.
· Account Password Theft: Telegram, Gmail, X, Discord, etc.
· Social App Permission Theft: X, Discord, etc.
· Inducing Installation of Malicious Programs: Fake wallet apps, fake social apps, fake conference apps, etc.
Phishing Techniques

Next, let's take a look at some common phishing techniques:
Account Theft / Impersonation
Recently, there has been a surge in incidents where Web3 projects' / KOLs' X accounts were hacked. After hijacking the account, attackers often promote fake tokens or construct similar domain names in the "good news" they release to deceive users into clicking. Of course, there are cases where the domain is legitimate because the attacker may have taken over the project's domain. Once the victim clicks on the phishing link, performs a signature, or downloads malicious software, their assets will be stolen.
In addition to stealing accounts, attackers on X often use impersonated accounts to comment in the comments section of legitimate accounts to deceive users. The SlowMist Security Team has conducted targeted analysis and statistics: about 80% of well-known projects have the comments section of their tweets occupied by scam phishing accounts. Attackers use automated bots to follow the activities of well-known projects. After a project releases a tweet, the phishing group's bots will automatically leave a comment in the comments section to ensure they occupy the first comment position for high visibility. Since the post the user is viewing is sent by a real project and the disguised phishing group account and the project account are highly similar, as long as the user is not vigilant enough and clicks on the high-imposter account's phishing link under the guise of an airdrop or similar pretext, and then authorizes or signs, they will lose their assets.

Attackers will also impersonate administrators to post fake news, especially on platforms like Discord where this phenomenon is more common. Discord supports user-customized nicknames and usernames, so attackers will change their profile picture and nickname to match those of an administrator, then post phishing information in the channel or private message users. If users do not click on the account profile to view the username, it is difficult to detect the issue. Furthermore, although Discord usernames cannot be duplicated, attackers can use names that are highly similar to the administrator's username, such as adding an underscore or a period in the username, making it difficult for users to distinguish between real and fake accounts.

Invite Phishing
Attackers often establish contact with victims on social platforms, recommend "high-quality" projects or invite users to meetings, guide victims to visit malicious phishing sites, or download malicious applications. In the past, users have been hacked after downloading a fake Zoom app. Attackers use domains like "app[.]us4zoom[.]us" to disguise themselves as legitimate Zoom meeting links, with the page closely resembling the actual Zoom interface. When users click the "Start Meeting" button, they trigger the download of a malicious installation package instead of launching the local Zoom client or downloading Zoom's official client. As the malicious program prompts users to enter their passwords at runtime, and subsequent malicious scripts collect browser plugin wallet data and KeyChain data (potentially including various passwords saved on the computer), attackers collect this data to attempt decryption and obtain sensitive information such as the user's wallet mnemonic phrase/private key, leading to asset theft.

Search Engine Ranking Manipulation
Search engine ranking results can be boosted through ad promotion, leading to phishing sites potentially ranking higher than the genuine official websites. In cases where users are unaware of the official website's URL, it's challenging to differentiate a phishing site solely based on the site's appearance. Phishing sites can customize the URL displayed in Google Ads promotions, where the URL shown in the Sponsored section may be identical to the official URL, but when users click the ad's URL, they are redirected to the attacker's constructed phishing site. Because phishing sites created by attackers closely resemble genuine official sites, it's challenging to distinguish between them, making it inadvisable for users to directly search for official websites using search engines as they are likely to land on a phishing site.

TG Advertisement Scam
Recently, there has been a significant increase in users falling victim to fake TG Bots. Multiple users reported encountering a new bot at the top of the channel while using a trading bot, assuming it was an official new release and proceeding to import private keys to link wallets, only to be hacked. Attackers utilize Telegram to precisely target advertisements in official channels, enticing users to click. This form of phishing is highly covert because the ad appears in an official channel, leading users to instinctively believe it is an official robot release. Lacking vigilance, if users click the phishing bot and upload private keys to link, they risk being hacked.

In addition, we recently disclosed a new type of scam, the Telegram Fake Safeguard scam, where many users were stolen from because they ran malicious code following the attacker's tutorial.

App Store
Not all software on the app stores (Google Play, Chrome Store, App Store, APKCombo, etc.) are genuine. Often, the stores cannot fully review the software. Some attackers lure users into downloading fraudulent apps through methods like buying keyword rankings. Dear readers, please pay attention to verification. Before downloading, make sure to check the app developer information to ensure it matches the officially announced developer identity. You can also refer to app ratings, download counts, and other information.

Phishing Email
Email phishing is the most classic trick, known for being "simple and unadorned." Attackers use phishing templates and combine them with Evilngins reverse proxy to create emails like the one in the image below: when users click on "VIEW THE DOCUMENT," they will be redirected to a fake DocuSign interface (now unable to open). Subsequently, if a user clicks on Google Login on that interface, they will be redirected to a reverse-proxied Google login window. Once the user enters their account, password, and 2FA on that window, the account will be taken over by the attacker.


The phishing email in the image above is obviously not well-crafted because the sender's email address is not disguised. Let's see how the attacker in the image below disguises their identity: the attacker's email address differs from the official address by just a small dot. Attackers can use DNSTwist to find special characters supported by Gmail to make their email address look legitimate. If you don't look closely, you might think it's just a dirty computer screen.

Browser Feature Exploitation
See SlowMist's article: Revealing how malicious browser bookmarks can steal your Discord Token.
Defense Challenge

The tactics used by attackers are constantly evolving, generally moving towards a more sophisticated and standardized direction. In our previous analysis, we found that attackers are not only able to create web pages highly similar to those of well-known projects and take over the project's domain, but there are also cases where an entire project is fictitious. These fake projects not only have many (purchased) fans on social media but also have GitHub repositories, posing a greater challenge for users to identify phishing threats. Additionally, attackers' adept use of anonymous tools has made tracing their tracks more difficult and complex. To conceal their identities, attackers often use VPNs, Tor, or even control compromised hosts to carry out malicious activities.

With an anonymous identity established, attackers, to build a phishing network, also need to purchase basic service infrastructure, such as Namecheap, with support for cryptocurrency payments. Some services only require an email for registration, without the need for KYC verification, allowing attackers to avoid being traced.

Once the aforementioned preparations are in place, attackers can launch phishing attacks. After profiting, the funds are further obfuscated using services like Wasabi, Tornado, etc., to confuse the fund's path. To enhance anonymity, funds may also be converted into highly anonymous cryptocurrencies such as Monero.

To avoid leaving samples and evidence, attackers will cover their tracks by deleting related domain resolutions, malicious programs, GitHub repositories, platform accounts, etc. This often results in security personnel encountering situations where phishing websites cannot be accessed or malicious programs cannot be downloaded, increasing the difficulty of analysis and tracking.
Defense Strategy


Users can identify phishing threats based on the characteristics in the above image and learn basic methods to verify information authenticity. They can also use some defense tools to enhance phishing defense capabilities:
· Phishing Risk Blocking Plugins: Tools like Scam Sniffer can detect risks from multiple dimensions. When users open suspicious phishing pages, the tool will promptly display a risk warning.
· Secure Wallets with High Interaction Security: Such as Rabby's Watch-only wallet (no private key required), phishing website identification, see-and-sign, high-risk signature identification, history record Scam identification, etc.
· Internationally Recognized Antivirus Software: Such as AVG, Bitdefender, Kaspersky, etc.
· Hardware Wallet: A hardware wallet provides an offline way to store private keys. When interacting with a hardware wallet and DApp, the private key is not exposed online, effectively reducing the risk of asset theft.
Final Thoughts

In the blockchain dark forest, phishing attacks are omnipresent. Cultivation lies in the arising of every thought—being mindful of one's intentions to avoid unconsciously falling into a mental state. When navigating the blockchain dark forest, the most fundamental practice is to cultivate a habit of maintaining zero trust and continuous verification. It is recommended that everyone deeply read and gradually master the "Blockchain Dark Forest Survival Manual."
Due to space constraints, this article only introduces the main contents of the sharing session. The nearly seventy-page PPT is now publicly available.
You may also like

Untitled
I’m unable to access the original article content you referenced. Please provide specific details or another article so…

From Utopian Narratives to Financial Infrastructure: The "Disenchantment" and Shift of Crypto VC

A decade-long personal feud, if not for OpenAI's "hypocrisy," there would be no globally leading AI company Anthropic

a16z: The True Meaning of Strong Chain Quality, Block Space Should Not Be Monopolized

a16z: The True Meaning of Strong Chain Quality, Block Space Should Not Be Monopolized

2% user contribution, 90% trading volume: The real picture of Polymarket

Trump Can't Take It Anymore, 5 Signals of the US-Iran Ceasefire

Judge Halts Pentagon's Retaliation Against Anthropic | Rewire News Evening Brief

Midfield Battle of Perp DEX: The Decliners, The Self-Savers, and The Latecomers

Iran War Stalemate: What Signal Should the Market Follow?

Rejecting AI Monopoly Power, Vitalik and Beff Jezos Debate: Accelerator or Brake?

Insider Trading Alert! Will Trump Call a Truce by End of April?

After establishing itself as the top tokenized stock, does Ondo have any new highlights?

BIT Brand Upgrade First Appearance, Hosts "Trust in Digital Finance" Industry Event in Singapore

OpenClaw Founder Interview: Why the US Should Learn from China on AI Implementation
WEEX AI Wars II: Enlist as an AI Agent Arsenal and Lead the Battle
Where the thunder of legions falls into a hallowed hush, the true kings of arena are crowned in gold and etched into eternity. Season 1 of WEEX AI Wars has ended, leaving a battlefield of glory. Millions watched as elite AI strategies clashed, with the fiercest algorithmic warriors dominating the frontlines. The echoes of victory still reverberate. Now, the call to arms sounds once more!
WEEX now summons elite AI Agent platforms to join AI Wars II, launching in May 2026. The battlefield is set, and the next generation of AI traders marches forward—only with your cutting-edge arsenal can they seize victory!
Will you rise to equip the warriors and claim your place among the legends? Can your AI Agent technology dominate the battlefield? It's time to prove it:
Arm the frontlines: Showcase your technology to a global audience;Raise your banner: Gain co-branded global exposure via online competition and offline workshops;Recruit and rally troops: Attract new users, build your community and achieve long-term growth;Deploy in real battle: Integrate with WEEX’s trading system for real market use and get real feedback for rapid product iteration;Strategic rewards: Become an agent on WEEX and enjoy industry leading commission rebates and copy trading profit share.Join WEEX AI Wars II now to sound the charge!
Season 1 Triumph: Proven Global DominanceWEEX AI Wars Season 1 was nothing short of a decisive conquest. Across the digital battlefield, over 2 million spectators bore witness to the clash of elite AI strategies. Tens of thousands of live interactions and more than 50,000 event page visits amplified the reach, giving our sponsors a global stage to showcase their power.
Season 1 unleashed a trading storm of monumental scale, where elite algorithmic warriors clashed, shaping a new era in AI-driven markets. $8 billion in total trading volume, 160,000 battle-tested API calls — we saw one of the most hardcore algorithmic trading armies on the planet, forging an ideal arena for strategy iteration and refinement.
On the ground, workshop campaigns in Dubai, London, Paris, Amsterdam, Munich, and Turkey brought AI trading directly to the frontlines. Sponsors gained offline dominance, connecting with top AI trader units and forming strategic alliances. Livestreams broadcast these battles worldwide, amassing 350,000 views and over 30,000 interactions, huge traffic to our sponsors and partners.
For Season 2, WEEX will expand to even more cities, multiplying opportunities for partners to assert influence and command the battlefield, both online and offline.
Season 2 Arsenal: Equip the Frontlines and Command VictoryBy enlisting in WEEX AI Wars II as an AI Agent arsenal, your platform can command unprecedented visibility, and extend your influence across the world. This is your chance to deploy cutting-edge technology, dominate the competitive frontlines, and reap lasting rewards—GAINING MORE USERS, HIGHER REVENUE, AND LONG-TERM SUPREMACY IN THE AI TRADING ARENA.
Reach WEEX’s 8 million userbase and global crypto community. Unleash your potential on a global stage! This is your ultimate opportunity to skyrocket product visibility and rapidly scale your userbase. Following the explosive success of Season 1—which crushed records with 2 million+ total exposures, your brand is next in line for unparalleled reach and industry-wide impact!Test and showcase your AI Agent in real markets. Throw your AI Agents into the ultimate arena! Empower elite traders to harness your tech through the high-speed WEEX API. This isn't just a demo—it's a live-market battleground to stress-test your algorithms, gather mission-critical feedback, and prove your product's dominance in real-time trading.Gain extensive co-branded exposure and traffic support. Command the spotlight! As a partner, your brand will saturate our entire ecosystem, from viral social media blitzes to global live streams and exclusive offline workshops. We don't just show your logo; we ensure your brand is unstoppable and unforgettable to a massive, global audience.Enjoy industry leading rebates. Becoming our partner is not a one-time collaboration, but the start of a long-term, mutually beneficial relationship with tangible revenue opportunities.Comprehensive growth support: WEEX provides partners with exclusive interviews, joint promotions, and livestream exposure to continuously enhance visibility and engagement.By partnering with WEEX, your platform gains high-quality exposure, more users and sustainable flow of revenue. The Hackathon is more than a competition. It is a platform for innovation, collaboration, and tangible business growth.
Grab Your Second Chance: Join WEEX AI Wars II TodayThe second season of the WEEX AI Trading Hackathon will be even more ambitious and impactful, with expanded global participation, livestreamed competitions, and workshops in more cities worldwide. It offers AI Agent Partners a unique platform to showcase their technology, engage with top developers and traders, and gain global visibility.
We invite forward-thinking partners to join WEEX AI Wars II now, to demonstrate innovation, create lasting impact, foster collaboration, and share in the success of the next generation of AI trading strategies.
About WEEXFounded in 2018, WEEX has developed into a global crypto exchange with over 6.2 million users across more than 150 countries. The platform emphasizes security, liquidity, and usability, providing over 1,200 spot trading pairs and offering up to 400x leverage in crypto futures trading. In addition to the traditional spot and derivatives markets, WEEX is expanding rapidly in the AI era — delivering real-time AI news, empowering users with AI trading tools, and exploring innovative trade-to-earn models that make intelligent trading more accessible to everyone. Its 1,000 BTC Protection Fund further strengthens asset safety and transparency, while features such as copy trading and advanced trading tools allow users to follow professional traders and experience a more efficient, intelligent trading journey.
Follow WEEX on social mediaX: @WEEX_Official
Instagram: @WEEX Exchange
Tiktok: @weex_global
Youtube: @WEEX_Official
Discord: WEEX Community
Telegram: WeexGlobal Group

Nasdaq Enters Correction Territory | Rewire News Morning Brief

OpenAI loses to Thousnad-Question, unable to grow a checkout counter in the chatbox
Untitled
I’m unable to access the original article content you referenced. Please provide specific details or another article so…
