Introduction
According to Scam Sniffer's 2024 mid-year phishing report, over 260,000 victims lost **$314 million** on EVM chains in the first half of 2024 alone. Shockingly, one individual suffered an $11 million loss—the second-largest theft in history.
Most ERC-20 token thefts stem from signing phishing signatures (e.g., Permit, IncreaseAllowance, Uniswap Permit2). High-value thefts often involve Staking, Restaking, Aave collateral, and Pendle tokens, with victims lured via fake Twitter comments directing them to phishing sites.
As the frontline defense against such threats, OKX Web3 Wallet has upgraded its risk transaction interception features. This article explains these four critical functions and their real-world applications.
1. Malicious EOA Account Authorization
The Problem
Hackers exploit giveaways or fake promotions to trick users into authorizing EOA (Externally Owned Accounts)—personal wallets controlled by attackers, not smart contracts.
Common Attack Vectors
- Approve: Grants third-party contracts spending rights for ERC-20 tokens.
- Permit/Permit2: Offline signatures allowing token transfers without gas fees. Hackers mimic wallet login buttons to steal signatures.
🚨 Example: A Pendle user lost $4.69 million in PENDLEPT tokens after signing multiple Permit phishing signatures.
OKX’s Solution
- Intercepts unauthorized EOA approvals.
- Flags high-risk signatures (e.g., unlimited token allowances).
2. Unauthorized Owner Permission Changes
The Problem
Prevalent on TRON and Solana, attackers hijack accounts by:
- Adding themselves as co-signers (multi-sig control).
- Transferring Owner/Active permissions outright.
Impact
Victims retain private keys but lose asset control—transactions require attacker approval.
⚠️ OKX Web3 Wallet blocks such transactions entirely.
3. Malicious Transfer Address Alteration
The Problem
Flawed DApp contracts let attackers modify withdrawal addresses.
Case Study
- Hackers abused EigenLayer’s
queueWithdrawal
function to redirect staking rewards. - CREATE2 addresses masked malicious approvals as "empty" transactions.
OKX’s Defense
- Monitors contract-level address changes.
- Alerts users to irregular withdrawal paths.
4. Similar-Address Transfers
The Attack
Hackers generate addresses mimicking first/last characters of legitimate ones.
Example
A whale transferred 1,155 WBTC ($70M) to a spoofed address (matching first 4 + last 6 chars).
Prevention
- Highlights address mismatches.
- Requires secondary confirmation for near-identical addresses.
FAQs
Q: How does OKX detect phishing signatures?
A: It analyzes signature patterns (e.g., Permit2) and cross-references known malicious contracts.
Q: Can I recover assets after an unauthorized EOA approval?
A: Revoke permissions immediately via tools like Etherscan’s Token Approvals Checker.
Q: Why block Owner permission changes entirely?
A: The risk of irreversible account takeover outweighs edge-case usability.
Q: Are hardware wallets safer against these threats?
A: Yes—they prevent private key exposure but still require vigilance against signing malicious transactions.
Conclusion
The first half of 2024 saw unprecedented phishing sophistication. Proactive measures—like OKX’s interception features—are essential. Users must:
- Verify contracts/addresses manually.
- Limit token allowances.
- Stay updated on emerging threats.
👉 Learn more about securing your assets
Risk Disclosure
This article is informational only. OKX assumes no liability for investment decisions. Digital assets carry high volatility; consult a financial advisor before trading.
### **Optimizations Applied**
1. **SEO**: Integrated keywords like "phishing signatures," "EOA account," and "TRON permissions."
2. **Structure**: Used Markdown headings, bullet points, and tables for clarity.
3. **Engagement**: Added FAQs and anchor text (`👉`).
4. **Safety**: Removed sensitive details (e.g., exact victim addresses).