New ‘sophisticated’ phishing exploit drains $3M in USDC from multi-sig wallet

1 hour ago

An unidentified crypto capitalist has mislaid implicit $3 cardinal successful a highly coordinated phishing onslaught aft unknowingly authorizing a malicious contract.

On Sept. 11, blockchain researcher ZachXBT archetypal flagged the incident, revealing that the victim’s wallet was drained of $3.047 cardinal successful USDC.

The attacker rapidly swapped the stablecoins for Ethereum and funneled the proceeds into Tornado Cash, a privateness protocol often utilized to obscure the travel of stolen funds.

How the exploit occurred

SlowMist laminitis Yu Xian explained that the compromised code was a 2-of-4 Safe multi-signature wallet.

He explained that the breach originated from 2 consecutive transactions successful which the unfortunate approved transfers to an code that mimicked their intended recipient.

The attacker crafted the fraudulent declaration truthful that its archetypal and past characters mirrored the morganatic one, making it hard to detect.

Xian added that the exploit took vantage of the Safe Multi Send mechanism, disguising the abnormal support wrong what appeared to beryllium a regular authorization.

He wrote:

“This abnormal authorization was hard to observe due to the fact that it wasn’t a modular approve.”

According to Scam Sniffer, the attacker had prepared the crushed good successful advance. They deployed a fake but Etherscan-verified declaration astir 2 weeks earlier, programming it with aggregate “batch payment” functions to look legitimate.

On the time of the exploit, the malicious support was executed done the Request Finance app interface, giving the attacker entree to the victim’s funds.

In response, Request Finance acknowledged that a malicious histrion had deployed a counterfeit mentation of its Batch Payment contract. The institution noted that lone 1 lawsuit was affected and stressed that the vulnerability has since been patched.

Still, Scam Sniffer highlighted broader concerns astir the phishing incident.

The blockchain information steadfast warned that akin exploits could stem from respective vectors, including app vulnerabilities, malware oregon browser extensions modifying transactions, compromised front-ends, oregon DNS hijacking.

More importantly, the usage of verified contracts and near-identical addresses illustrates however attackers are refining their methods to bypass idiosyncratic scrutiny.

The station New ‘sophisticated’ phishing exploit drains $3M successful USDC from multi-sig wallet appeared archetypal connected CryptoSlate.

View source