Cybercriminals are leveraging Ethereum’s ‘Create2’ function to compromise wallet security and pilfer cryptocurrency, resulting in the theft of $60 million from 99,000 individuals over six months. The ‘Create2’ opcode, introduced in Ethereum’s ‘Constantinople’ upgrade, facilitates the pre-calculation of smart contract addresses before deployment.
Scam Sniffer, an anti-scam initiative, revealed two methods of abuse: one involves transferring assets to pre-computed addresses after tricking victims into signing malicious transactions, while the other, named ‘address poisoning,’ generates addresses resembling legitimate ones to deceive users into sending assets to the attackers.
Despite the subtle nature of these attacks, they highlight the growing security risks associated with Ethereum’s advanced functionalities. In the illicit exploitation of Ethereum’s ‘Create2’ function, Scam Sniffer reports losses amounting to $60 million over six months, impacting 99,000 individuals. The opcode, initially introduced for its advantages in smart contract interactions, becomes a tool for cybercriminals to bypass wallet security alerts. ‘Address poisoning’ emerges as a sophisticated tactic, involving the creation of numerous addresses, allowing attackers to pick and deploy those that match their phishing requirements, resulting in significant financial losses for victims.
In the illicit exploitation of Ethereum’s ‘Create2’ function, Scam Sniffer reports losses amounting to $60 million over six months, impacting 99,000 individuals. The opcode, initially introduced for its advantages in smart contract interactions, becomes a tool for cybercriminals to bypass wallet security alerts. ‘Address poisoning’ emerges as a sophisticated tactic, involving the creation of numerous addresses, allowing attackers to pick and deploy those that match their phishing requirements, resulting in significant financial losses for victims.
Scam Sniffer identified the subtle yet effective strategies employed by attackers, including the exploitation of victims who sign malicious transactions, leading to assets being transferred to pre-calculated addresses. Another method, ‘address poisoning,’ involves creating addresses similar to legitimate ones owned by recipients, deceiving users into sending assets to malicious actors. While many attacks went unnoticed, the ones that caught community attention highlight the urgency for increased awareness and enhanced security measures to protect users from these Ethereum-based threats.
The report emphasizes the dual nature of Ethereum’s ‘Create2’ function, offering both advanced contract capabilities for developers and posing security implications and new attack vectors. The incidents underscore the need for continuous vigilance within the cryptocurrency community, prompting caution among users and developers to mitigate the risks associated with Ethereum’s evolving functionalities and the potential for malicious exploitation.
Reference: