Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Warning: Attackers use the "create2" function to trick users into granting permissions in advance

Warning: Attackers use the "create2" function to trick users into granting permissions in advance

CointimeCointime2023/11/27 07:12
By:Cointime

According to a security warning released by GoPlusEco, attackers are using the "create2" function to pre-calculate the address where the contract will be deployed and then deceive users into granting permission. Because these blank addresses can bypass address tagging and security monitoring by security companies, once users grant permission, the attacker will deploy the contract to that address and transfer the user's assets out. The characteristics of this attack are:

1. "Create2" is a deployment method that allows for predictive creation of contract addresses, enabling attackers to deceive users into granting permission before deploying the contract.

2. Since the contract has not yet been deployed when authorization is granted, the attack address is an empty EOA (externally owned account) address, which is invisible to detection tools and highly concealed.

It is recommended to be vigilant against phishing attacks from the source, and it is crucial to remember to use commonly used protocol URLs or browser bookmark management for official websites. Additionally, carefully check whether the address authorized during the signature period is a blank (EOA) address, as this may pose significant risks.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!