Phishing Attack Drains $36K as Victim Approves Malicious ‘SetOwner’ Signature on DSProx

A phishing attack has recently taken place, draining $36,316 only 5 hours back. As per Scam Sniffer (a crypto security monitoring platform), in the unfortunate phishing event, the victim lost nearly $36,316 when the attacker tricked the consumer into approving a malicious transfer. The anti-scam company took to its official X account to disclose the details of this event.

Phishing Scam Sees the Drainage of $36K as the Victim Signs a Malicious ‘SetOwner’ Signature on DSProxy

Scam Sniffer noted that the phishing attack ultimately paved the way for the change of the victim’s DSProxy’s ownership. DSProxy operates as a smart contract wallet working in the DeFi apps. A phishing signature going by “setOwner” played a crucial role in the scam. It works as a deceptive method that the attackers use to get control of the digital assets of a victim.

In this specific event, the victim mistakenly authorized the respective signature. While approving the signature, the exploiter believed it was a legitimate transfer. However, by signing the malicious transfer, the victim made the scammer the owner of their DSProxy. Following that, the exploiter drained the wallet resulting in the loss of 36,000 in digital assets.

The Rise in such Phishing Attacks Signifies the requirement for More Security Measures and Awareness

Such a phishing attack is specifically dangerous in the DeFi world. Hence, it often communicates with decentralized platforms and smart contracts. Exploiters exploit the users’ trust in the respective systems by making presenting some transfers appear usual with malicious intent. The rise of these attacks highlights the requirement for more security measures and additional awareness among consumers in the Web3 sector.

Source: https://blockchainreporter.net/phishing-attack-drains-36k-as-victim-approves-malicious-setowner-signature-on-dsprox/