TLDR
- Monad’s mainnet launch was hit by fake ERC-20 token transfer attacks just two days after going live.
- Attackers used misleading data to simulate wallet activity and fool blockchain explorers into displaying fake transactions.
- The issue arose from the limitations of the ERC-20 standard, not Monad’s blockchain itself.
- The attackers targeted high-traffic periods, misleading users during Monad’s token claim and wallet onboarding process.
- Monad Token (MON) surged 43% in value, reaching a market cap of nearly $500 million
Monad’s launch has been affected by a wave of fake token transfer attacks. The network went live just two days ago, but attackers already exploited the ERC-20 standard. These attacks generated misleading activity that appeared on blockchain explorers, fooling users into believing transactions were legitimate.
Fake ERC-20 Transfers Surface as Attackers Mimic Wallet Activity on Monad
Less than two days after Monad’s mainnet launch, fake ERC-20 transfers surfaced. These fake transfers mimicked real wallet activities, such as token movements, without any actual funds being moved. Attackers used misleading data, creating the illusion of legitimate transfers on blockchain explorers.
Through a post on X, James Hunsaker, Monad’s CTO, alerted the community to these suspicious transactions. He confirmed that the problem stemmed from the ERC-20 standard, rather than Monad’s blockchain. The ERC-20 interface allows anyone to deploy a contract that meets basic requirements, but can also emit false events. In one example, fraudulent contracts generated fake swap calls. These simulated trades gave the appearance of legitimate trading around Monad Token (MON). Casual observers could have mistaken this activity for real token transfers.
The attacks were likely aimed to mislead users during Monad’s high-traffic onboarding period. Many new users were claiming tokens and opening wallets, which made them more vulnerable to deception. The attackers hoped that the fake transactions would confuse users into interacting with malicious contracts.
ERC-20 Standard Exploited in Fake Token Transfer Attacks
The issue stems from how ERC-20 token contracts are designed. The standard allows for misleading events to be emitted by malicious contracts, mimicking real wallet activity. No actual tokens are moved, and no wallet approvals are given, but the explorers display the fake transfers as if they were valid.
This type of spoofing is common in Ethereum-based ecosystems. Attackers deploy their own contracts, emitting events that explorers interpret as valid token movements. The deceptive activity creates confusion and can mislead users into trusting malicious contracts.
James Hunsaker explained that the issue wasn’t a flaw in Monad’s blockchain. Instead, it was a limitation of the ERC-20 standard itself. The fake transfers appeared as early recipients claimed MON tokens. Monad had 76,000 wallets claim tokens in the weeks before launch.
Monad Token Surges Amid Attacks and User Onboarding
Despite the attacks, MON Token has seen a surge in value. On its first day, MON rose by 19% as the token continued to rise as of the latest reports. The spike in MON’s price coincided with the network’s public release. Early token holders received their airdropped and publicly sold tokens, leading to increased trading volume. CoinMarketCap data reveals that Monad’s (MON) price increased by 40.57% over the last 24 hours.
The price reached $0.04476, climbing steadily during the day. In addition, the trading volume surged to $1.34 billion, up 74.06% in the past 24 hours. This surge in price coincides with a sharp rise in volume, reflecting heightened market activity. MON’s market cap rose to $484.81 million, showing strong investor interest. The trend indicates a clear upward movement as the price steadily increased throughout the observed period.
The post Fake ERC-20 Transfers Target Monad’s Mainnet Just Days After Launch appeared first on Blockonomi.
Source: https://blockonomi.com/fake-erc-20-transfers-target-monads-mainnet-just-days-after-launch/