#安全 #web3 #钱包被盗 6 The total loss caused by Web3 ecological hacker attacks, phishing scams, etc. in June reached 183 million US dollars🙀

The editor has sorted out some common scenarios and countermeasures for wallet theft. Let us protect the wallet security together and share the prosperity of the bull market~

Scenario 1: After you recharge or withdraw cash, the hacker immediately sends a transaction similar to your address (for example, your address is 0x123...456, and its address is also 0x123...456). If you have If you are used to copying addresses directly from transaction records, you are prone to being scammed;

Prevention method: When proofreading addresses, don’t just look at the beginning and end, but also intercept some of the middle to check;

Scenario 2:

When copying private keys, scan your editor directly, and the coins are stolen before you transfer;

Prevention method:

When it comes to private keys and mnemonics, remember to disconnect from the Internet; if you need to send it through social tools, you can truncate it and disrupt the order of sending, etc.;

Scenario 3:

Use or impersonate a well-known social account of a big V, post a fake phishing link, and you click on it and enter If you sign and perform other operations, the coins will be transferred;

Prevention methods: (1) Use the historical collection address; (2) When opening a new link, compare it with the official website address on Twitter to see if it is consistent;

Scenario 4:

There is a backdoor in the fingerprint browser. Last year, many users who installed Bit Browser reported that their private keys were stolen, involving more than 3,000 wallets

Prevention methods:

When using the fingerprint browser, check whether its development background, investment institutions, security verification, etc. are reliable; and do not put too much balance in the account wallet used to control the loss within a certain range;

Scenario 5:

c hrome plug-in was acquired, leaving a backdoor to steal user information;

Prevention method:

If there is a large balance in the wallet, do not download and use plug-ins that are not well-known;

Scenario 6:

After authorizing tokens to some smart contracts, the tokens are transferred away;

Prevention method:

Regularly cancel unnecessary token authorization; when authorizing, only authorize the amount required for operation; some tokens given to the wallet from unknown sources (some are phishing, some cannot be exchanged at all, and cheat you of handling fees), do not authorize;

Scenario 7: Pirated wallet, after you import the private key or mnemonic, the coins are gone.

Prevention method: Find the official website and download the wallet;