13 Jan 2025

How to protect your wallet against advanced scam?

How to protect your wallet against advanced scam?

The realm of cryptocurrency still echoes the lawlessness of the Wild West, with over $20 billion in tokens and coins falling into the hands of thieves in 2022 alone. To shield yourself from becoming as easy a target as a gold-laden stagecoach, it’s essential to follow a series of subtle yet powerful guidelines designed to protect your wealth.

On this page

Chainalysis reports reveal a staggering 89% of all attacks are directed at DeFi protocols, with cross-chain applications — platforms that facilitate crypto trading across multiple blockchains — being particularly vulnerable. To steer clear of becoming a statistic in this bleak scenario, it's crucial to adhere to a set of straightforward yet vital precautions. 

Maintain the confidentiality of your wallet address. Publicizing your wallet address is a surefire way to compromise your anonymity. In the hands of a malevolent actor, your wallet address becomes a tool to trace fund movements, establish links to other addresses, and surveil your real-time activities, setting the stage for a calculated attack. Although a public address alone doesn't offer hackers direct access to your wallet, safeguarding it from public view plays a crucial role in thwarting potential attacks, particularly those involving social engineering. 

Examine smart contracts meticulously before affixing your signature. Certain cryptocurrency wallets, such as TronLink, necessitate a thorough review of the smart contract’s key clauses prior to signing. 

Certain attacks exploit a tactic where a cryptocurrency exchange contract is swapped out, compelling the unsuspecting user to send the entirety of a random coin to the attacker’s address. This anomaly is detectable; discrepancies will appear in the smart contract prompt, both between the coins being sent and exchanged, and in the total amount being transferred.

Validate the smart contract through a reputable audit service. With the smart contract's public address in your possession, an independent audit service like Certik Skynet stands ready to scrutinize its integrity. 

This explorer aggregates an array of security-related metrics, audit results, and data reflecting the influence of GitHub library updates on community engagement — all in one centralized location. If the smart contract’s safety indicators are flashing red, it’s wise to distance yourself from any potential transactions. 

Vet the dApps you're working with. Addressing this point can resolve a third of the issues linked to wallet hacks and cryptocurrency theft.

Discerning the differences: Connecting vs. Granting Privileges in crypto wallet-dApp interactions:

  • Connecting via Wallet Connect: This doesn’t implicitly grant permission for token transfers without your express consent. Each transaction request from the dApp requires your manual approval or rejection. 
  • Granting privileges (Approvals): This aspect involves authorizing a third-party application to send tokens on your behalf. When your wallet’s interface displays a term akin to “Approve,” it’s time to pause and meticulously consider to whom you’re granting these rights and for what specific purpose.

Before you approve a smart contract, it’s essential to consider several critical questions: 

  • Is the approval you are granting absolutely required for the application to function? 
  • Does the token in the request match the token associated with the project?
  • Is the token amount in sync with your initial request?
  • Does your request differ in type? For instance, you may have intended to swap a coin, but the contract seems to suggest a transfer of rights to something else. 

A sample of a deceptive smart contract's code, annotated for your understanding

Typically, such operations are conducted using the vestingGrant() function, which defines the addresses of both the sender and the recipient. By affixing your signature to such a smart contract, you are, in essence, authorizing the withdrawal of crypto assets to another person's address. 

Conceptual manipulation through the vestingGrant function | Source: Etherscan.io

Conceptual manipulation through the vestingGrant function | Source: Etherscan.io

Bear in mind, there are more cunning tactics to attack a wallet via a smart contract. 

A fundamental precautionary step is to Google the smart contract's address you intend to interact with. It's quite straightforward: if you cannot find a whitepaper, the project's official homepage, or any documentation explaining the tokenomics, it’s highly likely that you are dealing with a scam. 

Example of token address tracking | Source: Google.com

Example of token address tracking | Source: Google.com

The subsequent step involves scrutinizing the token’s code. Normally, explorers like Etherscan display whether or not a token's code has been verified. If this option is unavailable and the website suggests that you verify it yourself, be cautious—this is a red flag, and you are likely faced with a scam. Fraudulent tokens' codes are often unverified to avoid being marked as dangerous. 

Example of an unverified token code | Source: Etherscan.io

Example of an unverified token code | Source: Etherscan.io

Before dealing with a suspicious token, make sure it actually exists. Check for the coin on CoinGecko, in the dApp Radar list, on TronScan, or search across various blockchains using Blockchair.

Also, ensure that the address you’re about to deal with is not blacklisted. You can do this by using the open repository on GitHub, which dApp Radar utilizes to filter its projects: 

  • Known suspicious addresses on the Binance Blockchain.
  • Scam tokens in the Ethereum network. 
  • Addresses of dubious coins on Polygon. 

Leverage automated token verification services

Take advantage of services like TokenSniffer, an automated express-analysis tool for assessing tokens for common types of attacks. It’s integrated into the WEB3 AML service package from Solidus Labs and remains fully public and free to use. If a token scores below 50, it's likely a scam, though some triggers could be attributed to flaws in the project you are engaging with. 

Another valuable tool is honeypot.is, which allows you to check a token for pre-existing vulnerabilities that could be exploited by scammers to steal your crypto. Similarly, DEXTools offers a set of tools that build trust metrics for a project based on hidden checks.

The setApprovalForAll() function in attack attempts

Typically, this function comes into play when you’re in the process of minting your NFT on a marketplace or while authenticating through a wallet on platforms such as OpenSea or Blur. In these situations, the function enables the NFT marketplace to move tokens from your wallet to that of the buyer following a sale. By activating this, you are granting the smart contract the authority to send any amount of a specific token anywhere it pleases.. 

If the platform you’re connecting your wallet to happens to be compromised, attackers could immediately withdraw your funds. This kind of attack is commonly seen in applications, platforms, and decentralized apps (dApps) associated with NFTs. 

Below is an example of what it looks like when the setApprovalForAll() function is triggered. If the smart contract window displays a well-known NFT marketplace, things should be safe. However, if you notice typos in the website’s name in this field, there's a high chance you’re being targeted in a scam attempt.

Example of the proper usage of setApprovalForAll() | Source: Coinsbench.com

Example of the proper usage of setApprovalForAll() | Source: Coinsbench.com

So, what does a wallet hack via setApprovalForAll() look like on the blockchain? 

Let’s take the address 0xAa8A064f79a75F91B5aF5Ba75bD5382d1185F1F7 as an example. This address, after five failed attempts, eventually succeeded in signing a transaction through a fake NFT pre-mint website. 

Example of a smart contract signature that transfers wallet ownership rights | Source: Etherscan.io

Example of a smart contract signature that transfers wallet ownership rights | Source: Etherscan.io

As a result, all the funds in the wallet owner’s possession start getting transferred to various dummy addresses. Someone even went to the lengths of renaming the scammer’s addresses, marking them as “thief” and “scammer” in Russian.

The aftermath of a setApprovalForAll() attack displayed on the blockchain | Source: Etherscan.io

The aftermath of a setApprovalForAll() attack displayed on the blockchain | Source: Etherscan.io

Why is this method so effective?

Well, it has gained quite a bit of traction. In April 2022, users of the Bored Ape Yacht Club fell prey to this kind of scheme. An attacker had managed to hack into the project’s Instagram account and posted a link to a fraudulent website hosting an airdrop. The website in question prompted users to sign a contract with the setApprovalForAll() function, which didn't raise any red flags since it is a necessary step for the proper transfer of minted NFTs.

The Bored Ape Yacht Club hack via setApprovalForAll() | Source: X.com/BoredApeYC

The Bored Ape Yacht Club hack via setApprovalForAll() | Source: X.com/BoredApeYC

To safeguard yourself from such hacks, make sure to meticulously inspect the smart contract signature window: if you see setApprovalForAll in the transaction pane, it’s a red flag, indicating a possible scam. The same caution should be applied if you encounter the SafeTransferFrom function during a transfer signature. 

An example of an irreversible wallet attack

After the contract is signed, a new address gets added to the list of wallet owners and trustees. This address then gains the ability to approve or reject transactions, effectively converting the wallet into a multi-signature one, where ownership is shared by more than one entity. 

After a wallet has been compromised in such a manner, there’s no turning back; it cannot be recovered. However, there is a way to safeguard against this type of attack. Simply add one of your own addresses as an additional owner to your wallet. Yes, it means you'll need additional signatures for transactions, but it’s a small price to pay to secure your wallet against future thefts.

And of course, always keep your seed phrase safe and secure. No matter what pretext is given, remember the golden rule: “Not your keys, not your coins.”

Store your crypto assets in various wallets

It might seem obvious, but it truly is effective advice. Make use of different wallets when interacting with dApps and distributing your funds. This strategy ensures that you always have a specific address available to assess the risks of uncertain projects and to deal with potentially unsafe websites. If everything proves to be secure and nothing untoward happens with your trial wallet, then it’s safe to proceed with using your main one. 

What to do if your crypto wallet is compromised?

The first 24 hours following a theft are crucial. During this time, you still have the opportunity to track the movement of your tokens on the blockchain and engage the support teams of the platforms they pass through. 

To begin, gather all possible evidence of the theft: screenshots of conversations with the attacker, addresses of the smart contracts involved, and proof of the coins being withdrawn from your wallet. Make sure to obtain the transaction hash for every action the thief carried out, and document the token hashes involved in these transactions.. 

Using a blockchain explorer, follow the path of the tokens on your own. If they pass through swappers or exchange platforms that offer customer support, get in touch with them immediately. Attach your theft evidence to your message and request them to flag the tokens as suspicious. This can be a significant help in any potential legal proceedings and can expedite the cryptocurrency freezing process, especially in the case of stablecoins. 

In situations where funds have been withdrawn through USDT, you have the option to lock them in the scammer’s wallet, but you need to act swiftly and contact Tether directly. Resolving this issue without your active involvement could take more than a month. While private specialists might be able to resolve the situation faster, they will only collaborate if the amount of damage is substantial enough to warrant their service fee.. 

The content on The Coinomist is for informational purposes only and should not be interpreted as financial advice. While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, or reliability of any content. Neither we accept liability for any errors or omissions in the information provided or for any financial losses incurred as a result of relying on this information. Actions based on this content are at your own risk. Always do your own research and consult a professional. See our Terms, Privacy Policy, and Disclaimers for more details.

Articles by this author

Latest News

MORE
The Future of Crypto in 2025: Fidelity’s Predictions

The Future of Crypto in 2025: Fidelity’s Predictions

What’s next for the biggest cryptocurrencies in 2025? Fidelity Digital Assets analyst Chris Kuiper shares insights on how Bitcoin will navigate volatility, Ethereum will address scaling challenges, and stablecoins will adapt to evolving regulations.

13 Jan 2025
The Crypto Rollercoaster of 2024 — Wins and Woes

The Crypto Rollercoaster of 2024 — Wins and Woes

The crypto sector evolved at breakneck speed in 2024. With major wins and notable setbacks, it’s time to reflect on the year’s key developments and their implications for the future.

31 Dec 2024
OpenSea Token: Release Date and How to Qualify for the Airdrop

OpenSea Token: Release Date and How to Qualify for the Airdrop

The NFT marketplace OpenSea, a pioneer in the space for the past seven years, is expected to launch its native token in 2025. A significant portion of the tokens will likely be distributed through a retroactive airdrop—a common way to reward the community for their past activity and support.

30 Dec 2024
5 Most Exciting Token Launches to Watch in 2025

5 Most Exciting Token Launches to Watch in 2025

In 2024, we saw a number of hot airdrops and token launches, from AI-powered projects to the rise of memecoins. Now, as we head into 2025, the crypto space is set to expand even further with an increasing number of cryptocurrencies.

27 Dec 2024

Latest News Alt

MORE
Weekly Analysis of BTC, ETH, and the Stock Market (Jan 6, 2025)

Weekly Analysis of BTC, ETH, and the Stock Market (Jan 6, 2025)

An overview of BTC, ETH, XAUT, and S&P500 charts, along with the current cryptocurrency market dynamics.

06 Jan 2025
Weekly Analysis of BTC, ETH, and the Stock Market (Dec 30, 2024)

Weekly Analysis of BTC, ETH, and the Stock Market (Dec 30, 2024)

An overview of BTC, ETH, XAUT, and S&P500 charts, and the current cryptocurrency market dynamics.

30 Dec 2024
Weekly Analysis of BTC, ETH, and the Stock Market (Dec 23, 2024)

Weekly Analysis of BTC, ETH, and the Stock Market (Dec 23, 2024)

An overview of BTC, ETH, XAUT, and S&P500 charts, and the current cryptocurrency market dynamics.

23 Dec 2024

Might Be Interesting

MORE
Mining Farms Uncovered — How Crypto Is Mined at Scale

Mining Farms Uncovered — How Crypto Is Mined at Scale

As a cornerstone of the crypto industry, mining farms drive blockchain networks. But how do they work? Uncover the mechanics behind these cutting-edge hubs and their role in the crypto landscape.

07 Jan 2025
William Quigley, WAX/Tether: Stablecoins’ Role in Global Payments

William Quigley, WAX/Tether: Stablecoins’ Role in Global Payments

William Quigley, co-founder of WAX and Tether, firmly believes that stablecoins are more than a tool for traders—they’re the key to transforming the global economy. Already central to crypto trading and cross-border payments, their future potential is even more exciting.

04 Jan 2025
Why Blockchain Is Different from Traditional Databases

Why Blockchain Is Different from Traditional Databases

In the world of business and finance, information is everything. Traditional databases have been reliable tools for decades, but blockchain presents a groundbreaking alternative. What sets it apart, and could it lead to a paradigm shift?

03 Jan 2025
How Does Multisig Works and Protect Your Assets?

How Does Multisig Works and Protect Your Assets?

As threats to digital assets evolve, multisig technology provides a highly effective security layer. By requiring multiple signatures for transactions, it significantly reduces risks such as hacking and access loss.

02 Jan 2025
Crypto Price Gaps: Why Platforms Show Different Prices

Crypto Price Gaps: Why Platforms Show Different Prices

The crypto market has nuances you may not have noticed at first glance. For example, when you want to check the Bitcoin price, you probably Google it without thinking to compare the results. But when you monitor the market regularly and engage in trading, you notice the prices aren’t the same on all platforms.

24 Dec 2024
The Czech Republic and Its Crypto-Friendly Policies

The Czech Republic and Its Crypto-Friendly Policies

The Czech Republic is emerging as a crypto-friendly nation, recognizing cryptocurrencies as legitimate payment methods and encouraging their use in business. But its regulatory framework is still taking shape. Here’s how crypto is managed today.

23 Dec 2024

Opinions

8 Commandments for Crypto Exchange Users

8 Commandments for Crypto Exchange Users

While cryptocurrency exchanges offer many security features, they are still vulnerable to hacks, fraud, and other criminal activity. Remember, no online platform can guarantee 100% protection for your funds. Follow these eight key rules to reduce your risks. Rule #1: Don’t Believe in the Myth of Absolute Exchange Security Even the largest and most seemingly […]

12 Jan 2025
10 Key Investment Trends to Watch in 2025: Green Crypto, Regulations, and More

10 Key Investment Trends to Watch in 2025: Green Crypto, Regulations, and More

Donald Trump is back, Germany’s economy is in trouble, while U.S. economic indicators seem to have a robust momentum, and interest rates are sliding downhill. Sounds dramatic? It is. But 2025 isn’t all doom and gloom—it’s full of opportunities for investors who know where to look. Whether you’re a seasoned pro or someone still figuring […]

12 Jan 2025
MORE

Interviews

Dmytro Gordon and Volodymyr Nosov: A Sensational Interview

Dmytro Gordon and Volodymyr Nosov: A Sensational Interview

Volodymyr Nosov, CEO of Europe’s largest crypto exchange WhiteBIT, sat down with Dmytro Gordon, one of Ukraine’s most prominent journalists. The interview touched on Bitcoin, crypto, WhiteBIT, cars, keys to success, and business vision.

18 Dec 2024
WhiteBIT CEO: Standing Strong Against Russian Aggression

WhiteBIT CEO: Standing Strong Against Russian Aggression

In an interview with BTC-ECHO, Volodymyr Nosov, the founder and CEO of WhiteBIT, discussed the impact of Russian aggression on the crypto exchange’s business, how WhiteBIT stays a top competitor in the industry, and when he believes our financial system will be completely transformed.

04 Oct 2024
MORE