A recent Web3 phishing attack has resulted in the loss of $55 million worth of Dai tokens. The incident, detailed by CertiK Alert, was carried out by an attacker identified as Fake_Phishing187019. The attacker exploited vulnerabilities in externally owned accounts (EOAs), stealing 55,473,618 Dai tokens through a series of sophisticated steps.
Fund Laundering Process
Following the theft, the attacker laundered the stolen funds using a complex trading network. Initially, $36 million was transferred to an unknown address, followed by an additional $17.5 million routed through the CoW protocol. To further obfuscate the assets, the Dai tokens were exchanged for ETH and Bitcoin via Uniswap V3, demonstrating the attacker’s intent to efficiently disperse and hide the stolen money.
Escalating Web3 Cybercrime
This attack is part of a broader trend of increasing cybercrime in the Web3 space. CertiK’s report reveals that in July 2024 alone, $270.9 million was lost to scams, hacks, and other breaches, with only a small fraction—$7.8 million—recovered. The scale of these attacks highlights the vulnerabilities in the sector, with notable incidents like the WazirX hack further underscoring the risks.
Tactics Exploiting Decentralisation
Cybercriminals in the Web3 world leverage the decentralised nature of digital assets through various tactics, including phishing, Ponzi schemes, and pump-and-dump scams. These schemes exploit the lack of centralised oversight, making it easier for attackers to target users and projects.
Protective Measures Needed
To combat these risks, users are advised to thoroughly research projects, verify their legitimacy, and implement security measures such as hardware wallets and two-factor authentication. These steps are essential to safeguarding digital assets in a space increasingly targeted by cybercriminals.