OKX Web3 Wallet Upgrades Risk Transaction Interception Strategy
This article is machine translated
Show original
According to the official Odaily, in order to further improve the security of Web3 wallets, OKX Web3 wallet has upgraded its interception strategy for risky transactions. The risky transactions that can be intercepted are as follows: 1) Malicious authorization to EOA accounts. Usually, DApp authorization is given to contract accounts, not EOAs. 2) Malicious changes to your account owner. Once signed, you will lose control of your account. This usually happens on public chains such as TRON and Solana that have underlying account owner designs. 3) Malicious changes to your transfer address. A small number of DApp contracts are not well designed, but OKEx wallet can identify risks. 4) Intercept transfers to similar addresses. This attack method is: the attacker generates an address that is very similar to the one you have used recently (the characters before and after the address are the same), and transfers a large amount of fake USDT to you, increasing the probability of copying it as a hacker address on the transaction history page. According to the OKX Web3 wallet prompt, if users see related risk interception when conducting on-chain transactions, please operate with caution. Currently, users need to upgrade the OKX APP to version 6.74.0 or above, or the OKX Web3 plug-in wallet to version 3.1.0 or above to experience this feature immediately.
Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments
Share
Relevant content