1、Stop Spoofing My Wallet!Demystifying Simulation Spoofing Attacks2025/01/11slipperStop Spoofing My Wallet!Stop Spoofing My Wallet!Stop Spoofing My Wallet!The Growing Threat to Solana WalletsGrowing Threat to Solana WalletsGrowing Threat to Solana Wallets Surge in phishing attacks targeting Solana use
2、rs.Attacks bypass even secure wallet protections.Users unknowingly authorize malicious activities.What Happens Behind the Scenes?Growing Threat to Solana WalletsGrowing Threat to Solana Wallets Wallet interactions have hidden complexities.A simple Sign can authorize dangerous activities.Example:Fake
3、 Jupiter swap drains user accounts.Drainer Alert:A Series of Sophisticated Attacks Solana users using Phantom wallet on Chrome with Windows.Jupiter,Raydium,and others.Not widespread but highly effective.Random victims,not targeting whales.Triggered by user interactions.Drainer Alert:A Series of Soph
4、isticated AttacksSolana users using Phantom wallet on Chrome with Windows.Solana users using Phantom wallet on Chrome with Windows.How the Attack WorksWhat Happens Behind the Scenes?Transactions:Understanding the Complexity1.Signatures:Cryptographically prove authorization for the transaction.2.Mess
5、age:Core content of the transaction,containing:Header/Account Addresses/Recent Blockhash/InstructionsKey Components ofa Solana TransactionUnderstanding the Complexity of Solana TransactionsWhat Happens Behind the Scenes?Transactions:Understanding the ComplexityFetch token price and determine the bes
6、t route.Assemble transaction instructions and send to wallet.Wallet simulates,user approves,and transaction is signed&broadcasted.Token Swap Process on Jupiter:What Happens Behind the Scenes?Transactions:Understanding the ComplexitySigning grants full authority over accounts in the transaction.Can e