User chain security protection and rescue case sharing

#GoPlus security team case

Case 1: Anti-poisoning attack, recovering 20K USD loss

A user of the GoPlus community suffered a poisoning attack by hackers, who tricked users into transferring funds by forging similar addresses. However, the user enabled the chain security protection and monitoring service. When the hacker tried to transfer more than 20K USD, the security system promptly identified and intercepted the transaction. After the user received the alarm, he verified that the address was a poisoning address and immediately canceled the transfer, avoiding capital loss.

Case 2: Preemptive service successfully transferred assets

Another GoPlus user's private key was stolen, and the hacker monitored and transferred the user's ETH as Gas fee. However, the user used the preemptive service in time to successfully transfer the remaining NFT and Token assets to the new address, recovering more than 10K USD loss. The preemptive service ensures that the user's transaction is packaged and processed by the miner before the hacker monitors it by increasing the Gas fee and transaction priority.

#OKXWeb3钱包安全团队案例

Case 1: Flashbots assisted in rescuing remaining assets

User A accidentally leaked his private key on a phishing website, resulting in the theft of ETH, but other ERC20 tokens such as USDC were still safe. The OKX Web3 wallet security team used Flashbots to bundle the transaction for paying Gas and the transaction for transferring out value tokens and successfully processed them in the same block, saving the user's remaining assets.

Case 2: Successfully intercepted the authorization request from the phishing website

User B mistakenly entered the phishing website when querying airdrop information and was asked to authorize the risky address. The OKX Web3 wallet identified and intercepted the authorization request, protecting the user's asset security.

Case 3: Quickly respond to protocol vulnerabilities to avoid greater losses

A certain protocol C was attacked, and the contract address involved in the vulnerability became a source of risk. The OKX Web3 wallet security team quickly listed the relevant contracts as risky addresses and reminded users when they authorized, effectively avoiding further losses of user assets.

These cases show that whether using on-chain security tools or seeking help from professional security teams, users can reduce financial losses and resist risks in a timely manner. However, the most important thing is that users themselves should improve their security awareness and learn to protect their wallets and assets.