What Happened? (Hack Recap)
73,399 addresses have been sent a malicious token to target their assets, under the false impression of a $UNI airdrop based on their LP's
0xcf39b7793512f03f2893c16459fd72e65d2ed00c
The malicious contract pollutes the event data so that block explorers index the "From" as the legitimate "Uniswap V3: Positions NFT" contract.
Now that a user sees that "Uniswap V3: Positions NFT" sent them a token (without knowledge of the event pollution attack), they would get curious and check the token. The token name directs them to a website that looks similar to Uniswap, and once users connected their wallets, their cryptocurrency was drained from their wallets.
So far, they have scammed (~$9.1million) from users, from native tokens (ETH), ERC20 tokens, and NFTs (namely, Uniswap LP positions)
The stolen ETH is being laundered through Tornado Cash.
The attack might be big, as [0xSisyphus] pointed out that a large LP (0xecc6b71b294cd4e1baf87e95fb1086b835bb4eba) also seems to get phished.
How to Protect Yourself:
If you have received the Malicious Token. Do not try to burn it.
Because to burn it, you would have to interact with it. And, It's heavily advised to not interact with suspicious tokens because:
You don't want to waste gas-burning tokens
You don't want to open yourself to an attack, such as ETH_RUNE
In summary, just leave it and pretend you don't see it
You can get bonuses upto $100 FREE BONUS when you:
💰 Install these recommended apps:
💲 SocialGood - 100% Crypto Back on Everyday Shopping
💲 xPortal - The DeFi For The Next Billion
💲 CryptoTab Browser - Lightweight, fast, and ready to mine!
💰 Register on these recommended exchanges:
🟡 Binance🟡 Bitfinex🟡 Bitmart🟡 Bittrex🟡 Bitget
🟡 CoinEx🟡 Crypto.com🟡 Gate.io🟡 Huobi🟡 Kucoin.
Comments