• Login
Crypto Newsmart
No Result
View All Result
  • HOME
  • BITCOIN
  • CRYPTO UPDATES
    • ALTCOIN
    • ETEREUM
    • NFT’s
    • CRYPTO PRICE ANALYSIS
  • LEARN CRYPTO
  • CRYPTO EXCHANGES
  • BLOCKCHAIN
  • MINING
  • SCAM ALERT
  • PRESS RELEASE
  • HOME
  • BITCOIN
  • CRYPTO UPDATES
    • ALTCOIN
    • ETEREUM
    • NFT’s
    • CRYPTO PRICE ANALYSIS
  • LEARN CRYPTO
  • CRYPTO EXCHANGES
  • BLOCKCHAIN
  • MINING
  • SCAM ALERT
  • PRESS RELEASE
No Result
View All Result
Crypto Newsmart
No Result
View All Result

New EIP712 Messages in Blur Protocol Expose Users to Phishing Attacks

Crypto Newsmart by Crypto Newsmart
2 years ago
in NFT's
Reading Time: 3 mins read
51
VIEWS
Share on Facebook

SNEAK PEEK

  • Blend Protocol introduces risky EIP712 messages, raising phishing concerns.
  • Malicious actors exploit Seller message to deceive users and steal assets.
  • LoanOffer message enables fake sale offers, putting NFTs at risk.

In a concerning development, the popular decentralized finance protocol, @blur_io’s Blend Protocol, has recently introduced two new EIP712 messages called “Seller” and “LoanOffer.” While these additions were intended to enhance the functionality of the protocol, security experts have discovered potential phishing exploits that could lead to significant financial losses for unsuspecting users.

1/ The @blur_io‘s Blend Protocol has been online for a while, the protocol introduces two new EIP712 messages, 𝐒𝐞𝐥𝐥𝐎𝐟𝐟𝐞𝐫 and 𝗟𝗼𝗮𝗻𝗢𝗳𝗳𝗲𝗿.

But you should be aware of potential phishing exploits based on those two types of messages! pic.twitter.com/jbAg0ueN6x

— Scam Sniffer (@realScamSniffer) June 11, 2023

The newfound vulnerabilities arise from the ability of bad actors to exploit these messages by constructing malicious loan offers or suspicious sale offers. By leveraging the seller message, an attacker could create a deceptive loan offer tied to a worthless NFT. If a user unsuspectingly signs this malicious loan offer, they will unknowingly part with their Blur ETH, resulting in the loss of their valuable assets.

2/ 𝗟𝗼𝗮𝗻𝗢𝗳𝗳𝗲𝗿

obviously, the bad actor can based on this construct a malicious Loan offer to a garbage NFT, and if you sign it, you will lose your Blur ETH anymore. pic.twitter.com/cOtv7ZQZBS

— Scam Sniffer (@realScamSniffer) June 11, 2023

Similarly, through the LoanOffer message, a malevolent actor can construct a malicious sale offer with an artificially inflated price. If an unsuspecting user signs this nefarious offer, they risk losing the NFT they had lent, falling victim to the attacker’s scheme.

Hope you could understand what you are signing, stay safe!

— Scam Sniffer (@realScamSniffer) June 11, 2023

These phishing exploits pose a significant threat to users of the Blur Protocol, especially those who may not be well-versed in the intricacies of decentralized finance and smart contract interactions. It is crucial for all users to exercise extreme caution and remain vigilant when engaging with these new features.

Security experts and the development team at @blur_io are working diligently to address and mitigate these vulnerabilities. They are actively investigating potential solutions, including the implementation of additional security measures, audits, and user education initiatives.

As a precautionary measure, the Blur Protocol team advises users to carefully review and verify the details of any loan or sale offers before signing any transactions. Double-checking the terms, prices, and involved assets is essential to avoid falling victim to phishing attempts.

In light of these developments, the broader decentralized finance community should take note of the risks associated with new protocol features and remain proactive in identifying and addressing potential security loopholes. Collaborative efforts between developers, auditors, and users are crucial to maintaining the integrity and security of the rapidly evolving DeFi ecosystem.

While the potential phishing exploits discovered in the Blend Protocol’s new EIP712 messages are concerning, it is essential to remember that with proper caution and awareness, users can navigate the decentralized finance landscape securely. Nonetheless, it is incumbent upon all stakeholders to prioritize security measures and promote responsible use of DeFi protocols to safeguard the community as a whole.

Source link

Related Posts

5TARS.io Adopts Concordium Blockchain to Boost Web3 Sports Gaming
NFT's

5TARS.io Adopts Concordium Blockchain to Boost Web3 Sports Gaming

28 March 2025
NikolAI Launches First AI-Generated NFT Collection for Durov’s Birthday
NFT's

NikolAI Launches First AI-Generated NFT Collection for Durov’s Birthday

12 March 2025
Pixelport Launches Testnet for Cross-Chain NFT Trading
NFT's

Pixelport Launches Testnet for Cross-Chain NFT Trading

8 March 2025
Somnia Unveils Plans to Onboard Millions of Gamers to Web3
NFT's

Somnia Unveils Plans to Onboard Millions of Gamers to Web3

5 March 2025
Somnia Blockchain Sets New Benchmark with 1.05 Million TPS on Devnet, Announces Upcoming Testnet Launch
NFT's

Somnia Blockchain Sets New Benchmark with 1.05 Million TPS on Devnet, Announces Upcoming Testnet Launch

1 March 2025
Somnia Ecosystem Receives Up to 0M Backing from Improbable and MSquared
NFT's

Somnia Ecosystem Receives Up to $270M Backing from Improbable and MSquared

21 February 2025

[convertful id="153816"]

by CurrencyRate.Today
  • Home
  • Disclaimer
  • Privacy Policy
  • Digital Millennium Copyright Act Policy (DMCA)
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us
CRYPTO NEWSMART

Copyright © 2021 Crypto Newsmart.

No Result
View All Result
  • HOME
  • BITCOIN
  • CRYPTO UPDATES
    • ALTCOIN
    • ETEREUM
    • NFT’s
    • CRYPTO PRICE ANALYSIS
  • LEARN CRYPTO
  • CRYPTO EXCHANGES
  • BLOCKCHAIN
  • MINING
  • SCAM ALERT
  • PRESS RELEASE

Copyright © 2021 Crypto Newsmart.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Manage Cookie Consent

We use cookies to optimise our website and our service.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}