Real-World Lending Project Florence Finance Suffers $1.45 Million Phishing Attack

Do repost and rate:

Scammers have reportedly stolen around $1.45 million worth of USDC from the real-world asset (RWA) lending project Florence Finance.

Crypto projects are often vulnerable to sophisticated attacks, draining significant amounts of funds. One such technique is address poisoning.

How Florence Finance Lost 1.45 Million USDC to Phishing Attackers

security platform Cyvers told BeInCrypto that Florence Finance has potentially lost over $1.45 million in the stablecoin USDC. The screenshot below shows that the RWA lending project sent over 1,456,162 USDC to the phisher’s wallet – 0xB087

Scammers Stole Over $1.45 Million From Florence Finance. Source: Etherscan

The attack happened through address poisoning, which is a common phishing technique in the crypto realm. Meir Dolev, the co-founder and CTO of Cyvers told BeInCrypto:

“Address Poisoning involves the creation of a address that closely resembles a legitimate address that a user might frequently use. The attacker generates these addresses by modifying a few characters of the original address.

“When a user transacts cryptocurrencies and relies on autofill features or quick glances at their address book, they might accidentally select the fraudulent, look-alike address. As a result, the funds are sent to the attacker’s wallet instead of the intended recipient. This method relies heavily on human error and the difficulty in distinguishing between similar-looking wallet addresses.”

The Florence Finance address poisoning attack happened in three steps, according to Dolev:

  1. The victim sent USDC to some legitimate address (normal activity).
  2. Scammers poisoned the victim’s address by sending fake tokens from the victim’s address with the same amount and to a very similar destination address (hash of scammer address) like the legit one.
  3. The victim accidentally copied the scammer’s address and sent them real tokens like USDT or USDC
Screenshot from Etherscan illustrating the attack in three steps. Source: Cyvers

Scammers Bridged Funds to THORChain

The phishing wallet 0xB087 then sent the funds to another wallet, 0x18d8, which then transferred the funds to 0x88E2. As of writing, 0x88E2 has been bridging the funds to THORChain after converting them to Ethereum (ETH)

While the suspicious transactions happened on Tuesday, Florence Finance has yet to make a post on X (Twitter), informing the community about the incident.

Read more: Community Building: A Step-by-Step Guide

Scammers Bridged Funds to THORChain. Source: Etherscan

Deddy Lavid, co-founder, and CEO at Cyvers believes that there is a need for greater security measures. He said:

“Our investigation reveals that the attack was a well-orchestrated phishing scheme. Such attacks highlight the need for heightened vigilance and sophisticated security measures in the digital finance sector.”

Moreover, Dolev told BeInCrypto that they are working with Florence Finance to enhance their security protocols and prevent future phishing incidents. 

Indeed, heightened security measures are becoming increasingly necessary as attacks draining millions are a regular occurrence in the Web3 industry. For instance, last week, the decentralized exchange (DEX) aggregator KyberSwap lost over $45 million to hackers

hackers stole over $100 million from Justin Sun’s HECO chain and crypto exchange

Read more: RWA TokenizationA Look at Security and Trust

Do you have anything to say about the Florence Finance address poisoning attack or anything else? Write to us or join the discussion on our Telegram channel. You can also catch us onFacebook X (Twitter).

Regulation and Society adoption

Ждем новостей

Нет новых страниц

Следующая новость