FailSafe: Advanced Security for Digital Assets
  • Introduction to FailSafe
  • Whitepaper
    • Introduction
      • Defense-in-Depth
      • Forward Security
    • Web3 Threats to Your Crypto
      • The Human Factor: Design with Operator Error in Mind
    • Defense-in-Depth & the Lifecycle of a Transaction
      • Defense 1: de-risk Web3 Asset Positions
      • Defense 2: FailSafe Blockchain Reconnaissance
      • Defense 3: FailSafe Interceptor Service
      • Discussion
    • FailSafe Architecture
      • Forward Security in FailSafe
        • Quantum Threats to EVM-based Blockchains
          • On ECDSA Key Re-use
          • On New Quantum-resilient Alternatives
          • Account Abstraction as a Path to Sunseting ECDSA on Ethereum?
        • Introducing the Quantum Migration Tool (qMig)
          • Assumptions and Goals
          • How Does qMig work?
          • Discussion
          • FailSafe+qMig
    • Conclusion
    • Further Reading
  • How FailSafe helps your Organisation
    • Reduce Attack Surface Area
    • Radar for Security Risks
    • React to Malicious Threats
    • Forward Security against Looming Quantum Computing Threats
  • FailSafe as a tool for Enterprise Risk Management
Powered by GitBook
On this page
  1. Whitepaper

Web3 Threats to Your Crypto

Last updated 2 years ago

The private key that corresponds to the user’s wallet address controls the transfer of value on the public ledger, be it in the form of tokens or native cryptocurrency. To capture this value, a potential attacker has a number of options:

  • Theft of private keys: With the knowledge of the private key, the attacker can send a transaction for every token and native currency associated with the address, transferring the assets to the attacker's own address. Any staked tokens in third party systems can be withdrawn and transferred to the attacker’s address. There are numerous examples of this in the wild: fraudsters often pose as customer support convincing users to install a fake wallet software that captures and shares the user’s passphrase with the attacker.

  • Obtaining user’s authorization: Through social engineering and confusing Web3 wallet user experiences, the attacker convinces the user to sign a transaction that can be crafted to:

  • Compromise of 3rd Party Smart Contracts: Exploit smart contract vulnerabilities and then drain user assets that temporarily reside under the contract address ownership (there are of bridge hacks that fall into this category).

comprehensive study
numerous examples