During the recent month phishing attacks had become the hottest trend in web3, with an alarming uptrend of 34% and an imminent risk to hundreds of millions of dollars.

As a cybersecurity company committed to the longevity and prosperity of the Crypto sphere, ironblocks provides monthly best practices to protect against these recent cybersecurity threats:
Traders — always check yourself
To avoid getting scammed by a phishing attack, it is crucial to double-check the addresses to which you transact. There are many instances of “address poisoning” and phishing addresses, so it is important to be vigilant in order to avoid falling a victim to such phishing attacks.
Our advice: Save all addresses you already know as notes in a secure place and make sure to double-check transaction-explorer (Ethscan, BSCscan) when interacting with new addresses
Builder s— Segment your protocol
CowSwap hack demonstrated how responsibility isolation and good architecture can significantly minimize risks. Despite an attacker managing to steal money from their protocol, the funds at risk were only the seven-day fees the protocol collected. The attacker was subsequently slashed for this in their staking.
Our advice: When building a protocol, it is essential to focus on “transaction isolation” and code architecture to mitigate risks.
Protocols — Enforce protocols and usage of proper tools
The biggest hack of the month, the BonqDAO hack, involved an attacker manipulating the price of WALBT token through TellorFlex’s decentralized oracle. The attacker took a loan and then manipulated the price again to liquidate at a much lower price.
Our advice: To protect against such attacks, we recommend protocols admins to implement two best practices:
- The first transaction could be detected and stopped, and the second one could be blocked by an automated tool that could frontrun and execute a pause action.
- Always check for vulnerabilities when using an oracle. Most of the time, oracles have weak spots that can be exploited by attackers. In case you lack the knowledge or tools for this.
Overall, it is essential to remain vigilant and proactive in protecting against cybersecurity threats, especially as web3 continues to evolve. By following these best practices, we can help ensure the continued security of our loved “Crypto-sphere” and safeguard the prosperity and longevity of the global community.




.png)