According to information obtained by WuTalk, MistTrack's tracking and on-chain analysis show that a Solana user recently fell victim to a phishing attack, resulting in the modification of the wallet Owner permissions and the theft of approximately $3 million in assets. Another $2 million in DeFi assets were successfully recovered with the help of multiple parties. The attacker tricked the victim into signing a transaction containing the assign instruction, thereby transferring wallet ownership to the attacker's address. This attack method is similar to the "malicious multi-signature" tactics commonly seen in the TRON ecosystem. The stolen funds were dispersed through multiple layered addresses, cross-chain exchanges, and CEX platform transfers. Analysts pointed out that users should remain vigilant when clicking unknown links and signing transactions, and avoid authorizing high-risk operations in their main wallets.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
According to information obtained by WuTalk, MistTrack's tracking and on-chain analysis show that a Solana user recently fell victim to a phishing attack, resulting in the modification of the wallet Owner permissions and the theft of approximately $3 million in assets. Another $2 million in DeFi assets were successfully recovered with the help of multiple parties. The attacker tricked the victim into signing a transaction containing the assign instruction, thereby transferring wallet ownership to the attacker's address. This attack method is similar to the "malicious multi-signature" tactics commonly seen in the TRON ecosystem. The stolen funds were dispersed through multiple layered addresses, cross-chain exchanges, and CEX platform transfers. Analysts pointed out that users should remain vigilant when clicking unknown links and signing transactions, and avoid authorizing high-risk operations in their main wallets.