🎉 [Gate 30 Million Milestone] Share Your Gate Moment & Win Exclusive Gifts!
Gate has surpassed 30M users worldwide — not just a number, but a journey we've built together.
Remember the thrill of opening your first account, or the Gate merch that’s been part of your daily life?
📸 Join the #MyGateMoment# campaign!
Share your story on Gate Square, and embrace the next 30 million together!
✅ How to Participate:
1️⃣ Post a photo or video with Gate elements
2️⃣ Add #MyGateMoment# and share your story, wishes, or thoughts
3️⃣ Share your post on Twitter (X) — top 10 views will get extra rewards!
👉
Web3.0 mobile Wallet faces new threats from modal window phishing attacks
New Security Threats to Web3.0 Mobile Wallets: Modal Window Phishing Attacks
Recently, security researchers have discovered a new type of phishing technique targeting Web3.0 mobile Wallets, known as "modal phishing attacks." This attack primarily exploits the modal windows in mobile Wallet applications to mislead users, thereby tricking them into approving malicious transactions.
The Principle of Modal Phishing Attacks
Modal phishing attacks primarily target user interface elements in Web3.0 cryptocurrency Wallets, particularly modal windows. Attackers can manipulate the information displayed in these windows to make it appear as if it comes from legitimate decentralized applications (DApp), thereby deceiving users into approving transactions.
The reason this type of attack is effective is that many wallet applications fail to fully verify the legitimacy of the information presented. For example, some wallets directly trust metadata from external SDKs without conducting additional verification.
Attack Cases
Prevention Suggestions
With the development of Web3.0 technology, these new types of security threats are also continuously evolving. Both users and developers need to enhance their security awareness and work together to maintain the safety of the Web3.0 ecosystem.