Segurança
How to Spot Malicious dApps
Partilhar publicação
Em resumo
Learn about dApps, secure browsing, how to spot malicious dApps, and how Trust Wallet can connect you to Web3.
Decentralized Applications (dApps) have reshaped the way we interact with blockchain technology, offering a range of services from finance to gaming. The rise of dApps has also, unfortunately, attracted malicious actors looking to exploit unsuspecting users. In this article, we will learn about dApps, secure browsing, how to spot malicious dApps, and how Trust Wallet can connect you to Web3.
Before You Get Started
Remember that you can use Trust Wallet as your secure crypto wallet. Buy, sell, and swap crypto all in one place.
Trust Wallet also lets you manage and interact with 10M+ crypto assets across 100+ blockchains. Download the latest version of Trust Wallet today.
What Are dApps?
dApps are software applications that run on a decentralized network, using blockchain technology. DApps distribute their data across multiple nodes in a network. Their decentralization enhances security and reduces the risk of single points of failure, making dApps more resilient against attacks and outages. Identifying whether a decentralized application is legitimate is important for safeguarding your assets and personal information.
Understanding Malicious DApps
Malicious dApps are designed to deceive users into giving away their assets or personal information. They often mimic legitimate applications but employ various tactics to manipulate users. Here are some common types of malicious dApps:
Fake DeFi liquidity mining scams
Liquidity mining is where users provide liquidity to decentralized exchanges (DEXs) by depositing cryptocurrency into liquidity pools. In return, they earn rewards in the form of transaction fees or tokens. While legitimate liquidity mining can be profitable, its complexity makes it an attractive target for scammers who can easily create convincing schemes that mimic real opportunities.
Scammers often use aggressive marketing tactics, including social media ads and direct messages, promising unrealistic returns (e.g. 1% to 10% daily). These offers exploit the allure of quick profits to draw victims in. Scammers create counterfeit websites or applications that closely resemble legitimate DeFi platforms. These sites may include testimonials and fake trading interfaces designed to instill confidence in potential investors. Many scams employ social engineering tactics, like creating exclusive groups on platforms like WhatsApp or Telegram. Victims are often lured into these groups under the guise of receiving expert trading advice or exclusive investment opportunities.
Once trust is established, victims are instructed to link their cryptocurrency wallets to the scam platform. This step enables scammers to gain direct access to the victim’s funds, which can then be drained without further consent.
Fake AI trading, arbitrage, and lending scams
Fake AI trading, arbitrage, and lending scams have proliferated in recent years, capitalizing on the growing interest in artificial intelligence (AI) and the complexities of financial markets. Fake AI trading scams often promise unrealistic returns and exploit the allure of advanced technology to deceive investors.
Scammers typically promise extraordinary returns using AI-driven trading algorithms or bots that can supposedly guarantee profits. Claims of "100% win rates" or returns of "tens of thousands of percent" are common red flags. Fake AI trading scams often use social media platforms and influencers to spread misinformation about their products. They may create enticing advertisements or videos showcasing supposed success stories, which are often fabricated.
Scammers develop sophisticated websites that mimic legitimate trading platforms, complete with fake testimonials and performance data. Victims are lured into depositing funds into these platforms, believing they are investing in a legitimate opportunity. Many scams employ social engineering tactics to gain the trust of potential victims. This can include impersonating reputable companies or using deepfake technology to create convincing endorsements from trusted figures in the finance or tech sectors.
Wallet drainers
Wallet drainer scams exploit the excitement around new NFT projects, often using deceptive tactics to trick users into giving up access to their wallets. Scammers create counterfeit websites that mimic legitimate NFT minting platforms. The fake pages often advertise free mints or exclusive airdrops, enticing users to participate. When users connect their wallets to these sites and approve transactions, they inadvertently permit scammers to access their funds and NFTs.
The smart contracts deployed on these fake minting sites are designed to drain users' wallets. Instead of minting an NFT, the contract may execute functions that enable the scammer to withdraw tokens or NFTs from the user's wallet once they sign the transaction. This often happens without the user realizing what they have approved.
Scammers frequently use phishing techniques to distribute links to these fake minting sites. They may share these links through social media platforms, Discord channels, or even via compromised accounts of legitimate NFT projects. Unsuspecting users click on these links, believing they are accessing a genuine opportunity.
Attackers often employ social engineering tactics, creating a sense of urgency or exclusivity around the minting process. For example, they might claim that only a limited number of NFTs are available for free minting, pushing users to act quickly without due diligence.
How to spot a malicious dApp:
To protect yourself from falling victim to these scams, be on the lookout for red flags:
Unsolicited messages: Be wary of private messages or posts that encourage you to invest in a new dApp. Scammers often reach out directly to potential victims through social media platforms.
Unusual approval requests: When interacting with a dApp, be cautious if it requests unlimited approval for your tokens (e.g., USDT, USDC). This could enable the scammer to drain your wallet at any time.
Unclear or complex transactions: If a dApp requires you to sign unreadable or complex transaction signatures, think twice before proceeding. Legitimate applications typically provide clear explanations of what you are signing.
Too good to be true offers: Promises of free NFTs or high-value airdrops with little effort are major red flags. Scammers often exploit the allure of free assets to attract victims.
Lack of transparency: Legitimate projects typically provide detailed information about their team, roadmap, and community engagement. Fake projects often lack this transparency or provide vague details.
High-pressure sales techniques: Scammers often create a sense of urgency, encouraging victims to invest quickly before the opportunity disappears. This tactic exploits emotional responses and can lead people to make hasty decisions without proper research.
Manipulated success stories: Scammers frequently use fabricated success stories and screenshots from supposed successful investors to create a false sense of legitimacy and urgency among potential victims.
How to determine the authenticity of a dApp:
Consult reliable resources: Use platforms like dAppRadar, CoinMarketCap, or CoinGecko, to check the DApp's reputation and liquidity. These sites provide insights into popular dApps and their user activity, helping you gauge their legitimacy.
Community feedback: Visit forums and social media channels related to the dApp. Engaging with the community can reveal user experiences and any potential red flags associated with the dApp.
Audit verification: Ensure that the dApp's smart contracts have been audited. Audits help identify vulnerabilities in the code that could be exploited by malicious actors.
On-chain graphs: Analyze the dApp's on-chain activity for any suspicious patterns, including irregular transaction volumes or sudden spikes in activity that may indicate manipulation or fraudulent behavior.
Double-check URLs: Always verify the URL of the dApp before interacting with it. Scammers often create fake sites with URLs that closely resemble legitimate ones by altering characters (e.g. using a zero instead of an "o"). Type the URL directly into your browser rather than clicking on links from unverified sources.
Minimal token approvals: When connecting your wallet to a dApp, only grant necessary permissions. Be cautious of dApps requesting unlimited access to your tokens, as this can enable them to drain your wallet without further consent.
Skepticism: Be cautious of dApps that promise unrealistic returns or benefits, especially in DeFi contexts. Such offers are often indicative of scams designed to lure users into giving up their assets.
Developer engagement: Legitimate dApps typically have active development teams and community support channels. Look for regular updates, communication from developers, and responsiveness to user inquiries.
What should I do if I connect to a malicious dApp?
1. Revoke Permissions
Immediately revoke any permissions you granted to the malicious dApp. Use blockchain explorers or tools like Revoke.cash or Etherscan's Token Approval Checker (for Ethereum) or similar tools for other blockchains. These tools enable you to see which dApps can access your tokens and revoke those permissions.
2. Disconnect Your Wallet
Next, disconnect your wallet from the dApp. Open your wallet application, and navigate to the settings or connected DApps section. Locate the malicious dApp and disconnect it immediately.
3. Transfer Funds to a Secure Wallet
If you suspect your assets may be at risk, transfer them to a new, secure wallet that has not interacted with the malicious dApp. Create your new wallet and move all your funds from the compromised wallet to ensure their safety.
4. Change Passwords and Secure Your Account
Strengthen the security of your accounts by changing passwords for your wallet and any linked services.
5. Scan for Malware
Run a full malware scan on your device using reputable antivirus or anti-malware software, to ensure that no malicious software has been introduced during your interaction with the dApp.
6. Notify the Community
Inform others about the malicious dApp by sharing information in relevant online communities and forums. If you have lost significant funds, report the incident to your relevant, regional cybercrime authorities. Provide detailed information about the dApp, transactions involved, and any other relevant details to aid in their investigation.
Exploring dApps with Trust Wallet
Trust Wallet enables secure browsing of decentralized applications and offers a user-friendly and secure gateway into the Web3 ecosystem. Trust Wallet is designed to empower you by providing a seamless experience for managing digital assets while interacting with various dApps, from decentralized finance (DeFi) platforms to NFT marketplaces. To get started, you can access the dApp browser directly within the Trust Wallet mobile app or through its browser extension. By simply navigating to the "Discover" option, you can explore a curated list of reputable dApps or enter specific URLs to connect directly. Trust Wallet enhances security with features like the Trust Wallet Security Scanner, which helps flag high-risk dApps and alerts you to potential threats. This combination of accessibility and security makes Trust Wallet an ideal choice for anyone looking to engage with the growing world of dApps confidently.
Disclaimer: Content is for informational purposes and not investment advice. Web3 and crypto come with risk. Please do your own research with respect to interacting with any Web3 applications or crypto assets. View our terms of service.
Join the Trust Wallet community on Telegram. Follow us on X (formerly Twitter), Instagram, Facebook, Reddit, Warpcast, and Tiktok
Note: Any cited numbers, figures, or illustrations are reported at the time of writing, and are subject to change.