FinTechIntro / 2024-Spring-Final

0 stars 0 forks source link

Phishing Scam on web3 #11

Open williamhsiao0403 opened 6 months ago

williamhsiao0403 commented 6 months ago

Summary

Please give a short summary of this research topic.

Up until today on the blockchain, there are still numerous phishing incidents with a wide variety of tactics. Please conduct a brief research study on a particular phishing method or a method of phishing detection. The study can discuss how this phishing method is successful or what preventive measures might be available

Description

Please provide a detailed description to the topic.

Phishing methods on the blockchain can be very crafty. One common technique involves fake websites that trick users into granting access to their digital wallets. Attackers create websites that look identical to legitimate services, hoping users will enter their private keys or seed phrases, which are then stolen.

Another method involves issuing alternative coins (altcoins) that may be promoted as the next big investment opportunity but are essentially worthless. Unsuspecting investors might buy these altcoins, only to find out later that they hold no real value and are unable to sell them.

Source

Please provide related resource for the topics, including articles, research papers and more.

Most Common Web3 Scams and How to Avoid Them Scam Sniffer WEB3 Scam

Others

Please provide more information if there is any.

None

whoknows0425 commented 6 months ago

助教您好,我對這個主題有興趣,請您將assigness指定為我,謝謝助教!

HaoWen46 commented 6 months ago

Hi TA, I'd like to be assigned to this topic, thanks.

haha300220041006 commented 6 months ago

Hi TA, I'd like to assign myself to this topic, thank you!

leeyoyo49 commented 6 months ago

Hi TA, I'd like to be assigned to this topic, thank you~~

joel0115 commented 6 months ago

Hi, I'm interested in this topic, please assign me to this topic, thanks!

LouisTsai-Csie commented 6 months ago

@whoknows0425 @HaoWen46 @haha300220041006 I will assign you as the assignee. And there several cases we anticipate you to research: poisonous address, dust attack, zero transfer. If your research is related to transaction analysis, you should use some tools, such as etherscan, phalcon, metasleuth and provide simple diagram pertaining to the fund flow. Please let me know if you have any other question.

@leeyoyo49 @joel0115 I encourage you to find another research topics, since there will be more than 3 people researching the same one. You can still work on this one, but note that we will compare your report together when grading, please let me know if you still prefer this research topic or not.