OKX Web3 Wallet Upgrades Risk Transaction Interception Strategy
According to the official announcement, in order to further improve the security of Web3 wallet, OKX Web3 wallet has now upgraded its interception strategy for risk transactions. The risk transactions that can be intercepted are as follows:
1) Maliciously authorize to the EOA account. Usually DApp authorization is to the contract account, not the EOA.
2) Maliciously change your account owner. Once you sign, you will lose control of your account. Usually happens on public chains designed by account owners at the bottom of TRON, Solana, etc.
3) Maliciously change your transfer address. A few DApp contracts are not well designed, but Ouyi Wallet can identify risks.
4) Intercept transfers to similar addresses. This attack method is: the attacker generates an address that is very similar to your recent use (the same characters before and after the address), transfers a large number of fake USDT to you, and increases the probability of copying it as a hacker address on the transaction history page.
According to OKX Web3 Wallet, if users see relevant risk interception when conducting on-chain transactions, please operate with caution. Currently, users need to upgrade the OKX APP to 6.74.0 and above, or the OKX Web3 plug-in wallet to upgrade to 3.1.0 and above, to experience this function immediately.