As the ORDI price breaks through a historic high, with a market capitalization of over $1 billion and a maximum increase of tens of thousands of times, the Bitcoin ecosystem and various BRC20 inscriptions have entered a frenzy bull market. GoPlus, the leader in user security, has discovered a myriad of scams that exploit inscriptions are emerging. We have compiled four typical cases of inscription attacks (phishing websites, genuine and fake inscriptions, Mint information, dangerous Mint information fraud) and their corresponding countermeasures. Please pay attention when conducting transactions to avoid financial losses.
Case: A fraud group created a website (unisats.io) that is extremely similar to the official Unisat wallet platform, and lured users to visit it by purchasing Google search keywords. This led to many users mistakenly transferring their assets to the phishing website, resulting in losses of Ethereum and Bitcoin.
Countermeasure:
Case: On the inscription trading platform, users face the challenge of distinguishing authentic and counterfeit inscriptions. These platforms often display multiple inscriptions with the same name, making it difficult for users to differentiate their specific protocols. Scammers take advantage of this by adding invalid fields to forge inscriptions. Similar issues exist in the NFT market, where fraudsters create counterfeit NFTs by engraving identical images, with the only difference being in the serial numbers.
Example: https://evm.ink/tokens showcases that DOGI inscriptions may appear to be completely identical, but in reality, they are significantly different.
Because the platform only captures specific fields for display in the frontend, scammers can use the following methods to forge inscriptions.
NFT inscriptions also have related issues. In the early market, it is common to encounter NFTs with the same attributes but different ordinal numbers. Taking BTC inscription NFT as an example, a Collection series will only include NFTs of specific ordinal numbers. If it does not belong to that ordinal number set, it does not belong to the series. Therefore, scammers often forge a certain NFT from the same series to deceive transactions. For users, it is difficult to distinguish whether the ordinal number belongs to the series.
Countermeasure:
Case: On some public chains, fraud teams take advantage of users’ fear of missing out (FOMO) psychology towards new inscriptions and create fraudulent Mint contracts. These contracts induce users to interact, leading them to mistakenly believe that they have obtained inscriptions. However, in reality, users receive NFTs with no value and end up paying high purchase taxes during the interaction process. In a case on the Sui chain, a user engraved what seemed to be a legitimate inscription but actually received a fake NFT and paid SUI tokens to the fraudster. Within a short period, the fraudster collected over 5000 SUI tokens.
如何应对:
Case: GoPlus has observed the circulation of dangerous Mint information in the user community. Once these information are published, many users will be eager to use the inscription script tool to copy and paste private keys and transaction information for batch operations. These operations may result in asset theft. Fraudulent groups induce users to perform inscription operations by constructing special JSON fields and encoding them as hex, potentially resulting in the transfer of users’ assets. Additionally, they may set up deceptive Mint contracts, causing users to receive worthless fake inscription tokens after incurring high gas fees.
Using this image as an example: Minting of general token-based inscriptions is usually done by self-rotation of the address, and a string of JSON content for the token protocol is added in the Input data to achieve the inscribing process. Many users, when performing operations, use the wallet’s built-in custom Hex to escape the JSON content of the token protocol and input it as hexadecimal. For users, they typically directly paste the hexadecimal string from the message source, but this string is likely to be a malicious string that is escaped from another JSON format.
Countermeasure:
Using Ton’s inscription as an example, start by examining the addresses with high-ranking holdings (representing early participants) at https://tonano.io/ton20/ton.
Click on one of the addresses, copy and paste it into the browser interface at https://tonscan.org/address, and check the relevant transaction information for that address.
The same browser query applies to blockchains such as Ethereum/Solana.
Check the input inscription data contained in the “Message” package to see if it matches the inscription data entered by yourself.
Thank you for your interest in the GoPlus security series articles. In this rapidly changing cryptocurrency world, security is one of the most important considerations. GoPlus is committed to continuously monitoring industry trends and providing comprehensive protection for your digital assets. By following us, you can stay up to date with the latest security updates, alerts, and best practices to help you navigate this area of opportunities and challenges safely.。
GoPlus is the first customer security data service provider, supporting the risk-detecting engine with a maximum of 30m+ calls each day. GoPlus has the first open sourced asset contract risk classification standard and the largest contract attack sample library of the world, and has become the token and NFT security monitoring service with the highest detection accuracy and strongest service ability in the web3 world. GoPlus has been offer sustainable user security data service to 200+partners including CoinmarketCap、Coingecko、Dextool、DexScreener、Ave、Opera Crypto browser、Safepal, Bitgit Wallet, Token Pocket, MetaMask Snaps and others.
As the ORDI price breaks through a historic high, with a market capitalization of over $1 billion and a maximum increase of tens of thousands of times, the Bitcoin ecosystem and various BRC20 inscriptions have entered a frenzy bull market. GoPlus, the leader in user security, has discovered a myriad of scams that exploit inscriptions are emerging. We have compiled four typical cases of inscription attacks (phishing websites, genuine and fake inscriptions, Mint information, dangerous Mint information fraud) and their corresponding countermeasures. Please pay attention when conducting transactions to avoid financial losses.
Case: A fraud group created a website (unisats.io) that is extremely similar to the official Unisat wallet platform, and lured users to visit it by purchasing Google search keywords. This led to many users mistakenly transferring their assets to the phishing website, resulting in losses of Ethereum and Bitcoin.
Countermeasure:
Case: On the inscription trading platform, users face the challenge of distinguishing authentic and counterfeit inscriptions. These platforms often display multiple inscriptions with the same name, making it difficult for users to differentiate their specific protocols. Scammers take advantage of this by adding invalid fields to forge inscriptions. Similar issues exist in the NFT market, where fraudsters create counterfeit NFTs by engraving identical images, with the only difference being in the serial numbers.
Example: https://evm.ink/tokens showcases that DOGI inscriptions may appear to be completely identical, but in reality, they are significantly different.
Because the platform only captures specific fields for display in the frontend, scammers can use the following methods to forge inscriptions.
NFT inscriptions also have related issues. In the early market, it is common to encounter NFTs with the same attributes but different ordinal numbers. Taking BTC inscription NFT as an example, a Collection series will only include NFTs of specific ordinal numbers. If it does not belong to that ordinal number set, it does not belong to the series. Therefore, scammers often forge a certain NFT from the same series to deceive transactions. For users, it is difficult to distinguish whether the ordinal number belongs to the series.
Countermeasure:
Case: On some public chains, fraud teams take advantage of users’ fear of missing out (FOMO) psychology towards new inscriptions and create fraudulent Mint contracts. These contracts induce users to interact, leading them to mistakenly believe that they have obtained inscriptions. However, in reality, users receive NFTs with no value and end up paying high purchase taxes during the interaction process. In a case on the Sui chain, a user engraved what seemed to be a legitimate inscription but actually received a fake NFT and paid SUI tokens to the fraudster. Within a short period, the fraudster collected over 5000 SUI tokens.
如何应对:
Case: GoPlus has observed the circulation of dangerous Mint information in the user community. Once these information are published, many users will be eager to use the inscription script tool to copy and paste private keys and transaction information for batch operations. These operations may result in asset theft. Fraudulent groups induce users to perform inscription operations by constructing special JSON fields and encoding them as hex, potentially resulting in the transfer of users’ assets. Additionally, they may set up deceptive Mint contracts, causing users to receive worthless fake inscription tokens after incurring high gas fees.
Using this image as an example: Minting of general token-based inscriptions is usually done by self-rotation of the address, and a string of JSON content for the token protocol is added in the Input data to achieve the inscribing process. Many users, when performing operations, use the wallet’s built-in custom Hex to escape the JSON content of the token protocol and input it as hexadecimal. For users, they typically directly paste the hexadecimal string from the message source, but this string is likely to be a malicious string that is escaped from another JSON format.
Countermeasure:
Using Ton’s inscription as an example, start by examining the addresses with high-ranking holdings (representing early participants) at https://tonano.io/ton20/ton.
Click on one of the addresses, copy and paste it into the browser interface at https://tonscan.org/address, and check the relevant transaction information for that address.
The same browser query applies to blockchains such as Ethereum/Solana.
Check the input inscription data contained in the “Message” package to see if it matches the inscription data entered by yourself.
Thank you for your interest in the GoPlus security series articles. In this rapidly changing cryptocurrency world, security is one of the most important considerations. GoPlus is committed to continuously monitoring industry trends and providing comprehensive protection for your digital assets. By following us, you can stay up to date with the latest security updates, alerts, and best practices to help you navigate this area of opportunities and challenges safely.。
GoPlus is the first customer security data service provider, supporting the risk-detecting engine with a maximum of 30m+ calls each day. GoPlus has the first open sourced asset contract risk classification standard and the largest contract attack sample library of the world, and has become the token and NFT security monitoring service with the highest detection accuracy and strongest service ability in the web3 world. GoPlus has been offer sustainable user security data service to 200+partners including CoinmarketCap、Coingecko、Dextool、DexScreener、Ave、Opera Crypto browser、Safepal, Bitgit Wallet, Token Pocket, MetaMask Snaps and others.