Forward the Original Title: Unveiling Honeypot Scams
Dive into token code and safeguard Web3 security
If you’re a user in decentralized platforms, the concept of a “Honeypot scam” won’t be foreign to you. Even if you haven’t heard this term before, you’ve likely encountered such fraudulent activities.
“Honeypot” is actually an analogy that essentially refers to deliberately luring others into a trap. In the case of Honeypot tokens, various illusions (such as extremely high liquidity and price increases) are created to entice investors to purchase the tokens. However, after they make the purchase, they realize that due to the deployment of malicious code in the contract, they can’t sell these tokens at all. This is the Honeypot scam.
In a bid to exploit their users, Honeypot schemes often continuously update and iterate contract code. They employ increasingly intricate implementation logic to mask their true motives, aiming to either evade the vigilance of security mechanisms or heighten the analytical complexity for security experts.
Data from GoPlus reveals that the total number of Honeypot tokens in the crypto market saw a substantial increase in 2022, with 64,661 newly introduced Honeypot tokens. This marks an impressive growth of 83.39% compared to the same period in 2021. Among these, 92.8% of Honeypot tokens originated from the BNB Chain, while 6.6% came from Ethereum. These two blockchains also stand out as among the most active and populated networks in terms of tokens.
One of the contributing factors to the steep rise in Honeypot tokens can be attributed to the impact of the FTX incident at the end of 2022. A significant number of users transferred their digital assets from centralized exchanges to decentralized wallets, resulting in a surge of on-chain active users. Consequently, attackers became more active as well. According to data, within just one week of the FTX incident, over 120 new Honeypot attack methods emerged, marking a six-fold increase in attack frequency.
Beyond the absolute increase in numbers, the characteristics of Honeypot tokens have become more diverse and intricate. Analyzing security data from the past year, GoPlus has observed that Honeypot token attacks have evolved to become increasingly difficult to detect and more covert. In general, they exhibit the following key features:
This token is issued on the ETH Mainnet, with the contract address: 0x43571a39f5f7799607075883d9ccD10427AF69Be.
After analyzing the contract code, it can be observed that this contract attempts to implement a “transfer blacklist mechanism” for holder account addresses. If the transfer address is on the blacklist, the transfer transaction will fail. This is a typical Honeypot token mechanism that ultimately prevents holders from selling their assets.
However, for the majority of users, they may not have the ability to read and analyze code, making it challenging to identify these security risks through code auditing. This article lists the mainstream tools available on the market for analyzing fraud risks in EVM smart contracts. If you wish to evaluate the fraud risk associated with smart contracts that have already been deployed, you can use the following tools, with the contract address mentioned above serving as an illustration:
GoPlus Security
Token Sniffer
Using the aforementioned analysis tools, users can quickly identify the fraud risks in smart contracts and analyze the dangers. Once the risk of Honeypots is detected, it is strongly recommended to refrain from participating in order to prevent falling prey to contracts of this nature.
As hackers continually evolve their attack strategies, security defense becomes an increasingly challenging task. As blockchain users, when facing Honeypot scams, we need to pay attention to the following points:
Learning about crypto security should remain an ongoing process. Only through this can one effectively tackle the challenges posed by the emerging and evolving security risks.
Forward the Original Title: Unveiling Honeypot Scams
Dive into token code and safeguard Web3 security
If you’re a user in decentralized platforms, the concept of a “Honeypot scam” won’t be foreign to you. Even if you haven’t heard this term before, you’ve likely encountered such fraudulent activities.
“Honeypot” is actually an analogy that essentially refers to deliberately luring others into a trap. In the case of Honeypot tokens, various illusions (such as extremely high liquidity and price increases) are created to entice investors to purchase the tokens. However, after they make the purchase, they realize that due to the deployment of malicious code in the contract, they can’t sell these tokens at all. This is the Honeypot scam.
In a bid to exploit their users, Honeypot schemes often continuously update and iterate contract code. They employ increasingly intricate implementation logic to mask their true motives, aiming to either evade the vigilance of security mechanisms or heighten the analytical complexity for security experts.
Data from GoPlus reveals that the total number of Honeypot tokens in the crypto market saw a substantial increase in 2022, with 64,661 newly introduced Honeypot tokens. This marks an impressive growth of 83.39% compared to the same period in 2021. Among these, 92.8% of Honeypot tokens originated from the BNB Chain, while 6.6% came from Ethereum. These two blockchains also stand out as among the most active and populated networks in terms of tokens.
One of the contributing factors to the steep rise in Honeypot tokens can be attributed to the impact of the FTX incident at the end of 2022. A significant number of users transferred their digital assets from centralized exchanges to decentralized wallets, resulting in a surge of on-chain active users. Consequently, attackers became more active as well. According to data, within just one week of the FTX incident, over 120 new Honeypot attack methods emerged, marking a six-fold increase in attack frequency.
Beyond the absolute increase in numbers, the characteristics of Honeypot tokens have become more diverse and intricate. Analyzing security data from the past year, GoPlus has observed that Honeypot token attacks have evolved to become increasingly difficult to detect and more covert. In general, they exhibit the following key features:
This token is issued on the ETH Mainnet, with the contract address: 0x43571a39f5f7799607075883d9ccD10427AF69Be.
After analyzing the contract code, it can be observed that this contract attempts to implement a “transfer blacklist mechanism” for holder account addresses. If the transfer address is on the blacklist, the transfer transaction will fail. This is a typical Honeypot token mechanism that ultimately prevents holders from selling their assets.
However, for the majority of users, they may not have the ability to read and analyze code, making it challenging to identify these security risks through code auditing. This article lists the mainstream tools available on the market for analyzing fraud risks in EVM smart contracts. If you wish to evaluate the fraud risk associated with smart contracts that have already been deployed, you can use the following tools, with the contract address mentioned above serving as an illustration:
GoPlus Security
Token Sniffer
Using the aforementioned analysis tools, users can quickly identify the fraud risks in smart contracts and analyze the dangers. Once the risk of Honeypots is detected, it is strongly recommended to refrain from participating in order to prevent falling prey to contracts of this nature.
As hackers continually evolve their attack strategies, security defense becomes an increasingly challenging task. As blockchain users, when facing Honeypot scams, we need to pay attention to the following points:
Learning about crypto security should remain an ongoing process. Only through this can one effectively tackle the challenges posed by the emerging and evolving security risks.