Web3 phishing attacks are a common threat to cryptocurrency users. Their purpose is to steal their crypto assets by inducing users to authorize, sign, or misoperate. In this article, SharkTeam systematically analyzes seven common Web3 phishing techniques, including Permit off-chain signature phishing, Permit2 off-chain signature phishing, eth_sign on-chain blind signature phishing, personal_sign/signTypedData on-chain signature phishing, authorization phishing, and address pollution phishing. As well as phishing methods that use CREATE2 to bypass security detection. The article also introduces the black industry chain of Drainer as a Service (DaaS), and provides five security suggestions to help users identify phishing scams and protect the security of their encrypted assets.