🇬🇧
Go+ Encyclopedia
English
English
  • 📗Intro
    • Hello, Web3!
    • Recent Security Incidents
  • 👿Vulnerabilities Cases
    • Blockchain Network
      • Eclipse Attack
    • Smart Contract
      • Symmetry Breaking
        • XCarnival
      • Hash Collision
        • Poly Network
      • Flash Loan
        • Cream Finance
      • General NFT
        • ERC721R Bug
        • Sleep Minting
      • Cross-chain Bridge
        • Poly Network
        • Nomad
      • Proxy Contract
        • Audius
    • User Client
      • Clipboard Safety
      • Metamask Demonic Vulnerability
    • Replay Attack
      • Wintermute & OP
    • Phishing
      • Frontend Hijack
        • Premint.xyz
      • Fake User Interface
      • Fake E-mail Address
    • Basic Cryptography
      • Fault Attack
        • ECDSA random numbers
        • Ed25519
    • Zero-knowledge Proof
      • Aliasing Attack
  • 🏝️Miscellaneous
    • Tools
Powered by GitBook
On this page
  • Abstract
  • Fake UI on a scam website
  1. Vulnerabilities Cases
  2. Phishing

Fake User Interface

PreviousPremint.xyzNextFake E-mail Address

Last updated 2 years ago

Abstract

Fake UI tries to mimic critical software like a wallet, then guide user to enter their password, seed phrase, etc... There are some methods to distinguish between fake and genuine ones.

Fake UI on a scam website

  1. After click Connect Wallet, the fake UI poped up.

2. Tell you your password is compromised and Reset Wallet is needed.

3. Asking your seed phrase.

👿
Fake UI
The real one has a title bar. Though the scam website can also make it look like this, but still we have other mesaure to identify.
This interface also looks like the real one. But beware the URL, it's from the scame website.