
AdLunam
Loading...
Forums
Talk about anything you want!
Forums › BTC, ETH & Macro Markets › Ethereum › Security alert – Intelligent contract portfolios created at the border are vulnerable to phishing attacks
Assigned configurations: All intelligent contract portfolios created using Ethereum Wallet Frontier, version 0.4.0 (Beta 7) or earlier. The portfolios created with Ethereum Wallet 0.5.0 and all the subsequent versions published after March 3, 2016 are not affected.
Probability: Weak
Severity: High
Do not use portfolio contracts or owners’ accounts of these portfolios created by the Ethereum 0.4.0 or earlier portfolio. If you send (or interact with) a malicious contract, it could appropriate your wallet contract. Create a new portfolio and move your funds.
Do not use vulnerable portfolio contracts, and the accounts of the owner of these portfolios to send ether and interact with the contracts you do not know! If you do not use these accounts and wallets, and improve your wallet as describe hereYou are safe!
An attack vector has been discovered which affects the intelligent contract portfolios created before the release of ownership (border phase). The attack may occur if an affected wallet interacts with a malicious contract or if the account of the owner of an affected portfolio interacts with a malicious contract which knows the address of his portfolio. An attacker can then pretend to be the owner and can therefore steal funds or tokens and change the owner of the wallet.
If you do not use your portfolio and owner accounts with contracts that you do not know, you are safe!
Receiving ether and sending the ether to unpaid accounts is very good.
In addition, if you have configured your wallet with multisig, you are safer, because the attacker should have you sent with all the owners to malicious contracts.
We recommend that if you have created a wallet using the affected versions, you take one of these steps:
We have created a new version of Ethereum 0.7.6 portfolio, which will detect your vulnerable wallets.
Download the latest version and follow the steps described in the version notes to update your vulnerable wallets!
1
Voice
0
Replies