Squads Emergency Alert: Address poisoning and forged multisig accounts; a whitelist mechanism will go live

SOL-3,25%

地址轉帳攻擊

Solana native multi-signature protocol Squads issued a warning on the X platform on April 14, stating that attackers are carrying out an address poisoning attack against Squads users. By forging fake accounts whose first and last characters match those of real multi-signature addresses, they trick users into sending funds to malicious addresses or signing unauthorized transactions. Squads confirmed that there is no evidence that user funds have been harmed, and said this is a social engineering attack at the interface level rather than a security vulnerability at the protocol level.

Attack Mechanism Breakdown: How a Two-Layer Deception Structure Creates Fake Accounts

Attackers use publicly available public-key data on the blockchain to design a double-deception architecture.

First layer: Automatically add the target user to a forged multi-signature account The attackers read the public keys of existing Squads users from the chain, programmatically create a new multi-signature account with the target user as a member, and make the forged account appear in the interface like an organization that the user is “legitimately participating in.” This lowers the target user’s vigilance.

Second layer: Generate “vanity” addresses with matching first and last characters Using address collision computations, attackers generate a public key whose first and last characters are exactly identical to those of the user’s real multi-signature address. When combined with the habit of most users to check only the first and last characters of an address, the forged account has a fairly high probability of visually deceiving users.

Squads clearly stated that the attackers cannot directly access or control user funds through the methods above. All loss risk comes from actions users take after being tricked, not from a technical protocol-layer breach.

Squads’ Phased Response Measures

Immediate warning banner: Within two hours after the attack is detected, show a warning banner on the interface targeting attacks against suspicious accounts

No-interaction account alert: Add a dedicated warning prompt to multi-signature accounts that have never interacted with the user, reducing the risk of accidental actions

White-list mechanism rollout: In the coming days, introduce a white-list mechanism that allows users to clearly mark known trusted multi-signature accounts, and the system will automatically filter unknown accounts

Immediate user protection recommendations: Ignore all multi-signature accounts that were not created by you personally and were not explicitly added by clearly trusted members; when verifying addresses, perform a complete character-by-character comparison—never rely solely on visual matching of the first and last characters.

Broader Context: Solana Ecosystem Social Engineering Threats Keep Escalating

This Squads address poisoning attack is part of a broader escalation of social engineering security threats in the Solana ecosystem recently. Earlier, there was a $285 million theft incident involving the Drift protocol. Investigating organizations determined that it was mainly due to social engineering rather than a flaw in smart contract code—attackers spent months impersonating legitimate trading companies, gradually gained trust, and obtained system access permissions.

The Solana Foundation and Asymmetric Research have launched a STRIDE security program for this purpose, to continuously monitor and replace traditional one-time audits with formal verification, and to establish a Solana Incident Response Network (SIRN) to coordinate real-time crisis response across the whole network. After the Drift incident, multi-signature setups and high-value protocols in the ecosystem are facing more stringent security scrutiny, and Squads’ rapid response model provides a reference template for crisis response for other protocols in the ecosystem.

Frequently Asked Questions

What is an address poisoning attack? What is special about the Squads case?

An address poisoning attack typically refers to attackers creating fake addresses that closely resemble the target address, tricking users into taking incorrect actions. The special aspect of the Squads case is that the attacker not only collides to generate vanity addresses whose first and last characters match, but also automatically adds the target user to the forged multi-signature account—making the fake account look like a legitimate organization that the user has “participated in,” with an even more complex layer of deception.

Does the Squads multi-signature protocol itself have a security vulnerability?

Squads explicitly denies a protocol vulnerability. The attacker cannot use address poisoning to access existing users’ multi-signature account funds, nor can they change the member settings of existing multi-signature accounts. This attack is social engineering at the interface layer, relying on deceiving users into making incorrect actions themselves rather than a technical intrusion.

How can users identify and defend against this type of address poisoning attack?

There are three core protection principles: one, ignore all multi-signature accounts that were not created by you personally or were not explicitly added by trusted members; two, perform a complete character-by-character comparison when verifying addresses—do not rely only on visual matching of first and last characters; three, after the Squads white-list mechanism goes live, actively mark trusted accounts via the white list to improve the reliability of account identification.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Solana Price Stalls Near $80 as ETF Outflows Weigh

Solana trades around $80, facing bearish sentiment due to ETF outflows and declining retail participation. Technical indicators show mixed signals, with resistance at $87 and $98, while support at $77 remains critical for stability.

CryptoFrontNews2h ago

Solana Adoption Surges to 167M While Usage and Price Diverge

Key Insights Solana reached 167 million holders, signaling strong adoption growth even as active addresses declined, showing a widening gap between ownership and usage trends. Institutional interest increased as DeFi Development Corp accumulated over 2.22 million SOL, reinforcing long-term c

CryptoNewsLand16h ago

Singapore Gulf Bank Launches Zero-Fee Stablecoin Service on Solana for Institutional Clients

Singapore Gulf Bank has introduced a stablecoin conversion service for corporate and high-net-worth clients, enabling zero-fee fiat-to-stablecoin transactions on the Solana network. It supports multiple blockchains and enhances liquidity management.

GateNews04-17 21:02

XRP Goes Live on Solana as Official Wrapped Token

Ripple's XRP launched on Solana as a wrapped cross-chain asset on April 17, partnering with Hex Trust and others. This move, aimed at boosting liquidity and expanding access to Solana's DEX ecosystem, highlights Solana's growing role in cross-chain tokenization.

GateNews04-17 20:11

Singapore Gulf Bank Launches Stablecoin Minting Service, Offering Zero Fees on Solana

Singapore Gulf Bank launched a stablecoin minting and redemption service for corporate clients, allowing conversions between fiat and USD stablecoins with no fees on Solana for transactions over $100,000. This aims to enhance cash flow and boost USDC adoption.

GateNews04-17 16:51

Bitcoin ETFs See Daily Outflow While Ethereum and Solana ETFs Post Gains on April 17

Gate News message, according to the April 17 update, Bitcoin ETFs recorded a 1-day net outflow of 142 BTC ($10.98M) and a 7-day net inflow of 7,093 BTC ($550.09M). Ethereum ETFs showed a 1-day net inflow of 22,357 ETH ($54.55M) and a 7-day net inflow of 89,684 ETH ($218.83M). Solana ETFs posted a 1-

GateNews04-17 15:54
Comment
0/400
No comments