
Briefing
A sophisticated phishing attack successfully compromised a 2-of-4 Safe multi-signature wallet, resulting in the theft of $3.047 million in USDC. The attacker exploited the Safe Multi Send mechanism by disguising a malicious approval within what appeared to be a routine transaction. This incident highlights the critical vulnerability of even robust security setups to refined social engineering tactics.

Context
The prevailing attack surface for high-value digital assets includes sophisticated social engineering and contract impersonation. Multi-signature wallets offer enhanced security through requiring multiple approvals for transactions. These systems remain susceptible to meticulously crafted phishing attempts that exploit user trust and interface vulnerabilities.

Analysis
The attacker deployed a fake, Etherscan-verified contract weeks prior, embedding it with legitimate-looking batch payment functions. The exploit unfolded through two consecutive transactions via the Request Finance app interface. The victim unknowingly approved transfers to an address that mimicked the intended recipient, enabled by the attacker crafting the fraudulent contract to mirror the legitimate one’s first and last characters.
This subtle impersonation bypassed user scrutiny, allowing the malicious approval to execute under the guise of a standard operation. The illicitly acquired funds were subsequently funneled into Tornado Cash.

Parameters
- Targeted Asset ∞ $3.047 Million USDC
- Exploited System ∞ 2-of-4 Safe Multi-signature Wallet
- Attack Vector ∞ Sophisticated Phishing, Contract Spoofing, Disguised Approval
- Facilitating Mechanism ∞ Safe Multi Send
- Blockchain Affected ∞ Ethereum
- Attacker Funds Destination ∞ Tornado Cash
- Initial Detection ∞ ZachXBT (September 11, 2025)
- Compromised Interface ∞ Request Finance App

Outlook
Users of multi-signature wallets must implement heightened scrutiny of all transaction approval requests, verifying contract addresses independently. Protocols should enhance their front-end security to detect and flag suspicious contract interactions, even those with verified statuses. This incident establishes a new benchmark for advanced phishing tactics, necessitating improved user education and robust pre-transaction verification tools across the ecosystem.

Verdict
This exploit serves as a critical reminder that human vigilance remains the final frontier against advanced social engineering, even with multi-layered technical security controls.
Signal Acquired from ∞ cryptoslate.com