The TTFGc88GU8LXrXNnSPZFeeivSwaBZoJGk1 address sent 721,054 TRX and 1,750 USDT to more than 60,000 addresses of the attacking network, while a commission of 90,443 TRX was paid. The total costs of crypto assets used in the framework of this network of addresses amounted to approximately $ 46,000. Combined with the costs listed below, the approximate amount of funds spent on launching the network was 50 000 - 55 000 $.
As a result of the functioning of the network under study, 153 receipts were established to the addresses of the attacking network after the transaction was made in the direction of the attacked one from such an address. The total amount of funds received in this way amounted to at least 1,941,484 USDT.
The profitability of the studied network was over 3800%.The most effective counteraction measuresAs a result of the analysis of "dandruff attacks", we consider it possible to reduce the risk of such an attack in the following ways:
- The application developers of cryptocurrency wallets may introduce the ability to hide transactions of less than $ 1 by default, it will reduce the effectiveness of attacks of the first, fourth and sixth generations to almost zero.
- In-depth analysis and de-anonymization of managers of staking addresses supplying. Energy to attacking networks will make this type of attack (for the second and third generations) more difficult and economically unprofitable.
- Analysis of the sources of TRX receipt on the networks of attacking addresses will allow putting additional pressure on the administrators of the attacking networks of the first, fourth, and sixth generations.
- Automatic blocking of Tether It. USDT assets at attacking addresses when amounts over a certain value are received on them after sending "dandruff" based on an automatic activity analysis algorithm (such an algorithm was implemented by our technical specialists in a few hours) will lead to the loss of the economic feasibility of this type of attack.
- Studying the logs of requests to key services for providing information about transactions on the Tron network will allow you (if the attacker does not use his node) to identify possible administrators of attacking networks of all generations.
- Identification of the authors of attacking algorithms is conducted at the debugging stage by searching for similar attacks in the test network. Many attacking networks are being tested on Tron test nets for debugging and tuning. Getting tokens in the Tron test net is possible only through the official community in Discord. An example of such an attack can be this transaction.
Information resources usedhttps://tronscan.org/
https://developers.tron.network/docs/resource-model
https://tronstation.io/calculator
The study was carried out: