Squads Emergency Alert: Address poisoning and forged multisig accounts; a whitelist mechanism will go live

SOL-0,25%

地址轉帳攻擊

Solana native multi-signature protocol Squads issued a warning on the X platform on April 14, stating that attackers are carrying out an address poisoning attack against Squads users. By forging fake accounts whose first and last characters match those of real multi-signature addresses, they trick users into sending funds to malicious addresses or signing unauthorized transactions. Squads confirmed that there is no evidence that user funds have been harmed, and said this is a social engineering attack at the interface level rather than a security vulnerability at the protocol level.

Attack Mechanism Breakdown: How a Two-Layer Deception Structure Creates Fake Accounts

Attackers use publicly available public-key data on the blockchain to design a double-deception architecture.

First layer: Automatically add the target user to a forged multi-signature account The attackers read the public keys of existing Squads users from the chain, programmatically create a new multi-signature account with the target user as a member, and make the forged account appear in the interface like an organization that the user is “legitimately participating in.” This lowers the target user’s vigilance.

Second layer: Generate “vanity” addresses with matching first and last characters Using address collision computations, attackers generate a public key whose first and last characters are exactly identical to those of the user’s real multi-signature address. When combined with the habit of most users to check only the first and last characters of an address, the forged account has a fairly high probability of visually deceiving users.

Squads clearly stated that the attackers cannot directly access or control user funds through the methods above. All loss risk comes from actions users take after being tricked, not from a technical protocol-layer breach.

Squads’ Phased Response Measures

Immediate warning banner: Within two hours after the attack is detected, show a warning banner on the interface targeting attacks against suspicious accounts

No-interaction account alert: Add a dedicated warning prompt to multi-signature accounts that have never interacted with the user, reducing the risk of accidental actions

White-list mechanism rollout: In the coming days, introduce a white-list mechanism that allows users to clearly mark known trusted multi-signature accounts, and the system will automatically filter unknown accounts

Immediate user protection recommendations: Ignore all multi-signature accounts that were not created by you personally and were not explicitly added by clearly trusted members; when verifying addresses, perform a complete character-by-character comparison—never rely solely on visual matching of the first and last characters.

Broader Context: Solana Ecosystem Social Engineering Threats Keep Escalating

This Squads address poisoning attack is part of a broader escalation of social engineering security threats in the Solana ecosystem recently. Earlier, there was a $285 million theft incident involving the Drift protocol. Investigating organizations determined that it was mainly due to social engineering rather than a flaw in smart contract code—attackers spent months impersonating legitimate trading companies, gradually gained trust, and obtained system access permissions.

The Solana Foundation and Asymmetric Research have launched a STRIDE security program for this purpose, to continuously monitor and replace traditional one-time audits with formal verification, and to establish a Solana Incident Response Network (SIRN) to coordinate real-time crisis response across the whole network. After the Drift incident, multi-signature setups and high-value protocols in the ecosystem are facing more stringent security scrutiny, and Squads’ rapid response model provides a reference template for crisis response for other protocols in the ecosystem.

Frequently Asked Questions

What is an address poisoning attack? What is special about the Squads case?

An address poisoning attack typically refers to attackers creating fake addresses that closely resemble the target address, tricking users into taking incorrect actions. The special aspect of the Squads case is that the attacker not only collides to generate vanity addresses whose first and last characters match, but also automatically adds the target user to the forged multi-signature account—making the fake account look like a legitimate organization that the user has “participated in,” with an even more complex layer of deception.

Does the Squads multi-signature protocol itself have a security vulnerability?

Squads explicitly denies a protocol vulnerability. The attacker cannot use address poisoning to access existing users’ multi-signature account funds, nor can they change the member settings of existing multi-signature accounts. This attack is social engineering at the interface layer, relying on deceiving users into making incorrect actions themselves rather than a technical intrusion.

How can users identify and defend against this type of address poisoning attack?

There are three core protection principles: one, ignore all multi-signature accounts that were not created by you personally or were not explicitly added by trusted members; two, perform a complete character-by-character comparison when verifying addresses—do not rely only on visual matching of first and last characters; three, after the Squads white-list mechanism goes live, actively mark trusted accounts via the white list to improve the reliability of account identification.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Solana Eyes $87 Breakout as Bullish Signals Strengthen

Solana sits near key resistance around $87 as on-chain activity and positive funding buoy bullish momentum; whale-led demand in derivatives supports a potential breakout. RSI >50 and positive MACD indicate rising upside, with a path toward $92–$97 and support near $77.

CryptoNewsLand6h ago

GSR Debuts BESO ETF With Bitcoin, Ethereum, Solana

GSR debuts BESO ETF with active strategy, adjusting Bitcoin, Ether, and Solana allocations weekly to outperform benchmarks. ETF records nearly $5M in first-day volume, signaling early investor interest in diversified crypto investment products. Launch aligns with growing ETF momentum as

CryptoFrontNews11h ago

Solana Spot ETF Sees $1.14M Net Outflows Yesterday, FSOL Posts Gains While VSOL Declines

Gate News message, April 25 — Solana spot ETFs recorded a combined net outflow of $1.1364 million yesterday (April 24), according to SoSoValue data. Fidelity Solana Fund ETF (FSOL) posted a single-day net inflow of $257,000 and has accumulated $158 million in historical net inflows. VanEck Solana E

GateNews15h ago

U.S. Solana Spot ETFs Record $1.17M Net Outflows; Fidelity FSOL Posts Inflows

Gate News message, April 25 — According to SoSoValue data, U.S. Solana spot ETFs recorded a combined net outflow of $1.1736 million yesterday (April 24, ET). Fidelity Solana Fund ETF (FSOL) posted a daily net inflow of $257,000, bringing its historical cumulative net inflows to $158 million.

GateNews22h ago

DeFi Stakeholders Petition SEC to Formalize Interface Guidance as Ethereum Proposes Native Privacy Layer

Gate News message, April 24 — The DeFi Education Fund (DEF) and 35 co-signatories, including a16z crypto, Aptos Labs, Uniswap, Chainlink, Paradigm, Solana Policy Institute, and Phantom, have petitioned the Securities and Exchange Commission (SEC) to convert its recent staff guidance on DeFi interfac

GateNews04-24 21:29

Luck.io, Solana's Non-Custodial Casino, Shuts Down; Users Urged to Withdraw Funds Immediately

Gate News message, April 24 — Luck.io, a non-custodial casino platform built on Solana, announced its closure on April 24, 2026, urging all users to withdraw their balances from Smart Vaults immediately. Withdrawals can be initiated through the luck.io website or via the Vault Withdrawal Tool at

GateNews04-24 18:21
Comment
0/400
No comments