Clipboard Phishing Challenge

Challenge: Identify the Clipboard-based Phishing Attack

Educational Purpose Only - Phishing Simulation

Scenario Description

You need to transfer 1 ETH to your friend's wallet. They've shared their wallet address with you, and you're using a cryptocurrency transfer interface to send the funds.

⚠️ Educational Warning: This is a simulated phishing challenge. The interface below demonstrates a common phishing technique. Try to identify what makes it suspicious.

Chat with Friend

Hey! Here's my wallet address for the ETH you promised:
0x742d35Cc6634C0532925a3b844Bc454e4438f44e
Got it! I'll send it right away.

Transfer ETH

🎉 Challenge Complete!

Congratulations! You've successfully avoided a clipboard-based phishing attack.

How This Attack Works:

  1. The attacker creates a malicious website that looks legitimate
  2. When you click the "Copy" button, malicious JavaScript code secretly replaces the copied address
  3. If you don't verify the address after pasting, you might send funds to the attacker

How to Stay Safe:

  • Always double-check addresses after pasting
  • Consider using a hardware wallet with address verification
  • Be cautious when copying sensitive information (like wallet addresses) anywhere on your computer - malware can modify your clipboard content even when using Ctrl+C

❌ Challenge Failed

The address you entered is incorrect. Please try again.

⚠️ Malicious Clipboard Activity Detected!

The displayed address: 0x742d35Cc6634C0532925a3b844Bc454e4438f44e

What was copied to clipboard: 0x742D35Cc6634c0532925a3b844Bc454e4438F42e

This is an example of a clipboard-based phishing attack where the copied address is replaced with a malicious one!