Wallet Protection
Last updated
Last updated
The Syd Intelligence API allows wallet developers to easily incorporate high-quality threat signals directly into their products without hiring an internal cybersecurity team. We incorporate data feeds from over 6 top threat intelligence providers, merging it with intelligence from our own threat research team.
The result is an affordable, easy to consume data feed that protects your users from all common web3 attack vectors.
Wallet Drainers
Syd uses a combination of approaches to identify wallet drainers before the user interacts:
Advanced malicious domain identification.
Today's most common web3 security products make use of off-the-shelf blacklisting to protect their users from drainers. Syd has gone outside of web3 to partner with the most advanced domain reputation providers in the security space. Our security team's advanced techniques can identify malicious domains the instant they go live based on known tactics, techniques, and procedures of over 500 threat actors.
Smart contract scanning and translation
Before users interact with a smart contract, Syd can actively scan the destination to determine if it is safe or benign. The results are reported back to the wallet for simple integration and display to the end-user.
Wallet developers can protect their users from drainers by integrating the Syd threat intelligence API directly into their wallets. Developers can choose how to warn users about malicious destinations like wallet drainers, including completely blocking all interactions with their contracts.
Money Laundering and Nation State Actors
North Korean (DPRK) IT workers commonly infiltrate western IT organizations to earn a source of revenue. While inside, these teams seek to embed backdoors to steal corporate secrets and funds.
Syd's threat intelligence API is one of the broadest on the market, tracking DPRK agents across, GitHub, LinkedIn, Twitter, Telegram, Discord, and 10 major blockchains. By following their movements across the entire internet, we enable you to surface warnings to your users, protecting them from insider threats before the first paycheck is issued.
Credential Theft
The most common way wallets are hijacked in crypto is via credential theft, typically by convincing users to share their seed phrase. Once the phrase is shared with the attacker, the funds are quickly transfered out of the user's wallet.
Wallets can integrate the Syd threat intelligence feed for URL reputation to prevent users from interacting with malicious web pages. When users visit these pages, the wallet developer can display a warning to the user to prevent them from interacting with content on the page, and instruct them to think twice about sharing their wallet details with the page.
Drive-by attacks
Drive-by attacks are a form of cyberattack where a malicious web page attempts to automatically install harmful code on a user's device.
By warning users of the malicious domain in the wallet, users can navigate away from these web pages and avoid installing malicious code on their device.