
Seth DuBois
Investigator
Chainalysis
A text message from an unknown number. A move to WhatsApp. A “professional investment mentor” promising significant returns. Step-by-step instructions on how to lie to your bank. Behind every approval phishing victim is a well-rehearsed social engineering playbook, designed to build trust, strip security, and drain wallets.Investigating approval phishing one victim at a time doesn’t scale. But the on-chain patterns these schemes leave behind do.Starting with a real case, we’ll show how investigators identified the key on-chain signatures of approval phishing, then transformed them into automated, SQL-driven workflows using Chainalysis Data Solutions that scan the blockchain for illicit activity at scale.
What You’ll Learn
approve() transaction to the drain, and the investigative techniques used to identify additional victims, map associated clusters, and trace funds through consolidation wallets to exchange off-ramps.