We reveal six zero-day social engineering attacks in Ethereum, and subdivide
them into two classes: Address Manipulation and Homograph. We demonstrate the
attacks by embedding them in source codes of five popular smart contracts with
combined market capitalization of over \29billion,andshowthattheattackshavetheabilitytoremaindormantduringthetestingphaseandactivateonlyafterproductiondeployment.Weanalyze85,656opensourcesmartcontractsandfind1,027contractsthatcanbedirectlyusedforperformingsocialengineeringattacks.Forresponsibledisclosure,wecontactsevensmartcontractsecurityfirms.Inthespiritofopenresearch,wemakethesourcecodesoftheattackbenchmark,tools,anddatasetsavailabletothepublic.