
BITWU.ETH|Apr 22, 2025 09:38
⚠️ Beware of the latest scams: How hackers can use "pig killing disk+snatch" to accurately empty your encrypted wallet——
Authorization, asset zeroing: Are you still clicking 'Approve'?
The following tweet reveals a complex cryptocurrency fraud technique:
Combining "pig killing disk", token authorization abuse, and rush to run technology.
Fraudsters carry out long-term and efficient fraud by establishing trust, inducing authorization, monitoring accounts, and quickly stealing funds.
From @GoPlusSecurity @GoPlusZH
one ️⃣ Fraudulent steps:
1) Create fake projects to attract users:
Scam gangs first create a seemingly "perfect" project, promoting "zero cost, low risk" and promising users to continuously receive USDT rewards by completing simple tasks. This high return, low-risk promise is a typical scam bait aimed at attracting users who are greedy for small profits.
2) Widely spread and expand user base:
They widely promote this project through various channels (such as social media, group chats, etc.) to ensure access to more potential victims.
The second reply to the tweet was accompanied by a picture indicating that the fraudster had made small transfers through a large number of addresses, attracting users to participate.
3) Small rewards build trust:
In the next few days or weeks, scammers will send users a small amount of main tokens (here POL) and USDT rewards.
The cost of these small rewards is low, but enough to make users believe that the project is "real and reliable". This technique is consistent with the "pig raising" stage in the "pig killing dish", which gradually lowers the victim's guard through small rewards.
4) Inducing users to authorize large USDT transfers:
Scammers will use "future bigger rewards" as bait to induce users to approve large USDT transfer permissions for smart contracts.
Authorization is a mechanism on the blockchain that allows an address to transfer a specified amount of tokens on behalf of a user.
Once authorized by the user, the fraudster can transfer the user's USDT at any time in the future without the need for further confirmation.
5) Long term trust accumulation, waiting for the opportunity:
After authorization, scammers will continue to send USDT rewards, sometimes lasting for several months. This' long-term fishing for big fish 'strategy is aimed at gaining users' complete trust in the project, while also encouraging them to invest more funds or maintain high balances, in preparation for future fund plundering.
6) Monitor user accounts and take action when the opportunity arises:
Fraudsters will continue to monitor the balance and behavior of user accounts.
If a user's account balance reaches a certain amount, or if the user attempts to revoke authorization or make a large transfer, the fraudster will take immediate action and quickly transfer the user's funds.
7) Quickly steal funds using the Frontrunning tool:
Scammers use "race and run" technology to ensure that their transactions are confirmed by the blockchain before those of users by paying high gas fees. For example, when a user attempts to revoke authorization, the fraudster's transaction will be executed first, directly transferring the user's funds.
@GoPlusSecurity has marked three malicious addresses:
0xaf70114597d8E2327663497d58a9989E9bd24aaa
0x985b2F2B4ec4375Df8Dd9a91143Dd98d6D53F6F4
0xB9E24f79Ed5a535C1Bf5CDB2E1D38B1Cb2a6F4Bd
two ️⃣ Safety advice——
1) Don't believe in 'free money';
There is no free lunch in the world. Any project claiming to make "easy money" should be considered high-risk, especially those involving cryptocurrency.
2) Prudent management of token authorization;
Avoid easy authorization, especially for EOA (externally owned accounts, i.e. regular wallet addresses) authorization.
If authorization is necessary, try to limit the authorized amount to the minimum necessary quantity.
In addition, regularly check and revoke unnecessary authorizations (using tools such as Etherscan's Token Approval Checker).
Wallet authorization cancellation tool:
https://revoke.cash (Supports multiple links) https:// (etherscan.io)/tokenapprovalchecker
https://(bscscan.com)/tokenapprovalchecker
https://(polygonscan.com)/tokenapprovalchecker
https://(snowtrace.io)/tokenapprovalchecker
https://(cronoscan.com)/tokenapprovalchecke
3) Use professional security tools:
Use professional security tools like GoPlus to protect assets, detect malicious addresses, and smart contracts.
Lastly, apart from these methods;
We also need to be vigilant ourselves, constantly learn and understand the basic mechanisms of blockchain (such as token authorization, running, etc.), operate cautiously, and avoid becoming victims of such scams.
Share To
Timeline
HotFlash
APP
X
Telegram
CopyLink