News and Analytics

0

Attacker's Deceptive Tactics with Victim's Funds

May 9, 2024

An individual tricked a user into transferring a significant amount of Wrapped Bitcoin (WBTC) totaling $68 million and, later, returned $153,000 in Ethereum as a purported goodwill gesture. Within the transaction, the attacker included a message expressing willingness to discuss the situation and requested the victim's Telegram username for further communication. The amount refunded by the attacker accounts for 0.225% of the total funds reported to have been taken.

Significance of the Attacker's Actions

Further investigation into blockchain data revealed that on May 5, the victim's account, coded as ending in 8fD5, sent three messages to an account ending in dA6D. Funds were successively funneled to the latter account via various intermediary entities from the FakePhishing327990 marked attack account, indicating potential control by the attacker.

These communications hinted at the victim's willingness to compensate the malicious actor with 10% of the funds if the remaining 90% was refunded to avoid legal consequences, effectively urging the following:

“We both know there is no way to clean these funds. You will be tracked. We also understand that the phrase ‘good night’s sleep’ does not pertain to your moral and ethical qualities. Yet, we are officially managing your 10% right. Return the 90%.”

Subsequently, on May 9, an account ending in 72F1 replied by transferring 51 Ethereum to the victim. Notably, this intermediary account also received funds through similar channels from FakePhishing327990 and was likely overseen by the attacker.

Intriguing Aspects of the Attack Scheme

The attacker's manipulation tactics unfolded through a well-crafted operation where the victim inadvertently transferred 1.155 Wrapped Bitcoin (WBTC) to the perpetrator's account via an address poisoning technique. Notably, blockchain data from May 3 indicated a smart contract facilitated a 0.05 token transfer from the victim to the attacker. The token lacked specific identification on Etherscan and was classified as ERC-20.

Under usual circumstances, an attacker cannot execute a token transfer without user authorization. Nonetheless, the specific token involved in this incident possessed unique functionalities enabling unauthorized transfers between accounts.

In a pivotal misstep, the victim mistakenly sent 1.155 WBTC to the fraudulent address, likely due to its visual resemblance to a familiar deposit location. This confusion arose from a prior instance where the victim observed a 0.05 token transfer to the address, wrongly assuming its safety. However, it was determined that the 0.05 tokens were solely issued by the attacker, underscoring the malicious intent behind the cybersecurity breach.

Comments

Latest analytics

Celestia: Revolution...

Celestia: Revolution in the World of Modular Blockchains

TON Wallets: a...

TON Wallets: a complete guide to use

Show more

Latest Dapp Articles

Show more

You may also like