Fun

Scammers use memecoin ‘trending’ list to lure victims — Researcher

News Feed - 2024-09-30 11:09:29

Christopher Roark10 hours agoScammers use memecoin ‘trending’ list to lure victims — ResearcherRoffet.eth found that some coins contained obscure, difficult-to-read code that allowed the developer to transfer user’s tokens to themselves.1410 Total views6 Total sharesListen to article 0:00AnalysisOwn this piece of crypto historyCollect this article as NFTCOINTELEGRAPH IN YOUR SOCIAL FEEDFollow ourSubscribe onScammers are using a “trending” list on memecoin analytics site GMGN to lure in unsuspecting victims and steal their crypto, according to a Sept. 25 X post from security researcher Roffett.eth.


The attackers create coins that allow the developer to transfer any user’s tokens to themselves. They then pass the token back and forth between multiple accounts, artificially inflating its volume and placing it on the GMGN “trending list.”


Once the coin makes it onto the trending list, unsuspecting users buy it up, thinking it is a popular coin. But within minutes, their coins are swiped from their wallets, never to be seen again. The developer then redeposits the coin into its liquidity pool and resells it to another victim.


Roffet listed Robotaxi, DFC, and Billy’s Dog (NICK) as three examples of malicious coins found on the list.


GMGN is an analytics web app that caters to memecoin traders on Base, Solana, Tron, Blast, and Ethereum. Its interface contains several different tabs, including “new pair,” “trending,” and “discover,” each of which lists coins based on different criteria.


Roffett claims to have discovered the scam technique when friends purchased coins on the list and found that they had mysteriously disappeared. One friend believed that his wallet had been hacked, but when he created a new wallet and purchased the coins again, they were again drained from his wallet.


Magazine: ​​Bankroll Network DeFi hacked, $50M phisher moves crypto on CoW: Crypto-Sec


Intrigued by the mystery, Roffett investigated the attacks using a block explorer and found that they appeared to be run-of-the-mill phishing attacks. The attacker called a “permit” function and appeared to have provided the user’s signature, which shouldn’t have been possible unless the user was tricked by a phishing site. However, the friend denied that he had interacted with suspicious websites before either of the two attacks.


One of the stolen coins was NICK. So Roffet investigated NICK’s contract code and found that it was “somewhat strange.” Instead of containing the usual stock code found in most token contracts, it had “some very odd and obfuscated methods.”


As evidence of these odd methods, Roffet posted an image of NICK’s “performance” and “novel” functions, which have unclear text with no obvious purpose.NICK performance and novel functions. Source: Roffett.eth


Eventually, Roffett discovered that the contract had malicious code inside of one of its libraries. This code allowed the “recoverer” (developer) to call the “permit” function without providing the tokenholder’s signature. Roffett stated:“If the caller"s address equals the recoverer, then by constructing a specific signature manually, one can obtain the permit permission of any token holder and then transfer the tokens.”


However, the recoverer’s address was also obscured. It was listed as a 256-bit, positive, non-zero number. Just below this number was a function that the contract used to derive the address from this number. Roffett used this function to determine that the malicious “recoverer” was a contract whose address ended in f261. 


Blockchain data shows that this “recoverer” contract has performed over 100 transactions transferring NICK tokens from the token’s holders to other accounts.Malicious account draining NICK from a user. Source: Basescan.


Having discovered how this scam worked, Roffett investigated the “trending” list and found at least two other tokens that contained similar code: Robotaxi and DFC.


Related:What is a honeypot crypto scam and how to spot it?


Roffett concluded that scammers have probably been using this technique for some time. He warned users to stay away from this list, as using it may result in them losing funds. He stated:“Malicious developers first use multiple addresses to simulate trading and holding, pushing the token onto the trending list. This attracts small retail investors to buy, and eventually, the ERC20 tokens are stolen, completing the scam. The existence of these trending lists is extremely harmful to novice retail investors. I hope everyone becomes aware of this and doesn"t fall for it.”


Scam tokens or “honeypots” continue to pose risks to crypto users. In April, a scam token developer drained $1.62 million from victims by selling them a BONKKILLER token that did not allow users to sell it. In 2022, blockchain risk management firm Solidus released a report warning that over 350 scam coins had been created over the course of the year.# Blockchain# Hackers# Tokens# Scams# Hacks# DeFi# MemecoinAdd reaction

News Feed

Bitcoin Volatility Expected to Rise After the US Presidential Election
Bitcoin Volatility Expected to Rise After the US Presidential Election While the United States prepares for the results of the 2020 Presidential Election, a numb
Ezra Reguerra10 hours agoCrypto developer commits $2M rug pull fraud to fuel gambling addictionA Redditor described the developer’s gambling addiction excuse as a “weird way to rug,” as projects usually just run aw
David Attlee53 minutes agoBrazil: Senate Commission will analyze the AI bill in 120 daysThe bill, aimed at regulating the artificial intelligence in the country, was introduced to the Senate in December 2022.298 Total vi
Nostra CEO steps down just days after token launch
Ana Paula Pereira7 hours agoNostra CEO steps down just days after token launchDavid Garai is stepping down as CEO of Nostra Finance two weeks after the launch of the NSTR token. Richard Thomas-Pryce will take over the co
Dencun is a big step towards mass adoption: Metis CEO
Zoltan Vardai11 hours agoDencun is a big step towards mass adoption: Metis CEOThe Dencun upgrade could be a significant step for mainstream crypto adoption, says Metis CEO Tom Ngo.1292 Total views1 Total sharesListen to
Helen Partz13 hours agoSouth Korean parliament rejects motion to expel lawmaker over crypto scandalSouth Korean lawmaker and Wemix investor Kim Nam-kuk will stay in the parliament after a 3–3 vote in the expulsion moti
NIX Bridge Token, the Gateway to Private DeFi – Presale Now Live
NIX Bridge Token, the Gateway to Private DeFi - Presale Now Live It has become impossible to imagine the cryptocurrency market without DeFi. The exponential grow
Hayden Davis Faces Interpol Alert For Role In LIBRA Memecoin
Reason to trust Strict editorial policy that focuses on accuracy, relevance, and impartiality Created by industry experts and meticulously reviewed The highest standards in reporting and pu
Technical Analysis: Gamestop Partnership Sends IMX 35% Higher
Technical Analysis: Gamestop Partnership Sends IMX 35% Higher Immutable X avoided Thursday’s red wave, and was one of this week’s biggest crypto gainers, following ne
Seasoned Trader Eyes $35 For XRP, Says It’s Not As Crazy As It Sounds
Este artículo también está disponible en español. A well-experienced trader recently got significant attention after making a bold statement that an XRP price hike could
World Record Egg’s two crypto tokens smell kind of bad
Yohan Yun11 hours agoWorld Record Egg’s two crypto tokens smell kind of badAfter reaching a $150 million market cap, the egg token’s dream has become costly for some investors.19299 Total views3 Total sharesListen to
13,000 BTC Moved in 20 Months — 2010 Mystery Miner Transfers Another String of 20 Decade-Old Block Rewards
13,000 BTC Moved in 20 Months — 2010 Mystery Miner Transfers Another String of 20 Decade-Old Block Rewards Two days ago on November 10, a mystery whale transferred 20 block rewar