Anti-fraud action (5): A sample model of blockchain dust attack and other common fraud methods

After analysis based on blockchain data, a new blockchain fraud or attack method was confirmed today.

The attack method is: it is known that address A often transfers large amounts of money to address B, and the fraudulent address C is swiped through a script to make the end address characteristics consistent with address B, and then every time A transfers money to B, C transfers a small amount to A. Some idiots may directly copy the C address next time, resulting in asset loss.

But unfortunately, the fraudsters detected this time are not very smart, and did not recognize that address A is the user address of the exchange, address B is the address of the exchange’s large pool, A to B is an automatic collection operation, and manual irrelevant

Sample C address https://tronscan.org/#/address/TYteWcuJnQBwRpGt8cABwodzdqg9dbfBbF

Sample B address https://tronscan.org/#/address/TQ7wK19fhZZqLdj2Xcw2e6Ejs3cTZbfBbF

Remind cryptocurrency transactions again, even transfers may lead to asset loss due to wrong addresses and chains.

Once a cryptocurrency asset is lost, it is difficult to recover.

For example, Erc, bsc, matic whose addresses often look the same

There are also many unstable Argos, etc. (may be unavailable due to delisting and maintenance)

In addition to this kind of use of quantity to affect your copying, common scams are

1. Use of non-genuine programs and third-party plug-ins, including but not limited to, cryptocurrency wallets, proxy tools and virtual private networks, SSL certificates and man-in-the-middle attacks, social media and chat software.

Some will replace cryptocurrency addresses resulting in loss of funds. (General auxiliary pictures can be solved)

Some will steal keys and mnemonics.

2. Give you the key or even the mnemonic, but the address may have been authorized, and finally deceive you that there is a U in it and then you turn trx in.

3. Let you scan the code, it may be a third-party dapp, stealing U program, directly robbing money

4. Any swap or authorized address cannot directly use the deposit address

This article is reprinted from https://www.blueskyxn.com/202210/6687.html
This site is for inclusion only, and the copyright belongs to the original author.