New elaborate fraudulent campaigns, including airdropped tokens, decentralized crypto exchanges, and MetaMask wallets, have been discovered targeting naive crypto holders.
Airdropped tokens are tokens (or crypto coins) that project developers distribute to a wider community. This is a common practice in the blockchain industry as it allows participants to better understand the project, inject a certain amount into the circular supply to facilitate transactions, and raise awareness of the project. In exchange for airdropped tokens, users are often asked to provide contact information and share airdrop news with friends on Twitter and other social channels.
Decentralized Cryptocurrency Exchange, or DeX, is essentially a computer program that connects two people who are willing to exchange cryptocurrencies.Unlike the centralized one Cryptocurrency exchange (CeX) provides liquidity and requires an extensive KYC (Know Your Customer) process. DeX users are liquidity users and can be used anonymously.
The MetaMask wallet is a “hot” cryptocurrency wallet provided in the form of a browser add-on. Used to store coins built on the Ethereum blockchain (ERC-20), it is one of the most popular cryptocurrency wallets in the world.
Drop a fake token in the air
now, Deputy A malicious group creates its own coin and uses it in an unknown number MetaMask wallet.. When the victim opens his wallet, he sees a new unknown coin of about $ 30,000.
Coin itself is named after a website that claims to be a decentralized exchange, but it’s actually a phishing site. There, the victim is invited to connect a MetaMask wallet to allow the coins to be exchanged for others, making a profit in the process.
However, as soon as you connect your MetaMask wallet to your site, you are basically granted access to the attacker and can withdraw all the funds stored there.
So far, it is unknown how many people have fallen into the scam.
https://www.techradar.com/news/hackers-are-minting-their-own-crypto-to-use-in-elaborate-phishing-scams/ Hackers are creating their own ciphers for use in elaborate phishing scams