A fraud tool targeting TON network crypto wallets ceased operations, and hackers said that the TON community lacked "big whales"
BlockBeats reported that on October 7, a crypto wallet fraud tool targeting the TON network announced that it would stop service and guide users to another cryptocurrency fraud tool.
Web3 security agency Scam Sniffer shared a screenshot showing that a crypto wallet fraud tool based on TON issued a closure announcement. The wallet fraud tool claimed that the lack of "big households" or "whales" in the TON community was detrimental to its business. The hackers wrote: "Since TON has no whales and the community is small, we will shut down the service."
The wallet fraud tool then guided users to assets that defrauded the Bitcoin network, and said that if users like to steal on TON, they will also like to operate on the Bitcoin network.
The hacker also promoted another service and made it clear that the TON-based fraud tool would not return. Blockaid co-founder Raz Niv mentioned that more and more hackers are becoming interested in the TON ecosystem because the value of assets transferred by TON is very high. Some scams also use TON's transfer comment function to disguise the true purpose of the signature, tricking users into signing false transactions and stealing their assets.
Te puede gustar
Ganadores
Últimas noticias cripto
Lighter: La Red de Pruebas de Trading al contado ya está en vivo. Comentarios son bienvenidos.
UBS: Retroceso en bolsa de EE.UU. terminó, se espera repunte de fin de año
「Rey de las ventas cortas con cabeza fría」 Recibe llamada de margen 31 veces consecutivas, la pérdida semanal alcanza los $15.3 millones
Marco de Inversor Principal de Financiación de la Serie B de Brachain mantiene la posición de BERA con una pérdida no realizada de más de $50.8 millones
Cierta ballena ETH ha vuelto a entrar en escena, estableciendo una posición ETH de $6 millones.
Atención al cliente:@weikecs
Cooperación empresarial:@weikecs
Trading cuantitativo y CM:[email protected]
Servicios VIP:[email protected]