A fraud tool targeting TON network crypto wallets ceased operations, and hackers said that the TON community lacked "big whales"
BlockBeats reported that on October 7, a crypto wallet fraud tool targeting the TON network announced that it would stop service and guide users to another cryptocurrency fraud tool.
Web3 security agency Scam Sniffer shared a screenshot showing that a crypto wallet fraud tool based on TON issued a closure announcement. The wallet fraud tool claimed that the lack of "big households" or "whales" in the TON community was detrimental to its business. The hackers wrote: "Since TON has no whales and the community is small, we will shut down the service."
The wallet fraud tool then guided users to assets that defrauded the Bitcoin network, and said that if users like to steal on TON, they will also like to operate on the Bitcoin network.
The hacker also promoted another service and made it clear that the TON-based fraud tool would not return. Blockaid co-founder Raz Niv mentioned that more and more hackers are becoming interested in the TON ecosystem because the value of assets transferred by TON is very high. Some scams also use TON's transfer comment function to disguise the true purpose of the signature, tricking users into signing false transactions and stealing their assets.
Você também pode gostar
Ganhadores
Últimas notícias sobre cripto
Whale "pension-usdt.eth" abriu uma nova posição longa em BTC, com a posição atingindo US$91 milhões, tornando-se a maior posição longa em BTC em Hyperliquid.
A Hyperliquid lança oficialmente o Sistema de Liquidação de Auto-Delevação de Cross-Margin (ADL)
O valor nominal de 13 bilhões de dólares das Opções BTC de hoje expira, a dor máxima é de 98.000 $
Uma baleia vendeu 100 wBTC, resultando em uma perda total não realizada de US$ 30,91 milhões.
Alliance DAO Genesis: É difícil se convencer a manter o token L1 a longo prazo, pois não há "Moat".
Atendimento ao cliente:@weikecs
Parcerias comerciais:@weikecs
Quant trading e MM:[email protected]
Serviços VIP:[email protected]