CryptoCurrency – Gridinsoft Blog https://gridinsoft.com/blogs Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Mon, 01 Dec 2025 18:11:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 Cryptomixer’s €1.3 Billion Laundromat Just Got Washed Out (With Cinematic Flair) https://gridinsoft.com/blogs/cryptomixer-takedown-operation-olympia/ https://gridinsoft.com/blogs/cryptomixer-takedown-operation-olympia/#respond Mon, 01 Dec 2025 18:10:05 +0000 https://gridinsoft.com/blogs/?p=31365 Somewhere in Zurich last week, law enforcement seized Cryptomixer, a cryptocurrency mixing service that spent nine years helping criminals turn dirty Bitcoin into clean Bitcoin. The haul: 3 servers, 12 terabytes of data, €25 million in crypto, and—here’s where it gets fun—the slickest takedown video since Operation Endgame. Europol clearly hired someone who knows Adobe […]

The post Cryptomixer’s €1.3 Billion Laundromat Just Got Washed Out (With Cinematic Flair) appeared first on Gridinsoft Blog.

]]>
Somewhere in Zurich last week, law enforcement seized Cryptomixer, a cryptocurrency mixing service that spent nine years helping criminals turn dirty Bitcoin into clean Bitcoin. The haul: 3 servers, 12 terabytes of data, €25 million in crypto, and—here’s where it gets fun—the slickest takedown video since Operation Endgame.

Europol clearly hired someone who knows Adobe After Effects, and they’re not afraid to use it.

Cryptomixer wasn’t subtle. Since 2016, the service processed €1.3 billion in Bitcoin for anyone who needed to obscure where their money came from. Ransomware crews? Welcome. Dark web dealers? Come right in. Underground forums full of scammers? The door’s always open.

The business model was beautifully simple: take dirty crypto, mix it with other people’s dirty crypto, wait a random amount of time, and send back clean crypto. Blockchain analysis goes from “we know exactly where this came from” to “good luck proving anything.”

Except now those 12 terabytes of transaction data are sitting in an evidence room somewhere, and every criminal who ever used the service is probably having an unpleasant day.

Can we talk about the Operation Olympia presentation? Tech noir aesthetics, moody lighting, slick animations, and—this is genuinely delightful—Cyrillic Easter eggs scattered throughout for flavor.

Operation Olympia received a stylish technoir-style video accompaniment.
Following Endgame, Operation Olympia received a stylish technoir-style video accompaniment.

Law enforcement has discovered that psychological warfare works better when it looks good. A dry press release gets ignored. A cinematic takedown video with dramatic music gets shared, discussed, and remembered. It’s less “we stopped some criminals” and more “we’re coming for you, and we’ve got a marketing budget.”

Respect to whoever convinced Europol that cybercrime needs a proper villain origin story in reverse.

How to Launder Cryptocurrency (Before You Get Caught)

Cryptocurrency mixers exist because blockchain is paradoxically both anonymous and completely transparent. Every Bitcoin transaction is public, traceable, and permanent. Great for accountability, terrible if you’re a ransomware operator trying to spend your ill-gotten gains.

Enter the mixer:

Your dirty BitcoinGiant pool with everyone else’s dirtRandom wait timeClean Bitcoin to new addressBlockchain trail goes cold

It’s digital money laundering compressed into an automated service. Submit coins connected to crime, receive coins with no obvious connection to anything, pay a service fee. Cryptomixer operated on both the clear web and dark web, servicing criminals of all technical skill levels.

The fee structure probably looked like any other SaaS business, except instead of “Enterprise Plan” it was more like “Ransomware Platinum.”

According to Europol, Cryptomixer’s customers included:

  • Ransomware gangs needing to clean extortion payments
  • Dark web marketplace vendors selling everything illegal
  • Weapon traffickers with a cryptocurrency problem
  • Payment card fraudsters cashing out stolen data
  • Basically anyone with Bitcoin they couldn’t explain to authorities

That’s nine years of transaction records now available to investigators. Somewhere, a forensic analyst just got assigned the world’s most depressing dataset to comb through.

Switzerland, Germany, and the Joy of International Cooperation

Operation Olympia ran November 24-28 with players from:

  • Switzerland: Zurich police (city and canton) plus prosecutors
  • Germany: Federal Criminal Police and Frankfurt prosecutors
  • Europol: Coordination via J-CAT (Joint Cybercrime Action Taskforce)
  • Eurojust: Because international law is complicated

The fact that multi-jurisdiction cryptocurrency crime operations now run smoothly is remarkable. Five years ago, this would have been a bureaucratic nightmare. Now it’s a routine action week with promotional materials.

Progress looks like Swiss and German police coordinating server seizures while someone edits the takedown video.

This isn’t Europol’s first crypto mixer rodeo. In March 2023, they took down ChipMixer, which was even larger than Cryptomixer at the time.

The pattern emerging: law enforcement has figured out that dismantling criminal infrastructure matters more than catching individual operators. You can arrest one hacker, but if the laundering services remain intact, someone else just takes their place. Remove the laundering infrastructure, and everyone’s business model breaks.

It’s strategic thinking applied to cybercrime. Attack the supply chain, not just the end users.

That seized data represents something more valuable than the €25 million in Bitcoin: evidence connecting thousands of criminal operations to their money laundering activities.

Every ransomware payment that went through Cryptomixer? Recorded. Every dark web purchase laundered through the service? Logged. Every scammer who thought they were safely anonymous? Their transaction patterns are now evidence.

This is the gift that keeps giving. One takedown spawning hundreds of investigations, each following the money trail preserved in those supposedly anonymous transactions.

The blockchain never forgets. It just needed law enforcement to seize the mixer that connected the dots.

The Whac-A-Mole Reality

Here’s the uncomfortable truth: another mixer will emerge to replace Cryptomixer. The economics are too compelling, and the technical barrier isn’t that high. Within months, new services will advertise better security, stronger anonymity, and lessons learned from Cryptomixer’s mistakes.

But that’s actually the point. Each takedown:

  • Seizes funds criminals can’t recover
  • Creates paranoia about which services are safe
  • Generates intelligence for future operations
  • Forces criminals to rebuild trust networks and infrastructure
  • Makes crime more expensive and risky

It’s not about winning decisively. It’s about making cybercrime progressively more difficult, costly, and paranoia-inducing. Death by a thousand cuts, with excellent production values.

Cryptocurrency crime contains a fundamental irony: criminals use Bitcoin for anonymity, but blockchain creates a permanent, public record of every transaction forever.

Traditional money laundering leaves scattered, incomplete records across multiple jurisdictions with varying cooperation levels. Cryptocurrency leaves perfect evidence, immutably stored, publicly accessible, forever.

Mixers exist specifically because crypto is too transparent. But when the mixer gets seized, all that mixing activity becomes evidence. The anonymous trails lead straight to the service, and suddenly every transaction pattern is visible to investigators.

It’s like committing crimes while wearing an ankle monitor that publishes your location data publicly, then being surprised when police use that data against you.

What Happens to €25 Million in Seized Bitcoin?

Short answer: it sits as evidence, then gets auctioned by government agencies, then funds law enforcement budgets or victim compensation programs.

Long answer: someone at the Swiss or German treasury department is calculating how to value cryptocurrency assets on official balance sheets while Bitcoin’s price does whatever Bitcoin’s price does. That €25 million could be €30 million or €20 million by the time it’s actually sold.

Somewhere, a government accountant is having a very weird day.

The Week That Started With a Bang

As the original commentary noted: “We need more psyops against the cybercrime ecosystem, good and varied ones. At least the week starts with a spark.”

And they’re absolutely right. These coordinated takedowns with cinematic presentations serve multiple functions beyond just shutting down one service:

  • Demonstrate law enforcement capability (and production budgets)
  • Create fear, uncertainty, and doubt among criminals
  • Generate media coverage that deters future criminals
  • Reassure the public that authorities aren’t helpless
  • Look really, really cool doing it

The tech noir aesthetic isn’t just style—it’s strategic communication. It says “we’re sophisticated, coordinated, and we’re coming for you” more effectively than any press release ever could.

Cryptomixer: nine years of operation, €1.3 billion laundered, now offline with operators potentially identifiable from 12 terabytes of data.

Will another mixer replace it? Yes. Will criminals find new ways to launder crypto? Obviously. Does this operation still matter? Absolutely.

Every takedown makes the game harder, more expensive, and riskier. The infrastructure gets disrupted. The trust networks get shattered. The paranoia increases. And somewhere, a video editor at Europol is already working on the next operation’s promotional materials.

Bottom line: In the eternal battle between cybercriminals and law enforcement, the cats just scored another point while looking stylish doing it. The mice will adapt, but they’ll do it wondering which service is next to get the cinematic takedown treatment.

And honestly? That’s progress with production values.


Two major mixer takedowns in three years. If you’re running a cryptocurrency mixing service, maybe update your contingency plans. Or invest in better lawyers. Or—radical thought—consider legitimate employment. The weekly salary is less exciting, but the seizure risk drops to zero.

The post Cryptomixer’s €1.3 Billion Laundromat Just Got Washed Out (With Cinematic Flair) appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/cryptomixer-takedown-operation-olympia/feed/ 0
0.31 BTC XLord Promo Code https://gridinsoft.com/blogs/0-31-btc-xlord-promo-code-scam/ https://gridinsoft.com/blogs/0-31-btc-xlord-promo-code-scam/#respond Tue, 01 Apr 2025 09:11:27 +0000 https://gridinsoft.com/blogs/?p=30309 Gotexcoin appears to be a fraudulent cryptocurrency platform that lures users with promises of free Bitcoin, specifically 0.31 BTC XLord promo code, often linked to fake endorsements from Elon Musk. This scam is promoted through deceptive methods, such as deepfake videos on social media, aiming to trick users into depositing their own Bitcoin, which is […]

The post 0.31 BTC XLord Promo Code appeared first on Gridinsoft Blog.

]]>
Gotexcoin appears to be a fraudulent cryptocurrency platform that lures users with promises of free Bitcoin, specifically 0.31 BTC XLord promo code, often linked to fake endorsements from Elon Musk. This scam is promoted through deceptive methods, such as deepfake videos on social media, aiming to trick users into depositing their own Bitcoin, which is then stolen by scammers. In this post, I’ll go into more detail about how this scam works and how not to fall victim to it.

What is 0.31 BTC XLord promo code Scam?

0.31 BTC XLord promo code eventually boils down to a scam campaign, with a Gotexcoin[.]com website as a centerpiece. This website claims to offer buying, exchanging, and trading services for various cryptocurrencies. Users are offered to use 0.31 BTC XLord promo code on this site. However, multiple sources identify it as a scam. The platform is promoted through deceptive tactics, particularly using fake celebrity endorsements, with a focus on Elon Musk, to attract users with promises of free Bitcoin.

Website for using 0.31 BTC XLord promo code screenshot
Website for using 0.31 BTC XLord promo code

Research indicates that Gotexcoin was created recently, with some reports suggesting less than a week old at the time of this writing, aligning with common tactics of new scam sites. This is not the first such scam, we have reviews on similar scams, such as 0.31 BTC STICKS scam.

Scam Mechanism Explained

The scam operates through a series of steps designed to exploit users’ trust and desire for quick gains. Scammers use deepfake videos and social media posts to impersonate celebrities like Elon Musk, Cristiano Ronaldo, Bill Gates, Mark Zuckerberg, and Drake, promising free cryptocurrency giveaways. For Gotexcoin, the focus is on Elon Musk (which is more than obvious) offering 0.31 BTC, activated by the XLord promo code.

Gotexcoin 0,31 BTC XLord scam in social media
How Gotexcoin 0,31 BTC XLord scam works

Users are directed to Gotexcoin.com, where they sign up and enter the 0.31 BTC XLord promo code. Some reports suggest that entering the code may show a message indicating it’s invalid or already used, potentially a tactic to frustrate users into depositing more to “activate” it. However, the primary goal is to get users engaged with the platform.

Scam Signs

To claim the free Bitcoin or engage in trading, users are required to deposit their own Bitcoin. The platform may display fake dashboards showing increased balances or bonuses to encourage larger deposits, a common tactic in crypto scams.

Once the deposit is made, users find they cannot withdraw their funds or the promised free Bitcoin. The platform may impose additional requirements, such as further deposits or fees, to unlock withdrawals, creating a cycle of financial entrapment. The scammers may also steal personal data and account credentials, exacerbating the damage.

Ultimately, the scammers, who control the platform, steal the deposited Bitcoin, leaving users with no recourse for recovery. The anonymity of cryptocurrency transactions makes it nearly impossible to trace and recover funds.

Our URL checker gives Gotexcoin.com label Danger Zone, that mean untrustworthy, risky, and dangerous, based on technical analysis and user reports.

How To Stay Safe?

Modern-day web security is hard to wrap up in a single advice, especially when it comes to crypto themed activities like 0.31 BTC XLord promo code. Always verify promotional material through official channels, such as Elon Musk’s verified X account, rather than relying on unsolicited ads or videos. However, that’s no guarantee that Musk’s words are true either, especially given his penchant for promoting all sorts of questionable things.

Be wary of offers promising free money or high returns with no risk, as these are classic scam indicators. Never deposit without verifying the platform’s legitimacy, such as testing customer support responsiveness and reviewing terms. Before depositing, check for reviews on sites like Trustpilot, ensure regulatory registration (e.g., with SEC or CFTC), and look for a legitimate online presence. How about Gotexcoin, it lacks such credentials.

One of the best options will be resorting to use established exchanges, which have proven security and transparency, rather than new, unverified platforms. Although they may be reliable and trustworthy, it may be hard to say at the first glance. On top of that, reliable services will never promote themselves with “giveaways” like what you see now.

Last but not least is the recommendation to stick to basic cyber hygiene. This includes avoiding clicking on questionable links and using security software. I recommend starting with our free Website Reputation Checker to quickly verify links. This is the easiest way to make sure a link is legitimate.

If you want real-time protection that blocks malicious websites automatically, consider using GridinSoft Anti-Malware. Its Internet Security module checks the pages you open not only by a static database, but through a selection of signatures, so even the most recent threats won’t slip away. Click the banner below to download it, and don’t miss out on 6-day free trial, which offers the complete functionality of a paid version for one to evaluate.

The post 0.31 BTC XLord Promo Code appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/0-31-btc-xlord-promo-code-scam/feed/ 0
New Ledger Phishing Campaign Targets Recovery Phrases https://gridinsoft.com/blogs/ledger-phishing-campaign-recovery-phrases/ https://gridinsoft.com/blogs/ledger-phishing-campaign-recovery-phrases/#comments Thu, 19 Dec 2024 11:47:44 +0000 https://gridinsoft.com/blogs/?p=28791 Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to lure recovery phrases from users and gain access to crypto assets. This is yet another scam campaign that targets Ledger wallet holders. Ledger wallet owners have been targeted by attackers A new phishing campaign is […]

The post New Ledger Phishing Campaign Targets Recovery Phrases appeared first on Gridinsoft Blog.

]]>
Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to lure recovery phrases from users and gain access to crypto assets. This is yet another scam campaign that targets Ledger wallet holders.

Ledger wallet owners have been targeted by attackers

A new phishing campaign is targeting Ledger cryptocurrency wallet users by masquerading as a data breach notification. The attack scheme is built on using a multi-stage redirect system through Amazon AWS servers, which eventually leads users to a fake website. Their aim is to steal recovery phrases, enabling them to access and empty victims’ cryptocurrency wallets.

Ledger is a hardware wallet designed to securely store, manage, and sell cryptocurrency. These wallets use recovery phrases – 12, 18, or 24 words generated during setup – as a critical security measure. These phrases act as a master key, granting full access to the wallet and its funds. If someone obtains this recovery phrase, they can control the wallet entirely.

How Does the Scam Work?

The phishing attack begins with an email sent via SendGrid, that claims users’ wallets are secure but warns that their recovery phrases might have been exposed. To address this, the email urges recipients to verify their recovery phrase using a “secure verification tool”.

Ledger phishing email screenshot
Ledger phishing email

Clicking the “Verify My Recovery Phrase” button redirects victims to what appears to be a Ledger verification site. Initially hosted on an Amazon AWS domain, the link ultimately leads to a phishing site with the domain “ledger-recovery[.]info”. The phishing site is designed to mimic the official interface, asking users to enter their recovery phrases.

Fake Ledger website screenshot
Fake Ledger website

As users type in each word, the site verifies it against a list of 2,048 valid recovery phrase words, crossing out any invalid entries. Yes, these words are in fact known to everyone, but their selection for each user and their order is the key. Each word entered is immediately sent to the phishing site’s backend and stored. Regardless of what recovery phrase is entered, the site always claims it is invalid, prompting users to re-enter it multiple times. This tactic ensures that attackers capture accurate data.

Although the domain “ledger-recovery[.]info” was registered on December 15, 2024, this is not the first attack of its kind. Security analysts report about detecting similar scam sites before, but they were separated from the email spam campaign and thus not attributed to any serial action.

Why is Ledger a Target?

Ledger has become an increasingly popular target for scam actors. We have a news article about another phishing campaign that impersonates the company to promote fake firmware updates. These emails similarly attempt to trick users into sharing their recovery phrases. With these phrases, attackers can gain full access to victims’ cryptocurrency wallets and steal their funds.

Ledger has been a persistent target of phishing campaigns, especially after a 2020 data breach that exposed customers’ personal information, including names, addresses, phone numbers, and email addresses. This breach provided attackers with a rich dataset for crafting convincing phishing campaigns.

If you receive an email like this, never follow the steps in the email. Instead, mark it as spam and delete it. Remember: one should never, under any circumstances, disclose a recovery phrase to anyone. It is not needed for sending cryptocurrency to you, and no tech support agent will ever request it.

To be sure about the websites you are opening, consider using a reliable anti-malware software with a built-in network protection feature. GridinSoft Anti-Malware will provide you with excellent real-time scanning of websites that you visit, protecting even against the most recent online threats. Give it a shot by clicking the banner below.

New Ledger Phishing Campaign Targets Recovery Phrases

The post New Ledger Phishing Campaign Targets Recovery Phrases appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/ledger-phishing-campaign-recovery-phrases/feed/ 1
Brad Garlinghouse Crypto Giveaway Scam Explained https://gridinsoft.com/blogs/brad-garlinghouse-crypto-giveaway-scam/ https://gridinsoft.com/blogs/brad-garlinghouse-crypto-giveaway-scam/#respond Mon, 16 Dec 2024 21:11:16 +0000 https://gridinsoft.com/blogs/?p=28716 Brad Garlinghouse Crypto Giveaway is a scam campaign that masquerades as a cryptocurrency giveaway. It falsely claimed to be organized by Ripple Foundation with Brad Garlinghouse, Ripple’s CEO, as the face of the event. It uses a sense of urgency and the allure of receiving free XRP tokens to deceive victims into clicking on fraudulent […]

The post Brad Garlinghouse Crypto Giveaway Scam Explained appeared first on Gridinsoft Blog.

]]>
Brad Garlinghouse Crypto Giveaway is a scam campaign that masquerades as a cryptocurrency giveaway. It falsely claimed to be organized by Ripple Foundation with Brad Garlinghouse, Ripple’s CEO, as the face of the event. It uses a sense of urgency and the allure of receiving free XRP tokens to deceive victims into clicking on fraudulent links and divulging sensitive information.

How the Scam Works

The Brad Garlinghouse Crypto Giveaway scam operates by luring participants with a promise of sharing 100,000,000 XRP through an official-looking link. Once users click on the link, they are redirected to a fraudulent website. There, they may be prompted to provide personal information, wallet credentials, or payment details.

Scam screenshot
Brad Garlinghouse Crypto Giveaway scam

The scheme essentially puts the users at risk of identity theft, as their stolen personal data can be misused. Victims may also face financial fraud, with cybercriminals gaining access to their wallets and conducting unauthorized transactions. In some cases, these fraudulent sites may also infect users’ devices with malware, leading to further security and privacy issues.

The scam is built around false claims of a massive XRP giveaway, supposedly organized to celebrate and thank the cryptocurrency community for its support. While this looks feasible – the value of Ripple cryptocurrency grew 500% over the last several weeks. Nonetheless, neither official website nor social media belonging to Ripple Labs, the company behind XRP, contain any info about any giveaways.

XRP scam twitter
Typical example of a post that promotes the scam

In a typical manner for crypto scam schemes, this one relies heavily on creating a sense of urgency, urging participants to act quickly to avoid missing out on the opportunity. Such social engineering tactics are designed to pressure victims into making hasty decisions without verifying the legitimacy of the offer.

The fraudulent scheme uses links that look genuine to the users, but they are in fact masked through a redirect. Clicking the link actually sends the user to malicious domains – ripplex2[.]net and xrpfunds-promo[.]net. These sites, once again, have a convincing appearance, with Ripple logotypes, Mr. Garlinghouse photos and corresponding text.

As the key element of the scam, the frauds provide cryptocurrency wallet addresses (rJ1ZcMbvEatx82j2d3vcvR7HcfLoWAjnu3), and ask the victims to create accounts to be eligible for the reward. Thing is – all the information left on the website will be accessible to cybercriminals. And they will use it against the user, this or another way, that is out of doubt.

Scams that pretend being endorsed by celebrities are far from being new. Go check out our articles about Elon Musk Cryptocurrency Giveaway scams from several years ago – they follow the exact same pattern!

Spreading Methods

Victims often end up on scam websites like the “Brad Garlinghouse Crypto Giveaway” through a variety of deceptive methods. One of the most common ways is through misleading advertisements, which frequently promise free rewards or quick and easy money. These ads are designed to catch users’ attention and redirect them to fraudulent pages.

Endorsement cryptoscam
Example of a cryptocurrency scam website endorsed through a hacked Twitter account of Apple

Another common route is through malicious links embedded in phishing emails, social media messages, or ones found on compromised websites. Typically, the links are provided along with the text that encourages people to participate in “100% legitimate reward program”. This, combined with the legitimate look of the message, makes people believe that the thing is real.

Scammers also exploit search engine algorithms by using trending keywords to manipulate search results, ensuring their fraudulent pages appear prominently when users search for related topics. In certain cases they can embed malicious links into documents uploaded to legit websites, which are then crawled by search engines and result in so-called SEO poisoning.

How to Avoid Falling for Such Scams

To avoid falling for scams like the Brad Garlinghouse Crypto Giveaway, it’s essential to approach enticing offers with skepticism. Always verify such claims through official channels or trusted sources before taking any action. Pay close attention to website URLs, as scammers often use addresses that are misspelled or look suspiciously similar to legitimate ones.

Next, avoid clicking on links that come from unsolicited emails or messages, as these are common entry points for phishing scams. When searching online, don’t click on results labeled “Sponsored” (usually the first ones in the search results).

Lastly, using reliable security software can add an extra layer of protection. For instance, GridinSoft Anti-Malware is effective at detecting and removing potentially unwanted applications, helping to safeguard your device against threats.

Brad Garlinghouse Crypto Giveaway Scam Explained

The post Brad Garlinghouse Crypto Giveaway Scam Explained appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/brad-garlinghouse-crypto-giveaway-scam/feed/ 0
Aiocpa PyPI Package Targets Crypto Wallets https://gridinsoft.com/blogs/aiocpa-pypi-package-crypto-wallets/ https://gridinsoft.com/blogs/aiocpa-pypi-package-crypto-wallets/#respond Mon, 16 Dec 2024 13:33:34 +0000 https://gridinsoft.com/blogs/?p=28708 A malicious package named aiocpa was identified on the Python Package Index (PyPI), engineered to steal sensitive cryptocurrency wallet information. Unlike the previous attacks that leveraged PyPI, that generally relied on typosquatting or impersonation, the attackers developed a seemingly legitimate crypto client tool and later inserted malicious code through updates. Aiocpa PyPI Package Targets Crypto […]

The post Aiocpa PyPI Package Targets Crypto Wallets appeared first on Gridinsoft Blog.

]]>
A malicious package named aiocpa was identified on the Python Package Index (PyPI), engineered to steal sensitive cryptocurrency wallet information. Unlike the previous attacks that leveraged PyPI, that generally relied on typosquatting or impersonation, the attackers developed a seemingly legitimate crypto client tool and later inserted malicious code through updates.

Aiocpa PyPI Package Targets Crypto Wallets

ReversingLabs (RL) detected the aiocpa package on November 21 using their machine-learning-powered Spectra Assure platform. The malicious payload was embedded in the “utils/sync.py” file. This file contained obfuscated code, a common characteristic of malware frequently observed in open-source repositories such as PyPI and npm.

Upon deobfuscation, researchers found that the code exfiltrated sensitive arguments, such as cryptocurrency trading tokens, to a remote Telegram bot. These tokens could be exploited to steal crypto assets.

A wrapper function screenshot
A wrapper function which exfiltrates function arguments to a telegram chat. (source: ReversingLabs)

The obfuscation techniques used involved recursive layers of Base64 encoding combined with zlib compression. This approach made the malicious intent difficult to detect without employing advanced analysis tools. Such methods are what makes this attack different from other malware spreading attempts that leveraged PyPI repository.

Attack Strategy

The attackers employed a novel tactic by creating and maintaining their own package rather than impersonating existing ones. Initially, aiocpa appeared to be a legitimate cryptopay API client with regular updates, proper documentation, and a GitHub repository. The account behind the package also seemed credible, with a history of contributions dating back to January 2024.

However, malicious code was introduced in versions 0.1.13 and 0.1.14, released on November 20. These versions were capable of decoding base64-encoded commands and executing them. As you may have guessed, these commands had purely malicious intent.

Such actions are typical of malware but were notably absent in earlier versions and the original GitHub repository. Additionally, the attacker attempted to hijack an existing PyPI project named pay, possibly to exploit its user base or visibility.

Challenges in Detection

According to the researchers’ reports, traditional application security tools were insufficient to detect this threat. At first glance, the package’s project page appeared legitimate. It featured a well-maintained cryptocurrency payment API client with several versions released since September 2024 and organized documentation.

The maintainer’s profile seemed credible, with another package actively maintained since March 2024. Additionally, the linked GitHub page displayed numerous contributions dating back to January 2024. So, a developer assessing security would find no reason for suspicion, especially with over 10k downloads suggesting it was trustworthy.

However, the malicious code was covertly embedded in the package published to PyPI. It went unnoticed in the GitHub repository. Nevertheless, some advanced tools were able to uncover the malicious activity through behavioral differential analysis. By comparing different package versions, the tool pinpointed unexpected behaviors at the file level, enabling RL researchers to identify the threat.

Aiocpa PyPI Package Targets Crypto Wallets

The post Aiocpa PyPI Package Targets Crypto Wallets appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/aiocpa-pypi-package-crypto-wallets/feed/ 0
Crypto Recovery Scams: How to Protect Yourself from Secondary Fraud https://gridinsoft.com/blogs/cryptocurrency-recovery-scams/ https://gridinsoft.com/blogs/cryptocurrency-recovery-scams/#comments Wed, 11 Sep 2024 12:28:05 +0000 https://gridinsoft.com/blogs/?p=16561 Crypto recovery scams are a specific type of fraud targeting individuals who have already lost money in cryptocurrency scams. In these schemes, fraudsters pose as professional recovery agents, promising to help victims reclaim their funds. Instead, they charge fees comparable to the victim’s initial loss, effectively scamming them a second time. Understanding Crypto Recovery Scams […]

The post Crypto Recovery Scams: How to Protect Yourself from Secondary Fraud appeared first on Gridinsoft Blog.

]]>
Crypto recovery scams are a specific type of fraud targeting individuals who have already lost money in cryptocurrency scams. In these schemes, fraudsters pose as professional recovery agents, promising to help victims reclaim their funds. Instead, they charge fees comparable to the victim’s initial loss, effectively scamming them a second time.

Understanding Crypto Recovery Scams

While cryptocurrency hype may have cooled, related scams remain prevalent. Crypto recovery scams specifically target people already victimized by crypto fraud, exploiting their desperation to recover lost assets.

Statistics on Cryptocurrency Fraud Losses

Cryptocurrency Fraud Losses by Year (million $) Cryptocurrency Fraud Losses (2020-2023) 2020 2021 2022 2023 0 1,000 2,000 3,000 4,000 1,200 2,800 3,800 3,000

Source: Federal Trade Commission (FTC), data for 2020-2023

Cryptocurrency can be lost due to various reasons, from technical issues like hardware wallet malfunctions to human error. However, scammers primarily target victims of fraudulent investment schemes rather than technical mishaps. We’ve previously covered various types of cryptocurrency fraud.

This article focuses specifically on “cryptocurrency recovery agencies” — fraudulent services that prey on people who have already been scammed, luring them into yet another deceptive trap. The rise of cryptocurrency scams on social media has made these secondary scams increasingly common in recent years.

Examples of Fraudulent Recovery Services

Domain Description Registration Date Status
Againstcon.com Site masquerading as a crypto recovery service, likely fraudulent 2023-02-09 Active
Refund-it.info Suspicious site offering services to recover lost funds from unregulated companies 2025-02-26 Active
Walletblockchain.net Deceptive site offering fake solutions for recovering cryptocurrencies 2024-07-17 Active
Leeultimatehacker.com Scam site promising to hack accounts to recover lost funds 2024-04-05 Active
Fiordintel.net Phishing site pretending to be a service for tracking and recovering cryptocurrencies 2025-02-21 Active

You can conduct your own investigation using our Inspector API by performing a search with the tag “Recovery Servicehere.

How Crypto Recovery Scams Work

Victim Targeting Methods

  • Social Media: Scammers search for victims in cryptocurrency investment groups and trading forums
  • Fake Reviews: Posting comments from people who allegedly recovered their money through a “specialist”
  • Direct Contact: Directly approaching victims in crypto communities offering help
  • Dark Web: Selling lists of victims they’ve deceived or hacked to other scammers

After establishing contact with the victim, scammers immediately request extensive information. While this might seem logical since such an operation requires comprehensive victim data, scammers typically request information that would rarely be necessary — Social Security numbers, detailed personal information, and more.

Fake review about crypto recovery agent screenshot
Example of a fake review claiming successful fund recovery

Typical Scam Sequence

  1. Scammers demand an upfront payment for their services
  2. After receiving the initial payment, they often cut all communication
  3. In some cases, they simulate progress and request additional funds, claiming “extra resources are needed to solve the problem”
  4. Scammers employ various social engineering tactics, potentially resulting in multiple payment requests before they eventually stop responding to the victim

Warning Signs and Potential Risks

10 Red Flags of Crypto Recovery Scams

  1. Upfront Fee Requests. If someone asks for money before providing help, it’s likely a scam. They may initially request a small amount, then continuously demand more.
  2. Claims of “Special Access” to Crypto Exchanges. Scammers will claim to have special methods to recover your cryptocurrency. This is always false.
  3. Requests for Passphrase or Sensitive Information. If they want this information, they’re attempting to steal from you.
  4. Requests for Bank or Crypto Wallet Details. Scammers may ask for your wallet or bank information to “deposit” the recovered crypto. They simply want to steal more money.
  5. No Physical Address or Located Outside the U.S. If there’s no address or it’s outside the U.S., it may be fake. Many scam companies use fictional addresses.
  6. No Phone Number or Exclusive Use of Messaging Apps. Legitimate companies communicate by phone. Scammers use apps like Telegram or WhatsApp to hide.
  7. Guaranteed Fund Recovery. Legitimate services never guarantee cryptocurrency recovery as it’s often impossible.
  8. Creating Urgency. Scammers often create a sense that you must act immediately or lose your opportunity.
  9. Requests Not to Contact Law Enforcement. A strange demand from supposed “legitimate money recovery agents.”
  10. No Verifiable Reviews or Success History. If a company cannot provide genuine evidence of successful fund recovery, that’s a red flag.
Chat with scammers
Example of a “private FBI agent” service offer

Key Risks for Victims

Risk Impact Probability
Financial Loss High Very High
Personal Data Exposure High High
Credential Theft High Medium
Repeat Victimization Medium High
Emotional Distress Medium High

Such schemes involve serious risks. First, significant financial losses. Scammers typically demand large sums upfront, understanding that victims are desperate to recover their lost cryptocurrency. Second, there’s the risk of confidential information exposure. Attackers may request credit card information or online banking credentials, which they can use to empty victims’ accounts or resell on the Dark Web.

How to Protect Yourself from Recovery Scams

Preventive Measures

  • Never trust services promising guaranteed cryptocurrency recovery
  • Always verify the legitimacy of any company before providing personal information
  • Contact law enforcement directly in case of fraud
  • Use only verified cryptocurrency exchanges and wallets with good reputations
  • Enable two-factor authentication on all your cryptocurrency accounts
  • Regularly check your accounts for suspicious activity
  • Be cautious about information you share on social media regarding your cryptocurrency investments

If You’ve Been Victimized

If you’ve fallen victim to a cryptocurrency recovery scam, here are several recommendations that may help:

  1. Report the incident to the platform’s support through which you were defrauded
  2. File a report with law enforcement and gather as much evidence as possible
  3. Block access to your financial accounts and change passwords
  4. Preserve all correspondence with the scammers as evidence
  5. Report the fraud to appropriate regulatory authorities
Complaint Form for crypto recovery scam victims
Complaint Form for crypto recovery scam victims

Where to Report Cryptocurrency Scams:

  • The Federal Trade Commission (FTC)
  • The Commodity Futures Trading Commission (CFTC)
  • The U.S. Securities and Exchange Commission (SEC)
  • The FBI’s Internet Crime Complaint Center (IC3)

Legitimate Methods for Cryptocurrency Recovery

If you find an organization that helps recover lost funds, research their procedures, refund methods, and genuine user reviews online. The primary challenge is that recovering stolen cryptocurrency is extremely difficult.

Almost the only way to accomplish this is to collect as much evidence and information as possible, gather the necessary documentation, and submit it to law enforcement agencies. Law enforcement may contact the platform’s representatives. If it’s proven that the stolen cryptocurrency belongs to the victim, there’s a chance it will be returned. This is the only legitimate way to recover lost cryptocurrency.

Case Studies: Recovery Scam Variations

Investment Recovery Firms

These scammers claim to be specialized investment recovery firms with legal expertise. They often create professional-looking websites with fake testimonials and credentials. They charge an upfront “legal retainer” or “case processing fee” but deliver no actual services.

Ethical Hacker Services

These scammers pose as “ethical hackers” who can retrieve lost crypto through technical means. They claim to have special tools to access blockchain networks or reverse transactions – capabilities that don’t actually exist in blockchain technology. They typically request payment in cryptocurrency “to test the recovery system.”

Law Enforcement Impersonators

Some scammers impersonate FBI agents or other law enforcement officials, claiming they’ve found your stolen cryptocurrency and need a “processing fee” to release it. They may use spoofed email addresses or fake badges to appear legitimate.

Blockchain Analysis Services

These scammers claim to offer specialized blockchain analysis to track and recover lost funds. They provide fake analysis reports with technical jargon and request payment for “advanced tracking services” that never materialize.

Conclusion

Cryptocurrency recovery scams pose a particular danger as they target people who have already been victims of fraud. Awareness of warning signs and understanding how these schemes operate is your best defense. If you’ve lost cryptocurrency to fraud, always contact law enforcement rather than dubious “recovery services.” Remember, if an offer sounds too good to be true, it most likely is a scam.

For more information about other types of cryptocurrency scams, check our articles on celebrity cryptocurrency giveaway scams and other common fraud schemes.

Crypto Recovery Scams: How to Protect Yourself from Secondary Fraud

The post Crypto Recovery Scams: How to Protect Yourself from Secondary Fraud appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/cryptocurrency-recovery-scams/feed/ 9
Top 10 Cash App Scams https://gridinsoft.com/blogs/cash-app-scams/ https://gridinsoft.com/blogs/cash-app-scams/#respond Tue, 14 May 2024 14:06:11 +0000 https://gridinsoft.com/blogs/?p=10930 Protect yourself from Cash App scams by knowing how to stay safe. While Cash App is generally secure and uses advanced encryption and fraud detection technologies, scammers are still trying to steal your money. Despite the risks, the Cash App is a convenient and fast way to transfer money and split expenses with family and […]

The post Top 10 Cash App Scams appeared first on Gridinsoft Blog.

]]>
Protect yourself from Cash App scams by knowing how to stay safe. While Cash App is generally secure and uses advanced encryption and fraud detection technologies, scammers are still trying to steal your money. Despite the risks, the Cash App is a convenient and fast way to transfer money and split expenses with family and friends.

But there are some dangers that few people know about. For example, money that users transfer through the Cash App (or similar apps) is not insured by the FDIC as if it were in your bank account. In this way, users may fall victim to fraud and not get their money back. and raising this issue of fraud, we would like to provide the top most common methods that fraudsters use when stealing your funds through the Cash App.

Top Latest Cash App Scams

Social engineering will always be necessary for fraudsters, which is why they produce the most successful attacks. Thousands of users are deceived and manipulated by intruders. Then they lose their confidential data and money. To do this, they need to gain trust in their victim, apply all their psychological techniques to her, seduce her, or lure her with a tempting prize. So what schemes are to be feared?

1. Phishing emails and fake websites that steal your cash app login details

Scammers often use phishing as a way to steal the information they need. This common method involves deception and disguising as a legitimate organization. Most phishing attacks occur via email, phone calls (vishing), and text messages (smishing). In case of fraud on Cash App, the fraudsters send a similar email address as in the app, which asks you to confirm your password or click on the link that will take you to the phishing site. Phishing is an unspoken pandemic causing a lot of trouble for individuals and corporations. Please remember that phishing is still the most common cyber attack.

2. Cash “flipping” scams that promise significant returns for small investments

This method is gaining momentum in our time, as an investment in the high expected yield has become a common way to earn. But a crook could not have used it in his ill-intentioned ways. They promote their clever enrichment schemes on platforms like Instagram or Twitter. They confirm it with screenshots of the lucky ones who’ve already made a fortune. But to become a member of this happy coupon, the user needs to pay the initial amount, which in time, will bring income. Therefore, the attackers use the Cash App, as the money is transferred instantly and will not be returned.

Cash App Scams
example of clever enrichment schemes on Twitter from scammers

3. Fake Cash App customer support websites and social media accounts

This method works because few users will believe what they hear from the support team on this platform. So again, they disguise themselves as a support team and ask you about your current balance or security questions. Unfortunately, there were also cases where fraudsters called clients and offered assistance with transferring funds to a bank account, and ultimately the money was in their hands.

4. Cash App Cryptocurrency and Bitcoin Scams

Because cryptocurrency has become one of their primary earnings, fraudsters increasingly use scams in this area. In 2021 alone, more than a billion dollars in cryptocurrency were stolen through investment schemes. Here intruders place advertisements on different platforms of social networks about how someone was lucky to turn their small investments into a big profit. If users respond, scammers ask them to transfer money to Bitcoin through the Cash App to replenish their wallet and expect interest with gain.

Bitcoin scam on Cash App
example of Bitcoin scams on Cash App

5. CashAppFridays and SuperCashAppFriday giveaway scams

On Fridays, the Cash App team hands out free promotions through social media such as Twitter or Instagram. Users need to answer with their Cash App “$cashtag” to win this. However, be careful as the attacker creates fake accounts, grabs the hashtag, and responds to people who answer in the original branch of the app. In their messages, they claim you won the prize and will ask for your financial information to send prize money to your account.

6. Fake Cash App payment notifications and emails

Cash App provides transactions between relatives and friends or with other people you know well. But there are also transfers for goods and services sold or purchased online. In payment fraud, fraudsters will buy your product published on social media platforms. After that, they will want to pay it via Cash App and send an email confirming the payment to your account.

But once you’ve checked your account, there won’t be a dime on it for the goods sold. It’s impossible to prove that he didn’t pay you because he’ll say you’re trying to cheat him and ask for a refund.

Cash App Scam Example
example of fake payment from scammers

7. Fake security alerts claiming your Cash App account has been compromised.

Many fraudsters try to manipulate users, instill fear in them, and it works. In the case of fear, the fraudsters intimidate the victim with reports that a data leak has compromised her account. The message will include a link or attachment to which you want to change your credentials to log into the Cash App. Thus, by switching to a fake site, the user risks losing the data that will be entered. After that, his account will be controlled by the scammers.

8. Receiving fake cash app debit cards through the mail

Cash App provides its users with debit cards to access their funds. But the fraudsters also started sending the same cards by mail, with instructions for downloading the application to your device and its configuration. So, when a user uploads this to their device, they log into their account and thus allow scammers to steal this information because the app is fake.

Cash App Scams: Scammers
scammers to steal information through fake app

After you fund your account, fraudsters can easily withdraw this amount as they will have all your credentials.

9. Scammers requesting gift cards in return for “free money” on Cash App

Gift cards are popular among scam artists. They use fictitious cash sweepstakes to send people a gift card. This lets the scammer stay anonymous and impossible to track. There are times when scammers will pretend to be from the FBI or the IRS and will threaten you with imprisonment or large fines if you don’t send them gift cards.

The Federal Trade Commission estimates that $148 million worth of goods and services are fraudulently paid for with gift cards. This is the number one scamming method among consumers.

10. Romance scams on Cash App

Romance scams are caused by fake accounts created on social media and dating websites. In these scams, fraudsters build relationships with victims.

Criminals use trust as a tool for their scams. They invent some emergency and request funds, wire transfers, or other untraceable means. They might say they’re trapped overseas without access to their account or have legal trouble. None of it is accurate, and sending funds to them will result in them melting away.

How To Avoid and Prevent Cash App Scams

  • Don’t disclose sensitive information. Never disclose personal information such as passwords, PINs, authentication codes, or SSNs on Cash App. Additionally, do not share your bank account information or sensitive information. Cash App employees will never request this information.
  • Use two-factor authentication (2FA) on your account. The Cash App allows users to secure their accounts with two-factor authentication. The method requires users to input a special code provided by an authenticator app instead of a text message.
  • Set up “security lock” and payment notifications. Using the Cash App’s “Security Lock,” users must input a passcode for each payment. You can additionally set up email and text message notifications for each payment made to ensure you aren’t left in the dark.
  • Secure your mobile devices against scammers. Create unique secure passcodes and secure biometric options such as fingerprint identification on all your mobile devices. An appropriate example is a password for your phone that should not be the same as the one for your computer or iPad.
  • Log out of the Cash App when you’re not using it. Anyone who uses your device can easily access your account if you keep it logged in.
  • Beware of links and attachments in emails or messages. Hackers frequently exploit this security hole to infect your devices with malware. The best security posture requires keeping your device up-to-date with optimal antivirus software installed.
  • Don’t keep large sums of money in your account. Only hold small amounts of money in your Cash App balance. This balance isn’t federally insured.
  • Avoid sending money to people you don’t know. Before sending money to someone who is not a family member or friend, verify their account details.
  • Only contact customer support by using the actual app. Any messages claiming to be from the Cash App should be ignored. If a person on the phone claims to be from Cash App, disconnect the call or ignore the message. Instead, contact the company through the app.

Top 10 Cash App Scams

The post Top 10 Cash App Scams appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/cash-app-scams/feed/ 0
Cryptocurrency Scams on Twitter Exploit Post Features https://gridinsoft.com/blogs/cryptocurrency-scams-on-twitter/ https://gridinsoft.com/blogs/cryptocurrency-scams-on-twitter/#respond Fri, 22 Dec 2023 13:12:33 +0000 https://gridinsoft.com/blogs/?p=18433 Fraudsters are seen to exploit a feature of Twitter publications, misleading users and endangering digital assets. This deceptive strategy hinges on Twitter’s URL structure, which allows hackers to lure folks into various scams. Primarily, such campaigns are used to promote various cryptocurrency scams. Vulnerability in Twitter In-Post Links The exploit involves altering the account name […]

The post Cryptocurrency Scams on Twitter Exploit Post Features appeared first on Gridinsoft Blog.

]]>
Fraudsters are seen to exploit a feature of Twitter publications, misleading users and endangering digital assets. This deceptive strategy hinges on Twitter’s URL structure, which allows hackers to lure folks into various scams. Primarily, such campaigns are used to promote various cryptocurrency scams.

Vulnerability in Twitter In-Post Links

The exploit involves altering the account name in a tweet’s URL to masquerade as high-profile accounts, luring users to fraudulent content. This technique has seen increasing use in recent weeks, with scammers targeting prominent crypto-related Twitter accounts with massive followings, such as Binance (11 million followers), the Ethereum Foundation (3 million), zkSync (1.3 million), and Chainlink (1 million). Users clicking these modified URLs are redirected to posts promoting crypto scams rather than the expected legitimate content. Such scams range from false crypto giveaways to deceptive websites designed to drain cryptocurrency wallets.

Example of crypto scams
Example X redirect crypto scams

The scam tweets often appear legitimate, particularly on mobile devices, where the Twitter app lacks an address bar, masking the URL discrepancy. This lack of visibility makes it challenging for users to discern the authenticity of the tweet, especially when scammers create accounts with names mimicking legitimate organizations.

What are cryptocurrency scams?

Cryptocurrency scams are fraudulent schemes involving digital currencies like Bitcoin or Ether. These scams exploit the complexity and novelty of cryptocurrencies to deceive users. Tactics include fake giveaways, impersonating legitimate accounts, and promoting bogus investment opportunities with unrealistic returns.

Scammers often use social media, phishing emails, and fake websites to lure victims. They promise high returns, use celebrity endorsements, or offer exclusive investment opportunities, only to steal funds or personal information.

It’s just the beginning

This incident is part of a broader trend of crypto-related scams proliferating on social media platforms, leveraging legitimate features for malicious purposes. These scams not only pose a threat to individual users but also to the reputation of the organizations impersonated. Victims face substantial financial losses, with scammers draining their cryptocurrency wallets, leaving them bereft of their digital assets. Additionally, the psychological toll on victims can be significant, leading to stress, anxiety, and a profound sense of betrayal. These scams not only damage individual lives but also undermine the credibility and stability of the burgeoning crypto economy.

Twitter Cryptoscams – How to Protect?

To combat these scams, users are advised to enable Twitter’s Quality Filter, though it may inadvertently filter legitimate content. Moreover, a careful examination of the URL and the account name can help discern the authenticity of a tweet.

Twitter Cryptoscams
X Quality Filter

However, as this redirection is an inherent feature of Twitter, it remains a persistent threat, underscoring the need for heightened vigilance among users.

To avoid falling victim to crypto scams, consider the following tips:

  • Always check the URL and domain name of the website you are visiting. Fake websites often mimic legitimate ones but may have slight variations in the URL. You can review whether the site is trustworthy by scanning it on the GridinSoft Web Scanner
  • Be cautious of unsolicited offers and too-good-to-be-true promises, especially on social media. Scammers often use high-pressure tactics to create a sense of urgency and promise yet unseen profits.

Cryptocurrency Scams on Twitter Exploit Post Features

The post Cryptocurrency Scams on Twitter Exploit Post Features appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/cryptocurrency-scams-on-twitter/feed/ 0
TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams https://gridinsoft.com/blogs/tiktok-elon-musk-cryptocurrency-giveaway-scams/ https://gridinsoft.com/blogs/tiktok-elon-musk-cryptocurrency-giveaway-scams/#respond Tue, 19 Sep 2023 07:50:52 +0000 https://gridinsoft.com/blogs/?p=16982 Recently, TikTok has been inundated with a flood of cryptocurrency giveaway scam videos spread across the platform. Mostly, these scams are masquerading as topics related to Elon Musk, Tesla, or SpaceX. The potential for quick and easy cryptocurrency makes these a constant and disturbing threat. TikTok flooded by “Elon Musk cryptocurrency giveaway” scams. Today, the […]

The post TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams appeared first on Gridinsoft Blog.

]]>
Recently, TikTok has been inundated with a flood of cryptocurrency giveaway scam videos spread across the platform. Mostly, these scams are masquerading as topics related to Elon Musk, Tesla, or SpaceX. The potential for quick and easy cryptocurrency makes these a constant and disturbing threat.

TikTok flooded by “Elon Musk cryptocurrency giveaway” scams.

Today, the creativity of scammers trying to take advantage of TikTok’s massive user base is quite obvious. TikTok is facing a severe problem with the proliferation of numerous fraudulent cryptocurrency giveaway scams on the platform. Scammers are going all out for their profits. They create hundreds of websites posing as crypto exchanges or free giveaway sites. According to them, the only thing a user has to do to get free cryptocurrency is to register on their site and enter the promo code from the video.

And, of course, the slight nuance that the video is silent about is to pay a small amount for account activation, which will allow the user to withdraw funds. However, the reality is grim: paying the user out is absent in such a scenario. These scams are elaborate traps that steal users’ funds, leaving them empty-handed. Besides, there’s always the chance of being double-crossed. Although this scheme is quite old, it is still very effective — as the saying goes, old but gold.

The Elon Musk impersonation

Attackers learned long ago that promoting mass fraud on behalf of famous personalities is much more effective. Regarding media personalities, the first person who is associated with cryptocurrency giveaway scams is Elon Musk. Moreover, his bizarre behavior and habit of talking nonsense in public and promoting questionable things adds credibility to any scam that mentions the name of Ilon Musk. So, the scammers publish a fake video in which Fox News or others interview Elon Musk and promote a phony cryptocurrency giveaway.

TikTok crypto scam video screenshot
TikTok crypto scam video

The strategy means impersonating Elon Musk and his subsidiaries, Tesla and SpaceX. They are designed to make people think they are participating in a genuine promotion. Thus, some videos contain instructions on how to log into the listed website and enter a promo code to get free bitcoins. Many websites have very similar names like Moonexio[.]com, altgetxio[.]com, and cratopex[.]com or, as in our case, bitoxies[.]com.

How cryptocurrency giveaway scams works?

It starts with a TikTok video the user can find using the hashtag #bitcoinforbeginners. We see many identical videos as if they were copied. The only thing that makes them different is the promo code, which differs for each. We open a random video, see a fragment from the interview mentioned above on the cover, and then follow instructions on registering on the site.

Screenshots with steps from registering on the site to receiving a bonus by promo code
Steps from registering on the site to receiving a bonus by promo code

We open the site, register, and enter the code – voila! We have bonuses on our account. We try to withdraw them and see an error that says that to operate, and you must complete the account setup and activate it. For that, the service asks to deposit an amount equivalent to 0.005 BTC.

Withdrawal error
The website asks to deposit 0.005 BTC for account activation and withdrawal options

Obviously, after replenishing the account, you still cannot withdraw funds. The essence of this scam is to lure victims out of their funds in this way. In addition, the site asks for KYC information, with the help of which attackers will try to hack into our other legitimate accounts. This in total pushes the risks much beyond money losses.

It is also important to note that the mentioned websites may change their names, but retain the overall message. There is an entire pandemic of such sites going on – with absolutely the same design and promises, but different names.

Crypto scam main page screenshots
“My name is Legion”

How to avoid crypto scams?

The first thing this fraudulent scheme is based on is the unawareness of users. The second is greed and the desire to make a profit for nothing. We can help with the first, but the second comes with experience. It is essential to learn that you must pay for everything in life, and no one will give you anything for free. Besides, it would help if you did not get your investing advice from TikTok. Elon Musk’s crypto giveaways are like his promises to improve Twitter: they’re fake. Cryptocurrency is not something you can invest in just out of interest. Before investing, you should study this field well and understand it completely. Otherwise, losses are inevitable. In addition, we recommend that you only use official platforms and apps. The following red flags will help you identify scams:

  • The ad promises free cryptocurrency for performing simple actions such as subscribing to an account, watching a video, or commenting on a post.
  • The ad contains errors or typos.
  • The ad looks informal or unprofessional.
  • The ad requires entering your personal or cryptocurrency wallet information.

If you see a post or comment that fits one or more of these traits, it’s best to ignore it.

TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams

The post TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/tiktok-elon-musk-cryptocurrency-giveaway-scams/feed/ 0
Hot and Cold Crypto Wallets Hacking https://gridinsoft.com/blogs/cryptowallets-hacking-hot-cold/ https://gridinsoft.com/blogs/cryptowallets-hacking-hot-cold/#respond Wed, 12 Jul 2023 15:45:48 +0000 https://gridinsoft.com/blogs/?p=15837 Cryptocurrency is a rapidly changing world where people can make fortunes by exchanging digital assets. However, seasoned investors and newcomers alike are at risk of falling prey to crypto phishing scams. These scams exploit people’s trust and vulnerability and aim to trick them into revealing sensitive information or giving up their hard-earned crypto holdings. What […]

The post Hot and Cold Crypto Wallets Hacking appeared first on Gridinsoft Blog.

]]>
Cryptocurrency is a rapidly changing world where people can make fortunes by exchanging digital assets. However, seasoned investors and newcomers alike are at risk of falling prey to crypto phishing scams. These scams exploit people’s trust and vulnerability and aim to trick them into revealing sensitive information or giving up their hard-earned crypto holdings.

What are cryptocurrency scams?

Crypto scams are investment frauds that can take many forms, from phishing scams to rug pulls. Since a central authority like a bank doesn’t regulate crypto’s blockchain technology, bad actors can easily exploit hopeful investors. That, actually, has made cryptocurrencies and all related topics an ideal harbor for different scams. Due to the lack of experience, people were prone to falling victims even to the least complicated schemes – leave alone tricky ones.

With time, cybercriminals become more sophisticated in their phishing techniques. Primary reason for that is the uprising of average folks’ knowledge – it just became not that easy to scam someone. They impersonate legitimate exchanges and wallets and use convincing social engineering tactics to gain unauthorized access to digital assets. These scammers use various social engineering methods to manipulate users’ emotions and create a sense of trust and urgency. It’s essential to be aware of these tactics and take the necessary measures to protect yourself.

Hot and Cold Wallets Difference

To assess the risks, let’s review the different types of wallets. First, it’s important to note that wallets do not hold the actual crypto assets. Instead, the blockchain records information about the support, while the wallet provides secure storage for the private (secret) key.

Hot and Cold Wallets Difference
The difference between Hot and Cold Wallets

The “Hot” wallets.

A hot wallet is a cryptocurrency wallet that has constant internet access. It includes any online service that offers cryptocurrency storage, such as crypto exchanges and specialized apps. The keys in a hot wallet are stored encrypted on the server. These are online or custodial wallets offered by popular exchanges, including Binance and Coinbase.
The key can be used to sign a transaction on the blockchain anytime.

The “Cold” wallets.

In the case of a cold wallet, the keys are stored on a standalone device or as an alphanumeric sequence written on a piece of paper. A device solely for storing keys is known as a hardware wallet, while software wallets are applications designed to store keys on regular computers and smartphones.

Attack on “Hot” wallets

Many people use hot wallets to store their cryptocurrency because they are easy to create and convenient. However, cybercriminals often target hot wallets because they are frequently online and popular. Storing large amounts in hot wallets is not recommended due to their susceptibility to attacks. Although cybercriminals may use phishing techniques to attack hot wallets, their tactics are often simple and aimed at less experienced users.

cryptocurrency phishing

A standard method in crypto phishing scams is impersonating trusted entities, like cryptocurrency exchanges or wallet providers. The scammers send emails or messages that look like they come from these legitimate organizations, using similar branding, logos, and email addresses. Their goal is to trick people into thinking they are receiving a message from a trustworthy source.

Seed phrase entry page

One common phishing scam targets users of hot wallets. Scammers will send emails posing as a well-known crypto exchange, asking users to confirm a transaction or verify their purse. Once the user clicks the link, they are taken to a page. Then they are asked to enter their seed phrase. A seed phrase consisting of either 12 or 24 words is required to regain access to a crypto wallet. This is the primary password for the wallet and should be kept secure. If the seed phrase is lost or given to scammers, the user risks permanently losing access to their wallet and compromising their account.

Scams that are straightforward and don’t involve software or social engineering tactics are usually aimed at people who are not tech-savvy. The form for entering a seed phrase usually looks simple, with just an input field and a logo for a cryptocurrency exchange.

Phishing attacks targeting cold wallets

Cold wallets seem to be more safe because they are not always connected to the Internet. However, it would be a mistake to assume that a hardware wallet can only be hacked by stealing or physically accessing it. As with hot wallets, scammers use social engineering techniques to access users’ funds. Recently, experts noticed an email campaign explicitly targeting hardware cold wallet owners.

A typical attack involves a crypto email campaign where the user is sent an email from a cryptocurrency exchange inviting them to participate in a giveaway of XRP tokens, the platform’s internal cryptocurrency. When the user clicks on the link, they will be directed to a blog page with a post outlining the “giveaway” rules. This post also includes a direct link for registration. Where scammers are already finding sophisticated methods to trick the user.

Fake support requests

Beware of crypto phishing scams where scammers pretend to be customer support reps from real cryptocurrency exchanges or wallet providers. They may send messages or emails to users, tricking them into believing there’s a problem with their account or a transaction that needs urgent attention. These scammers often provide a link to a fake support website or contact method, where users are asked to provide their login credentials or sensitive information. Stay vigilant, and avoid falling for these tactics.

Screen of cryptoscam

Scammers exploit users’ trust in legitimate customer support channels by pretending to be support personnel. They also capitalize on users’ eagerness to resolve issues promptly, which leads them to reveal their private information willingly. Scammers can then use this information for malicious purposes.

How to protect users from crypto-phishing

To stay safe while using cryptocurrency, there are measures users can take. One is enabling two-factor authentication, a helpful tool to prevent phishing scams from compromising their crypto accounts.

  • Use of hardware or software authenticators. Hardware authenticators, or security keys, are physical devices that generate one-time passwords and provide an extra layer of security. Software-based authenticators, such as Google Authenticator, generate time-based codes on users’ smartphones.
  • Be careful with links and attachments. Phishing scammers use a trick where they display a different URL text to what the actual destination is. To avoid falling for this, users can hover over the link to check for inconsistencies and suspicious URLs that may indicate a phishing attempt.
  • Scanning attachments with antivirus. To protect your device and cryptocurrency accounts from malware, always be careful when downloading and opening attachments, particularly from unknown or suspicious sources. Attachments may contain harmful software, such as keyloggers or trojans, which can jeopardize security. To reduce this risk, scanning all attachments with trustworthy antivirus software is advisable before opening them.
  • Keep software updated. It is crucial to keep the operating systems, web browsers, devices, and other software up to date to ensure the security of the user’s devices. These updates may contain security patches to address known vulnerabilities and protect against new threats.

As crypto phishing scams constantly change, users must stay current on the latest tactics and scams targeting the cryptocurrency community. Educating yourself on these techniques and staying informed about recent phishing incidents and security best practices can help keep you safe. To stay informed about phishing scams, security vulnerabilities, and how to protect your crypto assets, it’s essential to follow trustworthy sources that provide accurate information and alerts.

The post Hot and Cold Crypto Wallets Hacking appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/cryptowallets-hacking-hot-cold/feed/ 0
ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users https://gridinsoft.com/blogs/imbetter-information-stealer/ https://gridinsoft.com/blogs/imbetter-information-stealer/#respond Thu, 09 Mar 2023 18:51:43 +0000 https://gridinsoft.com/blogs/?p=13704 Today, phishing sites are commonplace. But unfortunately, this seemingly old, deceptive tactic, which everyone seemed to have figured out long ago, still brings enormous profits to scammers today. The problem is that while Internet users are becoming more cautious, cyber scammers are developing more sophisticated ways to trick them. One such method is ImBetter malware. […]

The post ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users appeared first on Gridinsoft Blog.

]]>

Today, phishing sites are commonplace. But unfortunately, this seemingly old, deceptive tactic, which everyone seemed to have figured out long ago, still brings enormous profits to scammers today. The problem is that while Internet users are becoming more cautious, cyber scammers are developing more sophisticated ways to trick them. One such method is ImBetter malware. The authors of such malware use sophisticated techniques when creating their phishing websites to make them appear legitimate and appealing to users.

What is ImBetter malware?

ImBetter Stealer is the name of malware whose mission, as its name suggests, is to steal information. Not so long ago, researchers came across some phishing websites that targeted Windows users. These websites imitate popular crypto wallets and online file converters. However, instead of its purported function, they trick users into downloading the “ImBetter Stealer” malware. This malware targets sensitive data such as cryptocurrency wallets, browser credentials, and session cookies. In addition, it can take screenshots of the system and send them to the C&C server.

ImBetter Malware Spreading

Researchers discovered that the main channel for spreading ImBetter are malicious sites masquerading as well-known legit cryptocurrency sites, such as MetaMask, etc., and online file format converters. Nevertheless, experts do not rule out that ImBetter also uses other distribution methods, such as phishing and social engineering. In some cases, this malware is getting bundled with pirated software or is supplied instead of it. In turn, sites that distribute pirated programs are promoted via spam mailings, search engine poisoning, malicious browser pop-ups, etc.

Fake Metamask page example
Fake Metamask page that spreads ImBetter malware

However, the infection process only begins when a visitor interacts with the website by clicking on a specific content. The ImBetter Stealer malware binary is a 32-bit GUI-based executable file. Immediately after starting the execution, the malware obtains language and region data for the system. If the malware detects Russian, Moldova, Belarusian, Bashkir, Tatar, Kazakh, or Yakut region/languages after checking the LCID code of the infected system, it would stop further execution. This clearly hints at the virus’s origin and indicates that the attackers are Russian-speaking.

ImBetter Data Stealing

Suppose the system victim does not belong to any of the above regions. In that case, ImBetter takes a screenshot of the infected system’s desktop and saves it to the C:\Users\Public folder with the image name “Scr-urtydcfgads.png“. The malware will then send this screenshot to attackers on the C&C server. ImBetter then creates a socket connection to the C&C IP address, after which it can obtain the hardware ID, CPU, GPU, and system memory size, as well as screen and name information from the infected system. Each type of system information is saved separately as a string of key-value pairs in memory and then encoded in Base64 format and sent to the C&C server.

Following system information, the malware checks for the presence of Chromium-based web browsers installed in the system. ImBetter is interested in the following web browsers:


  • Google Chrome
  • Edge
  • Opera Stable
  • Vivaldi
  • AcWebBrowser
  • Epic Browser
  • Titan Browser
  • Baidu Spark
  • CoolNovo
  • Yandex


  • Torch
  • BlackHawk
  • Comodo Dragon
  • Rockmelt
  • Brave
  • Sleipnir
  • CentBrowser
  • Go!
  • SRWare Iron
  • Flock


There is a pretty straightforward reason for attacking these browsers. Their popularity increases the chance of finding something valuable among the browser files – like passwords, user accounts, cookies and so forth. By default, this information is stored in the AppData/Local/%BrowserName% directory, the one that is created during its installation. It contains login credentials, cookies, stored credit card numbers, user profiles, and cryptocurrency extensions. Cybercriminals do all this for one purpose – to gain control over the victim’s personal information and/or funds.

How to avoid malware?

The following cybersecurity tips create a first line of defense against attackers. We recommend that you follow the next tips to reduce the risk of ImBetter infection, as well as other malware:

  • Download from trusted sources. Avoid downloading and using pirated software from warez/torrent websites. Most cracked programs contain malware.
  • Use strong passwords. Using easy-to-guess or predictable passwords makes it easy for crooks to crack your password by brute force.
  • Use Multifactor Authentication. Suppose attackers discovered or cracked your password and tried logging into your account. The system will send you a notification to your phone and a one-time confirmation code. Without it, attackers cannot log in to your account.
  • Always install the latest updates on your devices. Updates contain important security fixes and sometimes new features. Therefore, we recommend enabling automatic software updates on your computer and smartphone.
  • Use reliable anti-malware software. This way, antivirus software blocks and removes malicious files while downloading.
  • Please do not click on links from emails or open email attachments unless you know their authenticity.

ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users

Tips for organizations:

  • Train employees to identify threats such as phishing/insecure URLs.
  • Monitor the beacon on the network level to block data exfiltration by malware or TAs.
  • Use blocking URLs that employees may use to download malware, such as Torrent/Warez.
  • Use data loss prevention (DLP) solutions on employee systems.

The post ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/imbetter-information-stealer/feed/ 0
“Get Rich With Bitcoin” Instagram Bitcoin Scams https://gridinsoft.com/blogs/instagram-bitcoin-scams-2022/ https://gridinsoft.com/blogs/instagram-bitcoin-scams-2022/#respond Thu, 13 Oct 2022 13:31:02 +0000 https://gridinsoft.com/blogs/?p=11067 Instagram is a vast social network with over a billion active users. Fraudsters do not miss the chance to develop clever schemes on this platform, to deceive users and steal data. These activities are often not run by highly skilled hackers but ordinary people who want financial gain. In this article, we will talk about […]

The post “Get Rich With Bitcoin” Instagram Bitcoin Scams appeared first on Gridinsoft Blog.

]]>
Instagram is a vast social network with over a billion active users. Fraudsters do not miss the chance to develop clever schemes on this platform, to deceive users and steal data. These activities are often not run by highly skilled hackers but ordinary people who want financial gain.

In this article, we will talk about Instagram Bitcoin scams, as cryptocurrency and its activities have become popular worldwide. To avoid becoming a victim of fraud in this area, we will guide you on what Instagram Bitcoin scams are and how to protect yourself and your money from them.

Common Instagram Bitcoin scams

There is no end to people complaining on Facebook about losing their money to Bitcoin pyramid schemes. As for Instagram, a growing market of scams promises users to get rich quickly. These scams include Get Rich Quick Bitcoin Pyramid and Cash Cow Pyramid Schemes.

1. Big wins, short timespan:

People who talk about making large returns on smaller investments or pressure to transfer money quickly are warning flags. Anyone contacting you about a “Bitcoin mentor” should be avoided.

fake bitcoin offer
Example of large returns on smaller investments

2. Could you send me the money?

Investing funds in someone else’s digital wallet via purchasing cryptocurrency is a waste of time and money. This is similar to a request to give a loan to a stranger, without anything to guarantee a return.

3. Hostage-style scams to cryptocurrency:

Many videos on success claims made by Bitcoin are creepy videos produced by previously scammed people. Users are asked to record videos in exchange for rewards in bitcoins or fiats. Such offers are advertised on Instagram, which is senseless and untrue.

4. Changes in circumstances:

If you are asked to change the username and password of your account to the one that will send you, then the scammers are trying to get access to your profile on Instagram. In the future, fraudsters can perform unauthorized actions on your behalf, and you will not be able to influence them. So make up your passwords and logins that only you will know.

email was changed

How To Protect Yourself from Instagram Scams

1. Double check the URL

If any unauthorized activity or something else occurs on your Instagram account, notifications about this will not come to your app. To avoid falling victim to fraud, check the official messages on Instagram that have been sent over the past 14 days. To do this, click “Settings”. But if you have doubts that your account has been compromised, go into your “Settings” and click “Login Activity”.

2. Find the verified blue check mark

Official Instagram and celebrity accounts are often marked with a blue tick next to the user name. If you notice that you are being contacted on behalf of some brand, but this account is not confirmed as official, then it is likely not legitimate. If you want confirmation of whether this account is official, go into their profile and select “About This Account”.

3. Enable two-factor authentication (2FA)

Enabling two-factor authentication means that whoever logs into your account must pass an additional checkpoint. This means that after you enter your login and password. You will receive a confirmation code as a text message or e-mail. You will need to enter this code, and then you can log in to your account. In addition, 2FA also provides fingerprint or facial verification or a question you can only answer.

4. Never trust the strangers with your money

Trusting someone with money is the last thing you need to do on social networks. Don’t be fooled if you’re offered something to do, publish a post, or make a video in exchange for a cash reward. This is most likely fraud, so you can compromise yourself, give bad reviews to others, and give out your payment and confidential data for money transfers, etc.

“Get Rich With Bitcoin” Instagram Bitcoin Scams

The post “Get Rich With Bitcoin” Instagram Bitcoin Scams appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/instagram-bitcoin-scams-2022/feed/ 0