Blockfence platform analysts recently uncovered a complex fraudulent scheme involving over 42,000 unsuspecting users.
Starting in April 2023, unknown hackers devised an insidious plan using over 1,300 dummy tokens that resulted in the theft of over $32 million dollars worth of various assets. This fraudulent scheme, known as a "rug pull," was executed with remarkable accuracy and efficiency due to the hackers' use of specialized software.
Using this software, the criminals automated much of their illegal activity, reducing the need for direct involvement and maximizing the scope of their criminal endeavors.
🚨 MASSIVE $32M RUG PULLS OPERATION UNVEILED 🔒
— Blockfence (@blockfence_io) January 12, 2024
We are sharing an investigation conducted by our team, which resulted in:
- More than 1.300 different token rug pulls
- More than $32M stolen
- More than 42.000 victims
- Novel techniques used to avoid being detected
A thread 🧵 ... pic.twitter.com/Qnr3RHIbCd
The program works by creating tokens that mimic existing assets, attracting investment into the project. Once the desired threshold of attracted funds is reached, the fraudsters commit theft by emptying the liquidity pool, quickly absconding with the illegally gained capital.
To avoid arousing suspicion from the media and cryptocurrency experts, hackers stick to the strategy of extracting relatively modest amounts from each fake asset. Typically, fraudulent projects bring in between 5 ETH and 20 #ETH, providing a relatively discreet operation that doesn't show up on the radar as substantial.
Interestingly, Blockfence experts stumbled upon this fraudulent scheme when they discovered a fake token associated with their own company. Not giving up hope, the team is diligently investigating the case and has promised to analyze the hackers' activities on various blockchains including #Base, #BNB Chain and #Arbitrum.
In their quest for justice, Blockfence analysts intend to dismantle the tangled web of deception woven by these cybercriminals and protect the interests of users.