ADVERTISEMENT
CRYPTONEWS

Crypto User Loses $7.8 Million in SolvBTC as Phishing Scams Skyrocket on Social Media

A phishing attack resulted in a crypto user losing $7.8 million worth of SolvBTC, a wrapped Bitcoin product created by Solv Protocol.

ADVERTISEMENT

On Dec. 11, blockchain security firm Scam Sniffer highlighted the incident and shed further light on the evolving sophistication of such scams.

How the attack unfolded

According to Scam Sniffer, the victim unknowingly signed a phishing transaction, which triggered a direct asset transfer to an address pre-computed using Ethereum’s CREATE2 opcode.

Scam Sniffer explained that attackers leveraged CREATE2 to predict contract addresses before deployment.

This tactic bypasses wallet security alerts by generating new temporary addresses for each malicious signature. After the victim signs the transaction, the attacker deploys a contract at the designated address and drains the wallet.

The CREATE2 opcode, often used in legitimate applications like Uniswap to deploy Pair contracts, is now being exploited in wallet-draining schemes.

Rising scams

Scam Sniffer also warned of a growing trend of crypto scams on the social media platform X.

In the first week of December, the number of fake crypto accounts surged to over 300 daily, compared to 160 in November. Many of these accounts impersonate influencers to lure victims into joining fraudulent Telegram groups.

Once users join these groups, they are asked to verify their identities using a bot called OfficialSafeguardBot. The bot creates a false sense of urgency, pressuring victims to complete the process quickly.

During verification, the bot secretly injects malicious PowerShell code into the victim’s clipboard. If executed, the code downloads malware designed to compromise the user’s system and crypto wallets.

Scam Sniffer noted that the malware, flagged by VirusTotal, has already led to multiple confirmed cases of private key theft. The security firm described this as a new phase in crypto scams, where attackers combine phishing tactics with advanced social engineering and malware deployment.

How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

ADVERTISEMENT
Source
cryptoslate.com
ADVERTISEMENT

Admin

This site is about online scams! We inform people so that they are not deceived by scammers who use stolen photos. You can send your story to [email protected]

Related Articles

Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Back to top button