The victim loses $520,000 in a link to the fake bridge website: Scam sniffer


A cryptocurrency holder lost more than half a million dollars after signing a malicious transaction on a fake cross-chain bridge.

Web3 Scam Sniffer security platform I mentioned The incident occurred on January 6, and a post on X stated that the victim lost more than $520,000 in Chainlink (connection) to a malicious cryptographic bridge.

On-chain details reveal that the victim signed the fake transaction on January 4, resulting in the loss of 22,415 LINK tokens, valued at approximately $525,196 at the time. According to Scam Sniffer, attackers targeted Telegram-based DeFi groups and exploited users looking for faster bridging solutions.

This incident comes just days after a report on DeFi attacks suggested that the ecosystem lost $494 million to wallet-draining phishing scams in 2024. More than 332,000 addresses were compromised over a 12-month period, representing a 67% increase year over year. Annual losses. Affected portfolios increased by 3.7% during the same period.

According to the research report, wallet drain attacks intensified during the year, and the largest single cryptocurrency theft via these attacks exceeded $55.4 million.

In December 2024, Scam Sniffer detailed How attackers were using Google ad campaigns to steal funds from unsuspecting cryptocurrency holders. For example, fake ads led users to a fraudulent Pudgy Penguins website, resulting in money being stolen.

Blockchain security company SlowMist also open Last month, attackers turned to Zoom to target cryptocurrency users.

Since such incidents are still prevalent, Scam Sniffer advises users to take necessary precautions such as checking URLs and avoiding links from strangers. The platform also warns against trusting individuals who seem overly eager to help, as urgency is a common tactic used by scammers.

If someone's "help" seems too eager, be very careful. Take your time to check – urgency is often a tool of scammers,” Scam Sniffer wrote on X.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *