{"id":15013,"date":"2024-07-08T11:29:43","date_gmt":"2024-07-08T08:29:43","guid":{"rendered":"https:\/\/forklog.com\/en\/pink-drainer-hackers-fall-victim-to-address-poisoning-scam\/"},"modified":"2024-07-08T11:29:43","modified_gmt":"2024-07-08T08:29:43","slug":"pink-drainer-hackers-fall-victim-to-address-poisoning-scam","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/pink-drainer-hackers-fall-victim-to-address-poisoning-scam\/","title":{"rendered":"Pink Drainer Hackers Fall Victim to Address Poisoning Scam"},"content":{"rendered":"<p>The wallet-draining group Pink Drainer has fallen prey to an address poisoning scam.\u00a0<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Scamming the scammer ?<\/p>\n<p>It seems like an address associated with the Pink Drainer fell victim to the address poisoning scam. <\/p>\n<p>Pink Drainer: 0x8980ab6d185af9bcc10292d4e91ae4c0b4f14213<\/p>\n<p>Real: 0xEfF0E5244d5C78Ba4DD6bc01082576280558f58A<br \/>Fake:\u2026 <a href=\"https:\/\/t.co\/1CCWTufeZv\">pic.twitter.com\/1CCWTufeZv<\/a><\/p>\n<p>\u2014 MistTrack?\ufe0f (@MistTrack_io) <a href=\"https:\/\/twitter.com\/MistTrack_io\/status\/1809757802375647610?ref_src=twsrc%5Etfw\">July 7, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The incident, which occurred on June 27, was highlighted by analysts from the MistTrack platform. According to their data, the hackers sent 10 ETH, valued at approximately $30,000, to a fake address mimicking their own.\u00a0<\/p>\n<p>Address poisoning occurs when a perpetrator sends a small amount of digital assets from a wallet with a similar address to confuse the victim into using incorrect data.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cScammers have bots that look for new transactions. Since they cannot replace the entire address, they make only the first and last few characters look similar. This way, the scammer hopes the victim [copies] the address instead of the original,\u201d MistTrack experts noted in a conversation with <a href=\"https:\/\/cointelegraph.com\/news\/pink-drainer-hit-with-address-poisoning-scam\">Cointelegraph<\/a>.<\/p>\n<\/blockquote>\n<p>In the case of Pink Drainer, the poisoned address duplicated the first and last five characters.\u00a0<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-eu.googleusercontent.com\/docsz\/AD_4nXdNL9jKmGcOvtMo9WQe8iWsNKxpkVgS-a8PjH0mqVV6dbTxeYBCPJF9KeMWE-pbpVy3p5EErHrF1e9ZiCBPf-fYybSN6JGyfdX-wB4J2JZs-fg7YvvO8NQa23H4bD77Zm_9vducPJGDkaTxOT5o-_Tl6DJs?key=XcwjzpiFzaR7NGp8ipPAoA\" alt=\"Pink Drainer hackers fall victim to address poisoning\"\/><figcaption class=\"wp-element-caption\">Comparison of Pink Drainer&#8217;s wallet and the poisoned address. Data: Cointelegraph.<\/figcaption><\/figure>\n<p>In May, it was revealed that the hacker group <a href=\"https:\/\/u1f987.com\/en\/news\/cybersecurity-highlights-pink-drainers-closure-fbis-breachforums-seizure-and-more\">ceased operations<\/a> after reaching a financial goal.<\/p>\n<p>According to a dashboard by <a href=\"https:\/\/dune.com\/scamsniffer\/pinkdrainer-stats\">Dune<\/a>, since July 2023, the hackers have stolen over $85 million from more than 21,000 victims.\u00a0<\/p>\n<p>Previously, an unknown individual <a href=\"https:\/\/u1f987.com\/en\/news\/hacker-returns-51-eth-to-victim-from-stolen-68-million\">stole 22,960 ETH<\/a> (~$67.1 million) using address poisoning. Later, they returned all the funds to the affected user.\u00a0<\/p>\n<p>In May, Binance <a href=\"https:\/\/u1f987.com\/en\/news\/binance-unveils-solution-to-spoofing-scam\">introduced<\/a> a mechanism to combat this type of scam. The algorithm detects fake addresses by initially identifying suspicious transfers, such as transactions with near-zero value or low-value tokens.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The wallet-draining group Pink Drainer has fallen prey to an address poisoning scam.\u00a0 Scamming the scammer ? It seems like an address associated with the Pink Drainer fell victim to the address poisoning scam. Pink Drainer: 0x8980ab6d185af9bcc10292d4e91ae4c0b4f14213 Real: 0xEfF0E5244d5C78Ba4DD6bc01082576280558f58AFake:\u2026 pic.twitter.com\/1CCWTufeZv \u2014 MistTrack?\ufe0f (@MistTrack_io) July 7, 2024 The incident, which occurred on June 27, was highlighted [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[44,57],"class_list":["post-15013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybercrime","tag-wallets"],"aioseo_notices":[],"amp_enabled":true,"views":"31","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/15013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=15013"}],"version-history":[{"count":0,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/15013\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/15012"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=15013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=15013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=15013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}