Scammers create Blockworks clone site to drain crypto wallets

[adinserter block=”2″]

[ad_1]

Phishing scammers have cloned the websites of crypto media outlet Blockworks and Ethereum blockchain scanner Etherscan to trick unsuspecting readers into connecting their wallets to a crypto drainer.

A fake Blockworks site displays a fake “BREAKING” news report of a supposed multimillion-dollar “approvals exploit” on the decentralized exchange Uniswap and encourages users to a faked Etherscan website to rescind approvals. 

The fake Uniswap news article was posted on Reddit across several popular crypto-related subreddits by seemingly compromised Reddit accounts.

The fake Blockworks website (left) shows a fake breaking news story of a Uniswap exploit compared to the legitimate website (right).

The fake Etherscan website, which displays a purported token and smart contract approval checker, instead contains a wallet drainer.

Blockchain security firm Beosin reviewed the drainer’s smart contract and told Cointelegraph the attacker hopes to drain wallets with at least 0.1 Ether (ETH), worth $180. However, the drainer is incorrectly set up as “there is no phishing transaction prompted after a wallet is connected.”

The phishing website (left) compared to the legitimate Etherscan website (right).

Related: 85% of crypto rug pulls in Q3 didn’t report audits: Hacken

An age check of the domains shows the fake Etherscan site, approvalscan.io, was registered on Oct. 25 and the faked Blockworks site, blockworks.media, was registered a day later.

In an Oct. 25 X (Twitter) post, Web3 anti-scam platform Scam Sniffer showed that scammers had deployed a wallet drainer on a website cloning the crypto news outlet Decrypt.

Sam Sniffer told Cointelegraph the faked Blockworks and Decrypt sites are, however, run by different scammers.

Magazine: Ethereum restaking — Blockchain innovation or dangerous house of cards?

Update (Oct. 27, 1:30 am UTC): This article has been updated with further information and comments from Beosin and Scam Sniffer.



[ad_2]

Source link

[adinserter block=”2″]

Be the first to comment

Leave a Reply

Your email address will not be published.


*