SYDNEY, AUSย โ Sept. 19, 2023 โย Sophos, a global leader in innovating and delivering cybersecurity as a service, today released findings on a major shฤ zhลซ pรกn (pig butchering) operation utilising fake trading pools of cryptocurrency (liquidity pools) to steal more than $1 million. The report, โLatest Evolution of โPig Butcheringโ Scam Lures Victim in Fake Mining Scheme,โ details the story of one of the scammed victims in the pools, named *Frank, and how he lost $22,000 in one week after โsomeoneโ pretending to be โVivianโ on the dating app MeetMe contacted him.
After Sophos X-Ops investigated Frankโs story, the team uncovered a total of 14 domains associated with the scam operation, as well as dozens of nearly identical fraud sites that, together, netted this one โringโ of pig butcherers more than $1 million in three months.
This scam takes advantage of the largely unregulated world of decentralised finance (DeFI) cryptocurrency trading applications. Such applications create โliquidity poolsโ of various types of cryptocurrencies that users can then access to make trades from one cryptocurrency to another. Those who participate in the pool receive a percentage of any fee paid when a trade is made, creating an enticing return on investment. To join a pool, participants first have to sign an online smart contractโa contract that gives another account (typically the operators of the pool) permission to access participantsโ wallets to facilitate trades. Fake pools, which pig butcherers are increasingly utilising to siphon funds from targets, operate in much the same way. However, unlike legitimate pools, at some point these scammers โpull the rugโ and empty the entire liquidity pool for themselves.
โWhen we first discovered theseย fake liquidity pools, it was rather primitive and still developing. Now, weโre seeing sha zhu pan scammers taking this particular brand of cryptocurrency fraud and seamlessly integrating it into their existing set of tactics, such as luring targets overย dating apps.ย Very few understand how legitimate cryptocurrency trading works, so it’s easy for these scammers to con their targets. There are even toolkits now for this sort of scam, making it simple for different pig butchering operations to add this type of crypto fraud to their arsenal. While last year, Sophos tracked dozens of these fraudulent โliquidity poolโ sites, now weโre seeing more than 500,โ said Sean Gallagher, principal threat researcher, Sophos.
Sophos X-Ops first learned of this liquidity mining operation from a victim named Frank. Frank had connected on the dating app MeetMe with a scammer hiding behind the persona of Vivian, a German woman supposedly living in Washington, D.C. for work. For weeks, Frank chatted with Vivian, who mixed her romantic promises with persistent attempts to convince Frank to invest in crypto.
Eventually, Frank opened a Trust Wallet account (a legitimate app for converting dollars to cryptocurrency) and connected to the link to the liquidity pool site Vivian recommended.ย In reality, the pool site was a fraud site utilising the brand of Allnodes, an established decentralised finance platform provider, as a cover. Between May 31 and June 5, Frank invested $22,000 in the scheme. Just three days later, the scammers emptied Frankโs digital wallet. Frank, looking to recover his money, turned to Vivan, who claimed he needed to invest even more in the pool to recover his funds and reap the โrewards.โ While waiting for his bank to authorise a money transfer to Coinbase, Frank started researching what was going on and came across an article onย liquidity miningย from Sophos. At this point, Frank reached out to Gallagher for help.
Even after Gallagher instructed Frank to block Vivian, she eventually found him on Telegram and continued her attempts to entice him into โcontinuing their investment,โ going so far as to send a lengthy, emotional letter that was very likely created by a generative AI app.
โWhat makes these sorts of scams particularly tricky is that they donโt require any malware to be installed on a victimโs device. They donโt even involve a fake app, like some of those weโve encountered in otherย CryptoRom scams. This entire fake liquidity pool was run through the legitimate Trust Wallet app. At one point, Frank even tried to contact Trust Walletโs support to recover his money, but he connected with a fake support contact from the fraudulent liquidity pool site. There is no regulation of these pools, legitimate or otherwise, on these crypto apps. These scams succeed solely through social engineering, and the scammers are persistent. Vivian continued trying to contact Frank for weeks after he blocked her on WhatsApp.
โThe only way to stay safe from these scams is to be vigilant and know that they exist and how they operate. That is why Frank wanted to share his story. Users need be wary of anyone they have no connection with reaching out to them suddenly via any dating app or social media platform, particularly if the โpersonโ reaching out wants to move the conversation to a platform like WhatsApp and then discusses investing in cryptocurrency,โ said Gallagher.
Sophos has shared its data on this case with Chainalysis and Coinbase, as well as other threat intelligence professionals in the cryptocurrency space, all of whom continue to investigate. People who believe they may be a victim of pig butchering or liquidity mining fraud are free to reach out to Sophos. They should also reach out to their local law enforcement for assistance.
For more about the rise of liquidity mining scams in โLatest Evolution of โPig Butcheringโ Scam Lures Victim in Fake Mining Scheme,โย go to Sophos.com.
*Name has been changed to protect the privacy of the victim.
ย — END
Learn More About
- The latestย tacticsย deployed by pig butcherers, including the use of generative AI
- Large-scaleย pig-butcheringย operations running out ofย Southeast Asia
- Theย first fake appsย for CryptoRom schemes found in the Apple App Store
- โCryptoRomโ scamsย and how they targetย iOS users
- Liquidity miningย and how it contributes to cryptocurrency crimes
- Dwindling dwell times and changing attacker behavior and techniques in theย Active Adversary Report for Tech Leaders 2023
- Sophos X-Ops and its groundbreaking threat researchย by subscribing to theย Sophos X-Ops blogs
About Sophos
Sophos is a worldwide leader and innovator of advanced cybersecurity solutions, including Managed Detection and Response (MDR) and incident response services and a broad portfolio of endpoint, network,ย email, and cloud security technologies that help organisations defeat cyberattacks. As one of the largest pure-play cybersecurity providers, Sophos defends more than 500,000 organisations and more than 100 million users globally from active adversaries, ransomware, phishing, malware, and more. Sophosโ services and products connect throughย itsย cloud-based Sophos Central management console and are powered byย Sophos X-Ops, the companyโs cross-domain threat intelligence unit. Sophos X-Ops intelligence optimises the entire Sophos Adaptive Cybersecurity Ecosystem, which includes a centralised data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity and information technology vendors. Sophos provides cybersecurity-as-a-service to organisations needing fully-managed, turnkey security solutions. Customers can also manage their cybersecurity directly with Sophosโ security operations platform or use a hybrid approach by supplementing their in-house teams with Sophosโ services, including threat hunting and remediation. Sophos sells through reseller partners and managed service providers (MSPs) worldwide. Sophos is headquartered in Oxford, U.K. More information is available atย www.sophos.com.