2 Scam Reports

Other

1

On May 14 2022, QuickSwap.Exchange, a DEX on Polygon, suffered a Domain Name Service (DNS) Hi-jacking. Approximately $107,000 USD of blockchain assets were stolen [1]. The DNS hacker inserted wallet (0x83...0c5d) to receive the stolen funds and deposited 144K MATIC into Tornado Cash [2]. Funds were also funneled to the wallet used as a hub to bridge ~12.3K MATIC to wallet (0x3C...13C4) on the Binance Smart Chain (BSC) [3], where ~30 BNB was funneled out [4] to FixedFloat Exchange. Lastly, ~19K MATIC was funneled through 3 intermediary wallets (SimpleSwap deposit addresses) to a known SimpleSwap hub wallet (0xbb...3aeaf) used to extract funds to a known Binance address (0xe7804c37c13166ff0b37f5ae0bb07a3aebb6e245) [5].

0
1
Reported Addresses
Reported Address
QuickSwap DNS Hacker
0x83927acf1a3f69f9fd2ed055fff424a49cda0c5d
Reported Address
Intermediary (QS DNS)
0xd283ff9b237094643b07abb72b5cce8bb82d2de5
Reported Address
Bridging Hub (QS DNS)
0x630ec4d630898b71d8e7dfa5b6280d5058ed3ab2

+ 5 more

Impersonation Scam

2

Got into this shitcoin https://bscscan.com/token/0x773b532126b9f307665942b0fa4cda0540cedb71. Went well, the dev gained the trust of the community, then in the 1st week of December the dev told that the contract needed to be migrated. Hence, after clicking on "migrate" a metamask pop-up opened, but the prompt wasn't to migrate from Booster token v1 to v2, but the TX was about selling the most valuable coin in my wallet. I confirmed the TX, immediately being prompted that there was an error - the prompt was from the website, not from metamask - and then I've clicked on migrate again and confirmed the transaction (selling another token from my wallet). After receiving the MM confirmation from my 1st TX, I've already knew that my money was gone. After he swapped my tokens to BNB, they were sent to: 0xbb3fd383d1c5540e52ef0a7bcb9433375793aeaf this is a simpleswap wallet. I've found out about this after contacting Binance to look into this. The support team told me that they can not do anything. Based on the comments on both bscscan and etherscan, it seems that 0xbb3fd383d1c5540e52ef0a7bcb9433375793aeaf is used by at least one bad actor. Additionally: this is rug pull https://bscscan.com/address/0x36c6196310027c36ee2cbb487715cf4795755f87 is also tied with the 0xbb3fd383d1c5540e52ef0a7bcb9433375793aeaf wallet.

0
2
Reported Address
Reported Address
0xbb3fd383d1c5540e52ef0a7bcb9433375793aeaf

Reports by Category

Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo