375 Scam Reports

For security reasons and to protect investigations, this report is currently only shared with Law Enforcement Partners.

Contract Exploit Scam

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce pellentesque vulputate iaculis. Integer lacus sapien, auctor quis nisi non, pulvinar accumsan ligula. Vivamus quis odio ut est iaculis lobortis ut eu leo. Nam mattis varius gravida. Vivamus aliquet vestibulum ex et rutrum. Mauris eu tempor mi, ac porttitor magna. Etiam id fermentum orci, et malesuada lacus. Morbi facilisis malesuada hendrerit. Fusce eu magna auctor, fringilla libero eget, sodales elit.

0
Reported Addresses
Reported Address
Ethereum logo
address-1
Reported Address
Ethereum logo
address-2
Reported Address
Ethereum logo
address-3

+ 1 more

Contract Exploit Scam

1

The creator of the token (Ayylmao, since the exploit/theft people have said he is a known serial scammer on Hedera formerly known in Discord community as 'bheing') said he's made a coinflip Dapp for his Sauceinu token (refer to screenshots uploaded of DMs). People who used it had to approve a very large allowance for the token they are playing with, and those who questioned how secure it was were told its very secure by him as hes done similar stuff on Etherium chain. He releases the Dapp a few days before his announcement that a new devleoper has joined their team (out of the blue, no one knew this, and he use to say to keep costs down, hes going to be the main developer). Then a couple weeks later anyone who connected and apporved allowance to play the game had all the tokens they approved stolen from their wallet exploiting the high allowance approval coded into the Dapp by Ayylmao (but Ayylmao fabricated a story that the new dev went behind his back and changed code to have that exploit and a 'taketoken' function added into the source code). After stealing the tookens from many people, the thief dumped/sold all tokens on Saucerswap for Hbar and then cashed out through Gate.io (this is where most of my losses have occurred as the dump has tanked the vlaue of the token and hence my remaning investmet held in another account). You can follow the transactions on Hashscan (he used 2 or 3 accounts to conduct the theft). The new dev has apparantly been doxxed by Ayy (within a day of the exploit and theft) as being someone by the name of Alberto Mira (not sure if this is a real person or an Alias of his - https://es.linkedin.com/in/alberto-mira-5089ba269 ). Ayylmao's story is that he gave Alberto an ultimatum to return the stolen USD value of the funds back to him so he can return it to the people affected. Which obviously never happened, and Ayylmao now says hes working with Spanish Authorities to find Alberto (even if Albertos Linkedin says hes working in the USA.....) Some people have been reimbursed by Ayylmao in the Sauceinu tokens they had stolen, but that does not equate to the USD value lost and stolen from them.

0
1
Reported Address
Reported Address
Hedera logo
0.0.3396063

Contract Exploit Scam

1

Hacks of vulnerable binance pools following disclosure.

0
1
Reported Addresses
Reported Address
Ethereum logo
exploiter
0xB23711b9D92C0f1c7b211c4E2DC69791c2df38c1
Reported Address
Ethereum logo
exploiter
0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b
Reported Address
Ethereum logo
exploiter
0x429313e53a220c4a5693cad1da26ae5045b5762f

Contract Exploit Scam

1

All ETH send to unknown address without my approval

0
1
Reported Address
Reported Address
Ethereum logo
0x820f63a6c112385526948299a24e92fd872c0c79

Contract Exploit Scam

1

Balancer, an AMM-based DEX running on multiple chains including Ethereum, Optimism, and Fantom, was exploited on August 27, 2023. The attacker exploited the Balancer V2 liquidity pools in multiple transactions via a flashloan attack.

0
1
Reported Address
Reported Address
Ethereum logo
0xEd187F37E5Ad87d5b3B2624C01dE56C5862b7a9B

Contract Exploit Scam

1

Star Token (STV) is a BEP20 token traded on PancakeSwap. On August 26, 2023, an attacker exploited a vulnerability in STV's unverified smart contract by manipulating the price.

0
1
Reported Address
Reported Address
Binance Smart Chain logo
0x4b44B52EF15f7Aab9A0A6cFDfa8D2c5Eeeb6d8C3

Contract Exploit Scam

1

EthereumHive, a project running on the Ethereum chain, was exploited on August 21, 2023, through a reentrancy attack. The attacker used a rewarding issue in the EHIVE token's smart contract which allowed stakes with zero amount. They created multiple contracts and staked 0 EHIVE tokens from each of them. By calling stake and unstake immediately in each contract, the attacker increased reward amounts, ultimately minting 744 million EHIVE tokens. These tokens were exchanged for over 9 ETH, equivalent to 15,569 USD. The stolen funds were deposited into TornadoCash.

0
1
Reported Address
Reported Address
Ethereum logo
0x0195448a9c4ADEaF27002C6051C949f3C3234bb5

Contract Exploit Scam

1

bvbvbbbbbv

0
1
Reported Address
Reported Address
Bitcoin logo
1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX

Contract Exploit Scam

1

The attacker exploited a bug in a smart contract. The contract was designed to hold liquidity to enable a flash-loan based strategy for arbitraging the price of rocket ether between the rocket pool protocol price and the market price, involving swapping up to 32 rETH held by the contract for WETH via 1inch and minting new rETH to replenish the contract balance. There was a bug in the contract's check that the 32 rETH balance was fully replenished by the end of the transaction. The attacker created a fake liquidity pool and fake 1inch swap data to execute a swap with an extremely low price that drained the contract's liquidity returning only a tiny amount of WETH, and then abused the bug in the final check to ensure the transaction succeeded. The attacker also burned the rETH they drained with the rocket pool protocol to obtain approximately 34.6 ETH, which they then transferred over multiple transactions and addresses that can be traced to ultimately land in one of several exchanges including Binance, OKX, and KuCoin.

0
1
Reported Addresses
Reported Address
Ethereum logo
0xB7E10257882755f3847ebF3326F07bF97413Ef49
Reported Address
Ethereum logo
0x900E0E4f64A079F89F8034c0e9F8EE1258bc8C26
Reported Address
Ethereum logo
0xFC390B3d8DD5F9ddC18267C8990aB95a75b1D52d

+ 8 more

Contract Exploit Scam

1

I played a new game that looksrare came out with called yolo I won and was paid eth but after my $1385 usdc was gone. Looksrare claims they don't ask for usdc permission so they claim it's not related to their site but it happened at same time and I didn't sign other contracts in weeks.

0
1
Reported Domain
Reported Domain

https://looksrare.org/yolo?utm_source=website&utm_source=banner&utm_campaign=yolo_launch

Contract Exploit Scam

1

Suspicious Transaction happening on Tornado router. Leading to known exploiter.

0
1
Reported Address
Reported Address
Ethereum logo
0xd90e2f925DA726b50C4Ed8D0Fb90Ad053324F31b

Contract Exploit Scam

1

The orbiter.finance is bridge. They was added new usdc contract the same day 11.08 or maybe a day before this day,for bridging to another chains! So the user want to bridge Usdc from the ZkSync Network to another chain Starknet ,but the Orbiter cross chain was under attack! As the attacker/s target was the cross chain, the user lost the USDC! 1. On June 1, 2023, the Discord server of Orbiter Finance was attacked, 2. On June 24, 2023, the Twitter account was attacked

0
1
Reported Domain
Reported Domain

orbiter.finance

Contract Exploit Scam

1

A malicious address was given an unlimited token allowance. Zero Transfer Attacks I revoked the addresses.

0
1
Reported Address
Reported Address
Binance Smart Chain logo
Zero-Value
0x25380d5311e505d77c5d1ef2f9da904ed437c74a

Contract Exploit Scam

1

MetaLabz -  Insufficient Function Access Control

0
1
Reported Address
Reported Address
Binance Smart Chain logo
MetaLabz exploiter
0xf576c7f17bc5a834f8bfe6f810a09eb44818c739

Contract Exploit Scam

1

0xd61492 - Insufficient Function Access Control

0
1
Reported Address
Reported Address
Arbitrum logo
0xd61492 attacker
0x826b180cd3d6fd0a646875f920bb2cf52b7f0b0b

Reports by Chain

Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo
Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo