Site icon Check Point Blog

How Hackers Run Token Scams to “Rug Pull” Money

In a new publication, Check Point Research (CPR) shows how scammers misconfigure smart contracts to create fraudulent tokens. The report details the method scammers are currently using to “rug pull” money from people and provides examples of smart contract misconfigurations that can lead to money heists. The findings build on top of previous cryptocurrency research from CPR. Last October, CPR identified theft of crypto wallets on OpenSea, the world’s largest NFT marketplace. And last November, CPR revealed that hackers were using search engine phishing campaigns to steal half a million dollars in a matter of days.

In a new report, Check Point Research (CPR) exposes how hackers are creating malicious tokens to steal money.

What Scam Coins Look Like

The How: Misconfigure Smart Contracts

To create fraudulent tokens, hackers misconfigure smart contracts. Smart contracts are programs stored on a blockchain that run when predetermined conditions are met. CPR outlines the steps that hackers take advantage of smart contracts:

  1. Leverage scam services. Hackers are usually using scam services to create the contract for them, or they copy an already known scam contract and modify the token name and symbol, and some of the function names as well if they are really sophisticated.
  2. Manipulate functions. Then they will manipulate the functions with the money transfer, they will prevent you from selling, or increase the fee amount  and more. Most of the manipulations will be where money is been transferred
  3. Create hype via social media. Then they will open social channels, such as Twitter/discord/telegram, without revealing their identity or using fake identity of  other people, and they will start hyping the project in order for people to start buying
  4. “Rug and pull” the money. After they reach the amount of money they want, they will pull all the money from the contract, and delete all the social media channels.
  5. Skip timelocks. You usually won’t see those tokens lock a large amount of money in the contract pool, or even add timelock to the contract. Timelocks are mostly used  to delay administrative actions and are generally considered a strong indicator that a project is legitimate

Tips to Avoid Scam Coins

Check Point Research is investing significant resources into studying the intersection of cryptocurrencies and security. Last year, we identified the theft of crypto wallets on OpenSea, the world’s largest NFT marketplace. Last year, we also alerted crypto wallet users of a massive search engine phishing campaign that resulted in at least half a million dollars being taken in a matter of days. In our latest publication, we show how fraud of actual smart contracts look like, and expose real token fraud in the wild: a) hiding 100% fee functions and then b) hiding backdoor functions. The implication is that crypto users will continue to fall into these traps, and will lose their money. Our aim with this publication is to alert the crypto community that scammers are, indeed, creating fraudulent tokens to steal funds. To avoid scam coins, I recommend crypto users to diversify their wallets, ignore ads and test their transactions.

Exit mobile version