A look at the mind of a "ETH Giveaway" Twitter swindler


Crypto Pet Peeves – Twitter Scam Bots

Ethereum's scam bots are the spearhead of any cryptocurrency user on Twitter, with these malicious accounts invading the tweet comment sections. Almost everyone in this nascent community has seen them, but for those who do not know what these robots are, here's an explanation.

These so-called "scammers" are fraudulent Twitter accounts that present themselves as celebrities, entrepreneurs or cryptocurrency personalities to collect attention or cryptocurrency. The most notable cases of these scams are the Twitter scams that "give away ETH", with scammers asking users to send a certain amount of Ether to an address, in exchange for a substantially larger payment. Obviously, none of these requests is ever received, because the unfortunate few who send their funds to the addresses never receive anything in return.

As reported by Ethereum World News, cybersecurity researchers have recently discovered that there were more than 15,000 individual accounts dedicated to collecting cryptocurrency scammed. Although this figure is not able to tell the whole story, with robots being banned to the right and left, the search for Duo Security has invested 88 million Twitter accounts, so the company's claims have at least a little bit of credibility.

These annoying scam robots have become so widespread that Vitalik Buterin, a well-known co-founder of Ethereum, had to change his username to set up his account in addition to scam accounts. In addition to changing his name, the co-founder of Ethereum even called Jack Dorsey, CEO of Twitter, to solve the problem.

In addition, this problem not only has affected well-known people in the crypto community, but has also impressed traditional celebrities, with accounts created in the image of Elon Musk's Twitter page that are displayed on an almost daily basis. In fact, these stories have become so common that Elon Musk himself recognized them, making fun of the concept of "Swap" in the following tweet.

While the extension of these scams is easily evident, little is known about the operation itself or about the people behind it. of it. But as reported by Boing Boing, Adam Guerbuez, a cryptocurrency evangelist, has recently received some insights into this whole defeat of the scammer.

Up Close And Personal with an operator of Scam Bot

Guerbuez, the predicted crypto-evangelist and personality, met for the first time this form of cryptocurrency scam on his Twitter, with an account that promises his followers "free "Ethereum. Guerbuez clearly knew that the tweet was done maliciously, out of curiosity, he asked the scammer if they could discuss the whole operation.

Strangely enough, the scammer agreed, probably due to the fact that the operator was a big fan of Guerbuez's social media. According to the unnamed individual, these scams can cash up to $ 50,000 a day, with a good day potentially pulling in the incredible $ 100,000 of Ethereum. Even if the claims were not supported by any evidence, taking into account the prevalence of these scams, it is more than likely that these figures are well justified.

The scammer has continued to explain the internal workings of his / their / their operations, adding that the robots are managed by small teams that make use of the help of many automated practices. The scammer wrote:

"Well, the process from the generation of accounts, to tweeting to the rotation of the ETH wallet address is all done automatic by our robots. manual is cash out. "

Closing the interview, the scammer, referred to as" ETHGiveaway "by Boing Boing, explained that the accounts verified by Twitter (the accounts with a blue check mark next to their name) while they cost upwards of $ 1,000, no longer needed for scammers, because "mooches (cheated individuals) will send ETH to any account we make."

Although Twitter could do its best to repress these scams, it is still evident that these fraudulent accounts are as common as ever in this nascent cryptosphere.

Photo of Marius Ciutacu on Unsplash

Source link