Author

Topic: [potential scam] cryptrave.com (Read 233 times)

legendary
Activity: 3584
Merit: 5243
https://merel.mobi => buy facemasks with BTC/LTC
November 29, 2018, 07:33:24 AM
#6
I’ll take the source, it’ll be interesting to look at on my train journey today.

Also, I think plugins can gain access to downloads so there’s a chance it could go in on that route if it  doesn’t directly have a chance to go down that route.

Have you considered switching to Firefox? It’s one of the things that makes me hate the ledger nano s, that it used to use chrome (I know the device is quite secure but... chrome?)

Electrum did a much better task at making the software interface for it imo.

I've sent you a PM, i didn't want to post a link to a scam plugin out in the open... If somebody else wants the sourcecode, let me know and i'll send it to you in a PM Smiley

As for the security... Yeah, i'd probably have to switch to firefox sooner or later... I'm using chrome because i do own a ledger and a trezor, and both have apps that run as a chrom(e)(ium) plugin, plus chrome always has a recent version available @ portableapps...
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
November 29, 2018, 04:54:13 AM
#5
I’ll take the source, it’ll be interesting to look at on my train journey today.

Also, I think plugins can gain access to downloads so there’s a chance it could go in on that route if it  doesn’t directly have a chance to go down that route.

Have you considered switching to Firefox? It’s one of the things that makes me hate the ledger nano s, that it used to use chrome (I know the device is quite secure but... chrome?)

Electrum did a much better task at making the software interface for it imo.
legendary
Activity: 3584
Merit: 5243
https://merel.mobi => buy facemasks with BTC/LTC
November 29, 2018, 01:47:25 AM
#4

Thanks for pointing me towards that thread Smiley
I've just filled in an abuse report, but in order to rate that extension, it seems i would need to re-install it before i can review it...

I'm always running chrome portable, and i've completely deleted all packages belonging to the "infected" chrome installation and re-downloaded a clean chrome portable package...

I'm actually wondering wether or not a chrome extension would ever be able to actually read and write data from/to the actual filesystem (and not just the "jail" created by chrome)... If an extension can only function within chrome, deleting chrome and resetting all passwords that were saved in chrome would suffice. If an extension has r/w access to the filesystem, i'd actually have to empty out all wallets on my system, reset all passwords in my keepass and format my complete harddisk... A daunting task to say the least..

I was actually able to download the plugin's sourcecode in case somebody is interested/willing to see what it actually does
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
November 28, 2018, 04:48:11 PM
#3
sr. member
Activity: 481
Merit: 268
November 28, 2018, 02:16:58 PM
#2
Couldnt you do a scan to check if their plug-in has some kind of trojan or another type of malware? That would be a major evidence of scam.
legendary
Activity: 3584
Merit: 5243
https://merel.mobi => buy facemasks with BTC/LTC
November 27, 2018, 01:51:43 AM
#1
What happened: I had a death in the family and wasn't paying as much attention as i usually do... I received a free no-deposit bonus from cryptrave.com. I played with their bonus and won >$1000. Everything looked and feeled pretty legit. When i tried to cash out, i was faced with an error message telling me i had to play their game before i could withdraw. Since i already played their game, i contacted support. The support guy insisted that i had to install a chrome extension and join a cashback scheme with my myetherwallet or blockchain wallet using this extension before i was eligible to withdraw. Eventough i wasn't paying attention due to the personal drama i was having, I did have the reflex to create a brand new wallet and not opening an existing (funded) one. In the end, the support guy basically said that i would only be able to withdraw my winnings IF i installed their fishy chrome extension AND logged in to myetherwallet or a blockchain wallet that was funded with at least 0.32 ETH...

Scammers Profile Link: All posts made by any account about this service have been deleted: https://cse.google.com/cse?cx=016660200577587308545%3Aesf40ml9aag&ie=UTF-8&q=cryptrave.com&sa=Google+search#gsc.tab=0&gsc.q=cryptrave.com&gsc.page=1

Reference Link: https://cse.google.com/cse?cx=016660200577587308545%3Aesf40ml9aag&ie=UTF-8&q=cryptrave.com&sa=Google+search#gsc.tab=0&gsc.q=cryptrave.com&gsc.page=1
Amount Scammed: none (hopefully, i still have to dig trough the plugin's sourcecode), they did try to steal 0.32 ETH if i'm correct in my assumption
Payment Method: no deposit bonus, tried to withdraw ETH
Proof of Payment: none
PM/Chat Logs: I'll edit this post and add them
Additional Notes: I urge everybody to use their due diligence and not install any chrome plugins when visiting their wallets... I'm actually a bit afraid right now, since i haven't read trough the plugin's sourcecode, so i don't know if it would have been able to steal other passwords to. At this time, i'd urge anybody to stay away from cryptrave.com untill the sourcecode of the plugin has been vetted








EDIT: when quickly scanning the sourcecode of the plugin the potential scammer tried to make me run, i found following line:
t = [];
t.BTC = "16EegrNMdZ9Rxku6Za5neEFjMW57wkQr1S", t.ETH = "0x03b70dc31abf9cf6c1cf80bfeeb322e8d3dbb4ca", t.ETC = "0x4F53C9882Ba87d2D7c525dF2aEF2540EFB6e32e5", t.BCH = "1PCh7w6LdcEv1sWd5wtvkELHcWe5HumUi3", t.LTC = "LRPChoyN8qLWENjo1dUjk2bESZjE7bQ6sP";

I can only assume i found the scammer's wallet addresses...

https://www.walletexplorer.com/wallet/116e47ec6fed4e50/addresses

https://etherscan.io/address/0x03b70dc31abf9cf6c1cf80bfeeb322e8d3dbb4ca#comments
Jump to: