Author

Topic: The dilema of the scammer that scammed thieves (Read 115 times)

legendary
Activity: 2954
Merit: 1153
This kind of story looks fun.  The scammer is phishing those people who are greedy enough to take the bait.  Any article link for this story?  I am curious about how much this scammer made from this trick.  Btw, the thieves don't have a chance on moving those USDT because it was frozen under a contract.
full member
Activity: 305
Merit: 106
Hacker is using frozen token which be moved but it has value since it's listed on CMC. I encounter this bait wallet trick using Minereum token before. I still got the wallet address and private of scam wallet. I will try to recover it and share it here to see it in actual.

Dug a little deeper and seems you were wright. It did not make sense at the time but after I got some more info I understood. This scam does mostly use Minereum.
Even if you build a faster/better bot apparently Minereum is coded in such a way that you can send only 106 coins at time. So scammer can't lose the full amount...
https://bitfalls.com/2018/04/13/creative-new-scam-honeypot-private-key/

Seems that was what I was missing from the story
hero member
Activity: 2296
Merit: 506
Cryptocasino.com
The idea is:

If I have, for example, 500 USDT and 0.1 ETH in my wallet and propagate 2 transactions:
    - tx #1 send 500 USDT with fee 0.1 ETH
    - tx #2 send 0.01 ETH with fee 0.09ETH

Why would the second tx confirm first ?


So, how do you know that if the second transaction will be confirmed first? is not it depend on the how much gas price and gwei that already used by both of transactions?
As far as i know sending ethereum will be triggering less fees compared when you are sending ERC20 assets.
In this case GWEI and GAS PRICE for the second transaction will be so much bigger compared with the first transaction and that's why second transaction will be confirmed first.
legendary
Activity: 1932
Merit: 4602
Buy on Amazon with Crypto
There is a story of a/some guy(s) that leaked their wallet info on purpose to scam scammers.

They had some USDT on their wallet but no ETH for fees. So when potential thieves sent ETH to that wallet to withdraw the stable coins his bot would automaticaly send the ETH to another wallet. The story is fun and all but fails to fully make sense in my opinion:

Example:

So wallet owner has 1000 USDT in wallet A
Thive sends 0.1 ETH to wallet A
Bot sends 0.05 ETH from wallet A to wallet B with 0.05 ETH fees

The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
The scammer places tokens on his address and publishes the private key. The Ethereum ecosystem is designed so that it takes more gas to send tokens than to send Ethereum coins. Therefore, the transaction for sending coins and not tokens will always be processed in priority.
I think that only the owner of the mining pool can take the money, which will change the order of transactions.
sr. member
Activity: 1330
Merit: 257
DGbet.fun - Crypto Sportsbook
This scenario is very famous before but the token they are using to attract thieves is frozen which is impossible to transfer.

How come impossible to transfer ?

Hacker is using frozen token which be moved but it has value since it's listed on CMC. I encounter this bait wallet trick using Minereum token before. I still got the wallet address and private of scam wallet. I will try to recover it and share it here to see it in actual.

quite interesting info that you will provide, I am waiting for a trick from you where I also have the token you mentioned,
full member
Activity: 305
Merit: 106
You're missing something here. Once the automation contract already deployed and the bot will be automatically sending any eth into the destination wallet that already programmed. Human can't compete with the bot that automated the transaction to send any ethereum that being sent to the address that already programmed for that. I have seen this scenario in the past and in so many cases even when people tried that to sent it in seconds and bot may be programmed to sent it into the milisecond or destination address can't be change. The bot will always put it back like before the hacker or scammer change the wallet.

Millisecond or not, the next block is in 20 seconds so an experienced guy would have time or maybe has a bot of his own.

Hacker is using frozen token which be moved but it has value since it's listed on CMC. I encounter this bait wallet trick using Minereum token before. I still got the wallet address and private of scam wallet. I will try to recover it and share it here to see it in actual.

Why would a frozen token have any value and why would it be listed on CMC. What you're saying does not make sense

Some token contract has locking mechanisms and it was coded in such a way that only the dev has the ability to unlock it.

Same as above. Such a token would have 0 value and would not appeal to anyone

The idea is:

If I have, for example, 500 USDT and 0.1 ETH in my wallet and propagate 2 transactions:
    - tx #1 send 500 USDT with fee 0.1 ETH
    - tx #2 send 0.01 ETH with fee 0.09ETH

Why would the second tx confirm first ?

member
Activity: 252
Merit: 12
All I see here is greed, even someone who is not into scamming can come by a recovery seed and decide to take a look inside, they can be tempted to cater away with the owner's assets, but my own way is 'nothing is free in this world' if you can think this first then you will be tempted less, its easier to go into crime even if its against your will.
copper member
Activity: 2940
Merit: 1280
https://linktr.ee/crwthopia
Hmm. I thought of this as something that you would be careful with because it might come back to you as regretful if you have balance. You somehow had a balance in your wallet, and it might go ugly if your bot is not fast enough in terms of connection to the blockchain.

Maybe have something like a blocker or something? Could it make it look like you have already transacted?

This wouldn't work with ETH because it will be used already for fees.
legendary
Activity: 2114
Merit: 1150
https://bitcoincleanup.com/
~
How come impossible to transfer ?
Some token contract has locking mechanisms and it was coded in such a way that only the dev has the ability to unlock it.
hero member
Activity: 2366
Merit: 504
The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
You're missing something here. Once the automation contract already deployed and the bot will be automatically sending any eth into the destination wallet that already programmed. Human can't compete with the bot that automated the transaction to send any ethereum that being sent to the address that already programmed for that. I have seen this scenario in the past and in so many cases even when people tried that to sent it in seconds and bot may be programmed to sent it into the milisecond or destination address can't be change. The bot will always put it back like before the hacker or scammer change the wallet.
full member
Activity: 305
Merit: 106
This scenario is very famous before but the token they are using to attract thieves is frozen which is impossible to transfer.

How come impossible to transfer ?
legendary
Activity: 2114
Merit: 1150
https://bitcoincleanup.com/
~

The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
I'm guessing the bot is also connected to gas trackers and automatically adjust fees to the fastest/highest in order for the transaction to be confirmed in the next block. By the time the thief is finished setting up the 0.1 ETH fee, the bot is probably done emptying the wallet.

The thief's option is to set up a bot of his own but I don't know if that's possible in one wallet.
full member
Activity: 305
Merit: 106
There is a story of a/some guy(s) that leaked their wallet info on purpose to scam scammers.

They had some USDT on their wallet but no ETH for fees. So when potential thieves sent ETH to that wallet to withdraw the stable coins his bot would automaticaly send the ETH to another wallet. The story is fun and all but fails to fully make sense in my opinion:

Example:

So wallet owner has 1000 USDT in wallet A
Thive sends 0.1 ETH to wallet A
Bot sends 0.05 ETH from wallet A to wallet B with 0.05 ETH fees

The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
Jump to: