Cointime

Download App
iOS & Android

Any verification process that requires users to execute code or install software should be considered suspicious, regardless of whether they have access to a wallet.

  • Wechat scan to share

according to Scam Sniffer, scammers are no longer limited to targeting cryptocurrency KOLs. They are now targeting legitimate project communities with seemingly harmless invitations. Their new marketing terms include "no need to sign anything or connect your wallet..." and "join now for real-time updates...".

Fake robot accounts to be aware of have been identified: OfficiaISafeguardRobot and SafeguardsAuthenticationBot. Pay attention to subtle spelling errors and suspicious naming patterns.

This shift in strategy indicates that scammers are adapting to users' growing awareness of phishing links and are using more complex social engineering tactics through Telegram bots.

Remember: any verification process that requires you to execute code or install software should be considered suspicious, regardless of whether it requests access to your wallet."

Comments

All Comments

There are no comments yet, why not be the first?

Recommended for you