Observation and Analysis - The Fake Cheetah 观察与分析之诈骗 🔍

IMG_0064.JPG
Eclipse of 2016 二零一六的月蚀


Update: @sallybeth23 and @birudanak are victims of the scam. It's possible the other names listed are also victims. It means the scam is not new. It already exists for at least one month.

更新: sallybeth23和birudanak都是钓鱼骗局的受害者。估计其他人也都是受害者。看来这个骗局至少持续了一个月了。


Recently, @twinkledrop's account was phishing attached by @cheetoh. I searched the memo of the bittrex transfers and found that following accounts might be related to @cheetoh:

@sallybeth23, @birjudanak, @steemmatt, @angrysage, @albertbongers used the same memo of 612036a11c5c4b2ead6 before. 612036a11c5c4b2ead6 is the memo that @cheetoh to transfer @twinkledrop's money to @bittrex.

Furthermore, @sallybeth23 used 78ed9a0b0de34a96995 before. The same memo was also used by @dansononlife and @altermaker.

@birjudanak also used memos of bd4b4f58f6424813b39 and 6c433485aac646ae931. The first memo never used by other account. They second memo used by @albertbongers before.

Therefore, these accounts might be related. Today I don't have time to do more research. If any of you are interested, you may want to start from there.


最近 @twinklesong的账号 @twinkledrop遭受假猎豹的钓鱼袭击被盗号盗款。一个叫做 @cheetoh伪装成 @cheetah,在受害者帖子里留言中加入恶意链接并伪装成Steemit页面。受害者输入密码后,袭击者修改密码并把存款转入bittrex。

通过SteemSQL,可以看到骗子把受害者的六百多SBD转移到 @bittrex,memo是612036a11c5c4b2ead6。查询这个memo,可以找到以下记录:

Screen Shot 2017-10-22 at 11.47.13 PM.png

记录显示, @sallybeth23, @birjudanak, @steemmatt, @angrysage, @albertbongers都使用过同一个memo转款到 @bittrex

查询一下 @sallybeth23转款到 @bittrex发现此号还用过另外一个memo:78ed9a0b0de34a96995。查询这个memo发现还有两个账号使用过这个memo: @dansononlife, @altermaker
Screen Shot 2017-10-22 at 11.51.54 PM.png

查询 @birjudanak,发现它还使用过 bd4b4f58f6424813b396c433485aac646ae931。其中第一个memo其他人没有使用过,第二个memo @albertbongers使用过。

所以跟 @cheetoh相关的账号可能有:

我今天没有时间继续研究。大家谁有兴趣可以继续挖。


加勒比海系列


更多系列游记


数据、观察、分析系列


技术系列


© Copyright 所有照片与文字皆为 @nationalpark原创。All photos taken by @nationalpark. All rights reserved.

H2
H3
H4
3 columns
2 columns
1 column
15 Comments