downshift
@downshift.eth
how does an attacker spoof an ENS like this?
13 replies
2 recasts
9 reactions
Adam
@
I dont think they can..and if so then this would be bad. But I never said his drop was bad. His was a good one, it just was stolen from me. I think you misunderstood me.
2 replies
0 recast
1 reaction
Matthew Fox π
@matthewfox
dafuq
1 reply
0 recast
1 reaction
Angel - Not A Bot
@sayangel
My guess at what happened here: - Scam token and contract created - In Transfer function the SC emits an event where the βfromβ address is always vitalikβs address - polygonscan and wallet are using the event as source of truth I bet if you look at the tx the address that initiated the address is not the same as the βFromβ in the token transfer summary
2 replies
1 recast
8 reactions
RJ (replyor)
@shulzzz
@athxna.eth this is what i was talkin bout earlier that i had seen
1 reply
0 recast
2 reactions
rathermercurial
@rathermercurial.eth
Huh. I ran into a spearphishing bot doing this and wondered how long it would take before this happened. Seems like the attacker sends a bogus coin to Vitalik's address which they can arbitrarily transfer as the Admin (collateral tokens do this for legitimate reasons, for example).. Then they simply transfer it to the target. They can also design it to mimic a normal, expected transaction, using a ticker like $USDC to fool the target into thinking it was an expected payment.
0 reply
0 recast
2 reactions
Apex777
@apex777.eth
/microsub tip: πx639
0 reply
0 recast
0 reaction