downshift pfp
downshift
@downshift.eth
how does an attacker spoof an ENS like this?
13 replies
2 recasts
9 reactions

Adam pfp
Adam
@
I dont think they can..and if so then this would be bad. But I never said his drop was bad. His was a good one, it just was stolen from me. I think you misunderstood me.
2 replies
0 recast
1 reaction

Matthew Fox 🌐 pfp
Matthew Fox 🌐
@matthewfox
dafuq
1 reply
0 recast
1 reaction

Angel - Not A Bot pfp
Angel - Not A Bot
@sayangel
My guess at what happened here: - Scam token and contract created - In Transfer function the SC emits an event where the β€œfrom” address is always vitalik’s address - polygonscan and wallet are using the event as source of truth I bet if you look at the tx the address that initiated the address is not the same as the β€œFrom” in the token transfer summary
2 replies
1 recast
8 reactions

RJ (replyor) pfp
RJ (replyor)
@shulzzz
@athxna.eth this is what i was talkin bout earlier that i had seen
1 reply
0 recast
2 reactions

rathermercurial pfp
rathermercurial
@rathermercurial.eth
Huh. I ran into a spearphishing bot doing this and wondered how long it would take before this happened. Seems like the attacker sends a bogus coin to Vitalik's address which they can arbitrarily transfer as the Admin (collateral tokens do this for legitimate reasons, for example).. Then they simply transfer it to the target. They can also design it to mimic a normal, expected transaction, using a ticker like $USDC to fool the target into thinking it was an expected payment.
0 reply
0 recast
2 reactions

Apex777 pfp
Apex777
@apex777.eth
/microsub tip: πŸ–x639
0 reply
0 recast
0 reaction