Bitcoin Forum
June 30, 2024, 08:28:54 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [PHISHING][SCAM]Stellar airdrop by Bitcointalk Center  (Read 227 times)
witcher_sense (OP)
Legendary
*
Offline Offline

Activity: 2394
Merit: 4372


🔐BitcoinMessage.Tools🔑


View Profile WWW
May 06, 2020, 08:33:49 AM
Merited by Symmetrick (2), nutildah (1), cryptoaddictchie (1)
 #1

Recently, I have recieved an email from a guy who call himself "Bitcointalk Center, and I was a bit confused because it's been a while since I last participated in any airdrop, especially stellar (XLM) one.
You can see a picture of this letter:


In the google form above I found some instructions regarding how to claim 7.500 XLM and the link to suspicious website, which is not official to Stellar company:

Code:
https://stellar-company.com/
http://web.archive.org/web/20200506082957/https://stellar-company.com/

In order to recieve airdrop you have to download their wallet or something like that and put there your XLM address.



I didn't install it since I have no virtual machine to run it safely and I checked it through VirusTotal and here is results:



As you can see, some engines detected trojan and I personally I believe that this whole airdrop is SCAM.
Bitcoin Center is attacking bitcointalk users to steal their private keys or something like that.
It is better for you to avoid such airdrops from unofficial websites and with use of suspicious infected wallets.
Be safe!
 




█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Raflesia
Hero Member
*****
Offline Offline

Activity: 2380
Merit: 580


_""""Duelbits""""_


View Profile WWW
May 29, 2020, 03:18:37 PM
 #2

I also just received a Stellar airdrop email just like your catch but this one only differs at the end of the website's name.

I do not understand that they continue to send spam emails to many people to get victims so they can install those that have been infiltrated by a trojan / Malware virus.

Code:
https://stellar-project.com/



I hope there are no victims by their deception with the lure of airdrop XLM.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
▄▄█▄▄░░▄▄█▄▄░░▄▄█▄▄
███░░░░███░░░░███
░░░░░░░░░░░░░
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░░░░███▄█░░░
░░██▌░░███░▀░░██▌
█░██░░███░░░██
█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀
.
REGIONAL
SPONSOR
███▀██▀███▀█▀▀▀▀██▀▀▀██
██░▀░██░█░███░▀██░███▄█
█▄███▄██▄████▄████▄▄▄██
██▀ ▀███▀▀░▀██▀▀▀██████
███▄███░▄▀██████▀█▀█▀▀█
████▀▀██▄▀█████▄█▀███▄█
███▄▄▄████████▄█▄▀█████
███▀▀▀████████████▄▀███
███▄░▄█▀▀▀██████▀▀▀▄███
███████▄██▄▌████▀▀█████
▀██▄█████▄█▄▄▄██▄████▀
▀▀██████████▄▄███▀▀
▀▀▀▀█▀▀▀▀
.
EUROPEAN
BETTING
PARTNER
sujonali1819
Legendary
*
Offline Offline

Activity: 2450
Merit: 1189


Need Campaign Manager?PM on telegram @sujonali1819


View Profile WWW
May 29, 2020, 03:37:12 PM
 #3

Ops this also happened with me too a few days ago. I have also made a thread in Beginners & Help to warn the newbies. for me, the email comes from bittrex_n @ yahoo.com this mail.

Since they asked bitcointalk username in google form, that means it is sure that someone collected a huge amount of emails from this forum and frequently sending them emails.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
.
Raflesia
Hero Member
*****
Offline Offline

Activity: 2380
Merit: 580


_""""Duelbits""""_


View Profile WWW
May 29, 2020, 11:37:58 PM
 #4

Ops this also happened with me too a few days ago. I have also made a thread in Beginners & Help to warn the newbies. for me, the email comes from bittrex_n @ yahoo.com this mail.

Since they asked bitcointalk username in google form, that means it is sure that someone collected a huge amount of emails from this forum and frequently sending them emails.

Code:
news.upbit@yahoo.com

The originating email looks different but I'm sure this is still a plot in the scamer to send spam messages throughout the emails that have been sent.

Can we prevent or filter out spam emails like this from entering the main city? annoying every time there is a notification like this spam email.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
▄▄█▄▄░░▄▄█▄▄░░▄▄█▄▄
███░░░░███░░░░███
░░░░░░░░░░░░░
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░░░░███▄█░░░
░░██▌░░███░▀░░██▌
█░██░░███░░░██
█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀
.
REGIONAL
SPONSOR
███▀██▀███▀█▀▀▀▀██▀▀▀██
██░▀░██░█░███░▀██░███▄█
█▄███▄██▄████▄████▄▄▄██
██▀ ▀███▀▀░▀██▀▀▀██████
███▄███░▄▀██████▀█▀█▀▀█
████▀▀██▄▀█████▄█▀███▄█
███▄▄▄████████▄█▄▀█████
███▀▀▀████████████▄▀███
███▄░▄█▀▀▀██████▀▀▀▄███
███████▄██▄▌████▀▀█████
▀██▄█████▄█▄▄▄██▄████▀
▀▀██████████▄▄███▀▀
▀▀▀▀█▀▀▀▀
.
EUROPEAN
BETTING
PARTNER
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!