Bitcoin Forum
May 08, 2024, 11:27:04 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: The dilema of the scammer that scammed thieves  (Read 93 times)
Chlotide (OP)
Full Member
***
Offline Offline

Activity: 305
Merit: 106



View Profile
May 05, 2022, 06:56:43 AM
 #1

There is a story of a/some guy(s) that leaked their wallet info on purpose to scam scammers.

They had some USDT on their wallet but no ETH for fees. So when potential thieves sent ETH to that wallet to withdraw the stable coins his bot would automaticaly send the ETH to another wallet. The story is fun and all but fails to fully make sense in my opinion:

Example:

So wallet owner has 1000 USDT in wallet A
Thive sends 0.1 ETH to wallet A
Bot sends 0.05 ETH from wallet A to wallet B with 0.05 ETH fees

The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
1715210824
Hero Member
*
Offline Offline

Posts: 1715210824

View Profile Personal Message (Offline)

Ignore
1715210824
Reply with quote  #2

1715210824
Report to moderator
1715210824
Hero Member
*
Offline Offline

Posts: 1715210824

View Profile Personal Message (Offline)

Ignore
1715210824
Reply with quote  #2

1715210824
Report to moderator
1715210824
Hero Member
*
Offline Offline

Posts: 1715210824

View Profile Personal Message (Offline)

Ignore
1715210824
Reply with quote  #2

1715210824
Report to moderator
The Bitcoin network protocol was designed to be extremely flexible. It can be used to create timed transactions, escrow transactions, multi-signature transactions, etc. The current features of the client only hint at what will be possible in the future.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715210824
Hero Member
*
Offline Offline

Posts: 1715210824

View Profile Personal Message (Offline)

Ignore
1715210824
Reply with quote  #2

1715210824
Report to moderator
1715210824
Hero Member
*
Offline Offline

Posts: 1715210824

View Profile Personal Message (Offline)

Ignore
1715210824
Reply with quote  #2

1715210824
Report to moderator
1715210824
Hero Member
*
Offline Offline

Posts: 1715210824

View Profile Personal Message (Offline)

Ignore
1715210824
Reply with quote  #2

1715210824
Report to moderator
Bttzed03
Legendary
*
Offline Offline

Activity: 2114
Merit: 1149


https://bitcoincleanup.com/


View Profile
May 05, 2022, 07:15:55 AM
 #2

~

The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
I'm guessing the bot is also connected to gas trackers and automatically adjust fees to the fastest/highest in order for the transaction to be confirmed in the next block. By the time the thief is finished setting up the 0.1 ETH fee, the bot is probably done emptying the wallet.

The thief's option is to set up a bot of his own but I don't know if that's possible in one wallet.
Chlotide (OP)
Full Member
***
Offline Offline

Activity: 305
Merit: 106



View Profile
May 05, 2022, 07:16:22 AM
 #3

This scenario is very famous before but the token they are using to attract thieves is frozen which is impossible to transfer.

How come impossible to transfer ?
Psynthax
Hero Member
*****
Offline Offline

Activity: 2296
Merit: 504



View Profile
May 05, 2022, 07:20:49 AM
 #4

The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
You're missing something here. Once the automation contract already deployed and the bot will be automatically sending any eth into the destination wallet that already programmed. Human can't compete with the bot that automated the transaction to send any ethereum that being sent to the address that already programmed for that. I have seen this scenario in the past and in so many cases even when people tried that to sent it in seconds and bot may be programmed to sent it into the milisecond or destination address can't be change. The bot will always put it back like before the hacker or scammer change the wallet.

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
Bttzed03
Legendary
*
Offline Offline

Activity: 2114
Merit: 1149


https://bitcoincleanup.com/


View Profile
May 05, 2022, 07:29:05 AM
 #5

~
How come impossible to transfer ?
Some token contract has locking mechanisms and it was coded in such a way that only the dev has the ability to unlock it.
crwth
Copper Member
Legendary
*
Offline Offline

Activity: 2758
Merit: 1251


Try Gunbot for a month go to -> https://gunbot.ph


View Profile WWW
May 05, 2022, 07:34:53 AM
 #6

Hmm. I thought of this as something that you would be careful with because it might come back to you as regretful if you have balance. You somehow had a balance in your wallet, and it might go ugly if your bot is not fast enough in terms of connection to the blockchain.

Maybe have something like a blocker or something? Could it make it look like you have already transacted?

This wouldn't work with ETH because it will be used already for fees.

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
Daodex
Member
**
Offline Offline

Activity: 252
Merit: 12


View Profile
May 05, 2022, 08:22:19 AM
 #7

All I see here is greed, even someone who is not into scamming can come by a recovery seed and decide to take a look inside, they can be tempted to cater away with the owner's assets, but my own way is 'nothing is free in this world' if you can think this first then you will be tempted less, its easier to go into crime even if its against your will.

Chlotide (OP)
Full Member
***
Offline Offline

Activity: 305
Merit: 106



View Profile
May 05, 2022, 10:49:35 AM
 #8

You're missing something here. Once the automation contract already deployed and the bot will be automatically sending any eth into the destination wallet that already programmed. Human can't compete with the bot that automated the transaction to send any ethereum that being sent to the address that already programmed for that. I have seen this scenario in the past and in so many cases even when people tried that to sent it in seconds and bot may be programmed to sent it into the milisecond or destination address can't be change. The bot will always put it back like before the hacker or scammer change the wallet.

Millisecond or not, the next block is in 20 seconds so an experienced guy would have time or maybe has a bot of his own.

Hacker is using frozen token which be moved but it has value since it's listed on CMC. I encounter this bait wallet trick using Minereum token before. I still got the wallet address and private of scam wallet. I will try to recover it and share it here to see it in actual.

Why would a frozen token have any value and why would it be listed on CMC. What you're saying does not make sense

Some token contract has locking mechanisms and it was coded in such a way that only the dev has the ability to unlock it.

Same as above. Such a token would have 0 value and would not appeal to anyone

The idea is:

If I have, for example, 500 USDT and 0.1 ETH in my wallet and propagate 2 transactions:
    - tx #1 send 500 USDT with fee 0.1 ETH
    - tx #2 send 0.01 ETH with fee 0.09ETH

Why would the second tx confirm first ?

TribalBob
Sr. Member
****
Offline Offline

Activity: 1288
Merit: 257


Chainjoes.com


View Profile
May 05, 2022, 11:27:28 AM
 #9

This scenario is very famous before but the token they are using to attract thieves is frozen which is impossible to transfer.

How come impossible to transfer ?

Hacker is using frozen token which be moved but it has value since it's listed on CMC. I encounter this bait wallet trick using Minereum token before. I still got the wallet address and private of scam wallet. I will try to recover it and share it here to see it in actual.

quite interesting info that you will provide, I am waiting for a trick from you where I also have the token you mentioned,

█▀▀▀










█▄▄▄
CHAIN JOES
▀▀▀█










▄▄▄█
█▀▀▀










█▄▄▄
|
▀▀▀█










▄▄▄█
📝
zasad@
Legendary
*
Offline Offline

Activity: 1750
Merit: 4283



View Profile WWW
May 05, 2022, 12:00:37 PM
 #10

There is a story of a/some guy(s) that leaked their wallet info on purpose to scam scammers.

They had some USDT on their wallet but no ETH for fees. So when potential thieves sent ETH to that wallet to withdraw the stable coins his bot would automaticaly send the ETH to another wallet. The story is fun and all but fails to fully make sense in my opinion:

Example:

So wallet owner has 1000 USDT in wallet A
Thive sends 0.1 ETH to wallet A
Bot sends 0.05 ETH from wallet A to wallet B with 0.05 ETH fees

The question I have is couldn't the thieve make another transaction sending all the USDT and using all of the ETH for fees, 0.1ETH, and that would mean his transaction gets confirmed first ?

Or am I missing something here?
The scammer places tokens on his address and publishes the private key. The Ethereum ecosystem is designed so that it takes more gas to send tokens than to send Ethereum coins. Therefore, the transaction for sending coins and not tokens will always be processed in priority.
I think that only the owner of the mining pool can take the money, which will change the order of transactions.

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
bittick
Hero Member
*****
Offline Offline

Activity: 2296
Merit: 506


Cryptocasino.com


View Profile
May 05, 2022, 01:56:18 PM
 #11

The idea is:

If I have, for example, 500 USDT and 0.1 ETH in my wallet and propagate 2 transactions:
    - tx #1 send 500 USDT with fee 0.1 ETH
    - tx #2 send 0.01 ETH with fee 0.09ETH

Why would the second tx confirm first ?


So, how do you know that if the second transaction will be confirmed first? is not it depend on the how much gas price and gwei that already used by both of transactions?
As far as i know sending ethereum will be triggering less fees compared when you are sending ERC20 assets.
In this case GWEI and GAS PRICE for the second transaction will be so much bigger compared with the first transaction and that's why second transaction will be confirmed first.

Chlotide (OP)
Full Member
***
Offline Offline

Activity: 305
Merit: 106



View Profile
May 05, 2022, 07:53:57 PM
 #12

Hacker is using frozen token which be moved but it has value since it's listed on CMC. I encounter this bait wallet trick using Minereum token before. I still got the wallet address and private of scam wallet. I will try to recover it and share it here to see it in actual.

Dug a little deeper and seems you were wright. It did not make sense at the time but after I got some more info I understood. This scam does mostly use Minereum.
Even if you build a faster/better bot apparently Minereum is coded in such a way that you can send only 106 coins at time. So scammer can't lose the full amount...
https://bitfalls.com/2018/04/13/creative-new-scam-honeypot-private-key/

Seems that was what I was missing from the story
lionheart78
Legendary
*
Offline Offline

Activity: 2898
Merit: 1152



View Profile WWW
May 05, 2022, 09:52:27 PM
 #13

This kind of story looks fun.  The scammer is phishing those people who are greedy enough to take the bait.  Any article link for this story?  I am curious about how much this scammer made from this trick.  Btw, the thieves don't have a chance on moving those USDT because it was frozen under a contract.

▄▄███████████████████▄▄
▄█████████▀█████████████▄
███████████▄▐▀▄██████████
███████▀▀███████▀▀███████
██████▀███▄▄████████████
█████████▐█████████▐█████
█████████▐█████████▐█████
██████████▀███▀███▄██████
████████████████▄▄███████
███████████▄▄▄███████████
█████████████████████████
▀█████▄▄████████████████▀
▀▀███████████████████▀▀
Peach
BTC bitcoin
Buy and Sell
Bitcoin P2P
.
.
▄▄███████▄▄
▄████████
██████▄
▄██
█████████████████▄
▄███████
██████████████▄
███████████████████████
█████████████████████████
████████████████████████
█████████████████████████
▀███████████████████████▀
▀█████████████████████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀

▀▀▀▀███▀▀▀▀
EUROPE | AFRICA
LATIN AMERICA
▄▀▀▀











▀▄▄▄


███████▄█
███████▀
██▄▄▄▄▄░▄▄▄▄▄
████████████▀
▐███████████▌
▐███████████▌
████████████▄
██████████████
███▀███▀▀███▀
.
Download on the
App Store
▀▀▀▄











▄▄▄▀
▄▀▀▀











▀▄▄▄


▄██▄
██████▄
█████████▄
████████████▄
███████████████
████████████▀
█████████▀
██████▀
▀██▀
.
GET IT ON
Google Play
▀▀▀▄











▄▄▄▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!