O seu período de teste terminou!
Para acesso total à funcionalidade, pague uma subscrição premium
IN
Investigations by ZachXBT
https://t.me/investigations
Idade do canal
Criado
Linguagem
Inglês
Outros nomes de usuários
investigations, zachxbt
-
ER (semana)
-
ERRAR (semana)

Reports, news, & insights shared by ZachXBT

Donation address

EVM

Mensagens Estatísticas
Repostagens e citações
Redes de publicação
Satélites
Contatos
História
Principais categorias
As principais categorias de mensagens aparecerão aqui.
Principais menções
Não foram detectadas menções significativas.
Encontrado 39 resultados
758
74
21 k
If you make either of these decisions it is your own personal choice to risk funds and I will NOT help you:

1). Deposit funds in a forked DeFi protocol on a new EVM chain that later gets exploited (team did not write original code; low amount of technical skills required)

2). Get rugged by a project with very few Kaito smart followers (at least do the bare minimum due diligence to not fall victim to fake followers or meaningless buzzwords)
30.03.2025, 12:27
t.me/investigations/243
1.1 k
812
51 k
It is suspected a Coinbase user was scammed yesterday for $34.9M (400.099 BTC).

Theft address
bc1qvlustvxhqzee9tgqers4tfungrg6c0fs4u76jf

After uncovering this theft I noticed multiple other suspected thefts from Coinbase users in the past two weeks bringing the total stolen this month to $46M+. Funds from each theft were bridged from Bitcoin to Ethereum via Thorchain / Chainfllip and swapped for DAI.

60.164 BTC - Mar 26
bc1qhc72zfqwqh3e6lns5ay084k29tmqlgw75jsxec

46.147 BTC - Mar 25
bc1qd6v3220v49j0xgmycksze59z90gru46dlxg8ff

20.028 BTC - Mar 16
bc1qd59e296yyr8x4gyr53xt4yjmmgukwemetalcuf

Coinbase has not flagged any of the theft addresses from these victims in compliance tools.

Last month I posted an investigation on X about how $65M was stolen from Coinbase users in December 2024 - January 2025 and talked about how Coinbase has quietly been facing a $300M / yr social engineering scam problem affecting its users.
28.03.2025, 15:58
t.me/investigations/242
712
275
24 k
Community Alert: As Token 2049 approaches be careful of sponsors as little due diligence is done on them for conferences (just because someone is a title or platinum sponsor does not mean they are credible)

Title sponsor
-Spacecoin (botted project)

Platinum sponsor
-Bitunix (sketchy exchange)
-JuCoin (sketchy exchange)
-WEEX (sketchy exchange)
-DWF (sketchy market maker)

Note: These are the only teams I have on my radar and I suspect more would make the list

One of the easiest due diligence hacks for a centralized exchange is to verify if the team is public and has prior work history in the space. Bitunix, JuCoin, & WEEX all fail this test.

Example: In late 2023 a sketchy exchange JPEX was a Platinum sponsor for Token 2049 and the team was flagged by Hong Kong government during the conference for "suspicous features" and was later arrested after 1400 reports by victims to law enforcement and $100M+ was suspected stolen.
27.03.2025, 15:56
t.me/investigations/241
457
183
27 k
Five addresses linked to the entity who manipulated JELLY on Hyperliquid still hold ~10% of the JELLY supply on Solana ($1.9M+). All JELLY was purchased since March 22, 2025.

Hc8gNSMaQiahiRiGjUfTaW8AXudRJHeGoeGpAn8WRcwq
GffAXdcDqi8gTXEsNBMyck3DMPkaJRY1Ng2chdSRFUDC
DWr1VNg6Lsn2sANVhtWVSHMgJTNU5W4kGutDP3KyBZgA
6Ld2XDxwXcwJ4bjayeP2TAY1MepTP1zEdBVsDo3Nzmoo
G2WrQENBmsKJciQCrxce5NbWw6sEGgQMjJrFXH7MYTsv

This entity sold JELLY in the last hour from two addresses
Gm35VHcLqnpow5PCHeLMvG2krJ2deGANKfc2xAuQmept
CWvCD7EfuMu3QMTPtFb4rCF663HsD35GuW5G1xjSuaHD
27.03.2025, 00:11
t.me/investigations/240
867
416
26 k
Update: Veer Chetal (Wiz) was arrested likely as part of his involvement in the $243M Genesis creditor theft.

Here’s the mug shot:
25.03.2025, 20:04
t.me/investigations/239
3.0 k
2.6 k
38 k
I regularly have people ask me about tools I use in my investigations so here’s a comprehensive list:

Cielo - Wallet Tracking (EVM, Bitcoin, Solana, Tron, etc)
TRM - Create graphs for addresses/transactions
MetaSuites - Chrome extension that adds additional data on block explorers
OSINT Industries - email/username/phone lookups
LeakPeek - db lookups
Snusbase - db lookups
Intelx - db lookups
Spur - IP lookups
Cavalier (Hudson Rock) - Infostealer lookups
Impersonator - Chrome extension to spoof login to dApps
MetaSleuth - Similiar to TRM but intended for retail users
Arkham - Multichain block explorer, entity labels, create graphs, alerts
Obsidian - Create flow charts / diagrams
Wayback Machine - archive web pages
Archive Today - archive web pages
Etherscan/Solscan - block explorer for EVM / Solana
Blockchair - bitcoin block explorer
Range - CCTP bridge explorer
Pulsy - bridge explorer aggregator
Socketscan - EVM bridge explorer
Dune - Analytics platform to query blockchain data
Mugetsu - X/Twitter username history & meme coin lookups
TelegramDB Search Bot - Basic Telegram OSINT
Discord[.]ID - Basic Discord account info
CryptoTaxCalculator -Track PNL for an address

Note: I am not paid by these platforms to mention them and do not have referral links to share
25.03.2025, 11:27
t.me/investigations/236
1.7 k
89
23 k
Please stop trying to invite me as a speaker for conferences, podcasts, or interviews as the answer will be no.

Majority of the time they are only beneficial if you have something new to promote or can get exposure to a different audience.

You should always be skeptical of the projects who spend more time attending conferences or making podcast appearances rather than actually building their products
23.03.2025, 14:24
t.me/investigations/235
1.7 k
482
27 k
Spending long hours helping freeze funds for the Bybit hack has been eye opening.

This industry is unbelievably cooked when it comes to exploits/hacks and sadly idk if the industry is going to fix this itself unless the government forcibly passes regulations that hurt our entire industry.

Several “decentralized” protocols have recently had nearly 100% of their monthly volume/fees derived from DPRK and refuse to take any accountability.

Centralized exchanges end up being worse as when illicit funds flow through them a few take multiple hours to respond when it only takes minutes to launder.

KYT is completely flawed and easily evadable

KYC is just a honeypot for regular users bc of breaches/insiders and is useless in majority of cases due to purchased accounts.

DPRK laundering $1.4B from the recent hack has only exposed how broken it is.
18.03.2025, 13:33
t.me/investigations/234
603
289
31 k
A high confidence Tornado Cash demix for the theft reveals funds from the DPRK hack purchased 437.6B PEPE ($3.1M) on March 11, 2025 after ETH was withdrawn from Tornado Cash
0x7A7DDa0eBFF13eB014F763D05e7784B36418022F

Edit: A closer analysis reveals DPRK got rugged by using a compromised Tornado Cash UI.

Three other instances of TC withdrawals that purchased PEPE which. One of them comes from a known TC UI theft.

0x5d3a17a828aeb89729299ba5dd72200295b00df0
0x921213AB8cB18E0487B41DfFf18E39836FD19f04
0x77793F723A5538972A566D701cc7FBd32770CC96

For the $3.1M DPRK theft the TC the amounts deposited was very unique (96 X 10 ETH, 4 X 100 ETH, etc) with matching withdrawals happening minutes after the deposits.
14.03.2025, 19:37
t.me/investigations/233
868
297
26 k
A forfeiture complaint filed yesterday by US law enforcement revealed the cause for the ~$150M (283M XRP) hack of Ripple co-founder, Chris Larsen's wallet in Jan 2024 was the result of storing private keys in LastPass (password manager which was hacked in 2022).

Up to this point Chris Larsen had not publicly disclosed the cause of the theft.
7.03.2025, 17:54
t.me/investigations/232
773
270
26 k
With the announcement of the US Crypto Reserve here's your reminder that XRP addresses activated by Chris Larsen (co-founder of Ripple) still hold 2.7B+ XRP ($7.18B) and these addresses tied to him transferred $109M+ worth of XRP to exchanges in January 2025.

2.7B XRP address list from dormant addresses activated by Chris Larsen (rB5TihdPbKgMrkFqrqUC3yLdE8hhv4BdeY)
rPoJNiCk7XSFLR28nH2hAbkYqjtMC3hK2k
rD6tdgGHG7hwGTA6P39aE7W89fbqxXRjzk
rDfrrrBJZshSQDvfT2kmL9oUBdish52unH
r476293LUcDqtjiSGJ5Dh44J1xBCDWeX3
r44CNwMWyJf4MEA1eHVMLPTkZ1LSv4Bzrv
rhREXVHV938ToGkdJQ9NCYEY4x8kSEtjna

(disclaimer: multiple of these addresses have been dormant for 6-7 yrs so it's possible he lost access or sent funds to other people in Feb 2013. He was also hacked for $112M early last year)
3.03.2025, 11:55
t.me/investigations/231
533
154
21 k
An unknown victim is suspected of being hacked by Lazarus Group on Tron for ~$3.1M on Feb 28, 2025.

Theft addresses
TYQ3455gFNeqyw3sqdcWuiARq4UTMqk4D4
0xcced1276382f4dd0a6d0e73b07f43294733981ae

The funds were bridged from Tron to Ethereum and ETH was split between ten addresses before it was deposited to Tornado Cash (96 X 10 ETH, 4 X 100 ETH, 78 X 1 ETH, 5 X 0.1 ETH)

The attacker however reused a theft address from the Fantom exec hack in October 2023 which had been previously attributed to Lazarus Group as part of a spearphishing campaign in a March 2024 report published by the UN.
1.03.2025, 14:54
t.me/investigations/230
60
17
20 k
1.03.2025, 14:54
t.me/investigations/229
925
296
27 k
Fun fact: For some reason DPRK launderers like gooning while they launder funds.

>See TG account ask for help in TG group for a service due to delays

>They share txn hash revealing they are laundering from DPRK hack

>Perform OSINT on that TG account

>Realize they are in Chinese NSFW / adult TG groups

This exact scenario has happened many times
28.02.2025, 23:41
t.me/investigations/228
608
146
23 k
Notably for these attacks it is likely not the fault of either the Pump Fun or Jupiter teams.

I suspect a threat actor is social engineering employees at X with fraudulent documents / emails or a panel is being exploited.
26.02.2025, 19:19
t.me/investigations/226
425
181
28 k
The PumpDotFun X account compromise is directly connected on-chain to the Jupiter DAO Feb 2025 & DogWifCoin Nov 2024 X account compromises.
26.02.2025, 19:12
t.me/investigations/225
178
94
24 k
26.02.2025, 19:12
t.me/investigations/224
924
716
44 k
Community Alert: PumpDotFun X/Twitter account is currently compromised do not click engage with posts or click links.
26.02.2025, 18:25
t.me/investigations/223
1.3 k
466
36 k
As if this year could not get any more strange we have an entity laundering for the Bybit hack who launched / traded Pump Fun meme coins.

On Feb 22 the attacker received $1.08M from the Bybit hack to 0x363908df2b0890e7e5c1e403935133094287d7d1 who bridged USDC to Solana.

EFmqz8PTTShNsEsErMUFt9ZZx8CTZHz4orUhdz8Bdq2P bridged all of the USDC from Solana to BSC to two addresses

Both BSC addresses programatically split the USDC between 30+ addresses in many txns before consolidating the USDC to 0x0be9ab85f399a15ed5e8cbe5859f7a882c7b55a3

0x0be9 split 106K USDC between ten BSC addresses before bridging back to ten Solana addresses. A few of the addresses were dusted by meme coin scammers and the person laundering the Bybit funds the meme coins received for SOL.

15 hrs ago I made 920+ addresses receiving funds tied to the Bybit hack public and noticed a person laundering for Lazarus Group previously launched meme coins via Pump Fun.

Not posting the exact wallet for obvious reasons and had it removed from UI on multiple analytics tools.

All funds tied to the hack were then transferred to various services/exchanges.
23.02.2025, 16:05
t.me/investigations/222
433
97
28 k
23.02.2025, 16:05
t.me/investigations/221
1.3 k
326
34 k
Onchain clown of the day: The eXch team accidentally sent 34 ETH ($96K) to the hot wallet of another exchange after laundering $35M+ for Lazarus Group from the Bybit hack today.

Transaction hash
0x51b4597d74f71c59c6f5038d3cf4bc9e3b4cc21052249fb4597df8bb64f8253e
23.02.2025, 00:38
t.me/investigations/220
1.1 k
743
59 k
Lazarus Group transferred 5K ETH from the Bybit Hack to a new address and began laundering funds via eXch (a centralized mixer) and bridging funds to Bitcoin via Chainflip.

5K ETH transfer on Feb 22, 2025 6:28:23 AM
0xbf80907830e46317da2c1708a13a9f016e242f8a6db6e6b0706ea5f2328cb001

Bitcoin destination address via Chainflip
bc1qlu4a33zjspefa3tnq566xszcr0fvwz05ewhqfq
22.02.2025, 10:36
t.me/investigations/219
405
144
34 k
22.02.2025, 10:36
t.me/investigations/218
2.1 k
814
56 k
The attacker just split 10K ETH to 39 addresses. If you are an exchange or service who follows my channel blacklist these addresses on all EVM chains:

0x40e98feeebad7ddb0f0534ccaa617427ea10187e
0x30a822cdd2782d2b2a12a08526452e885978fa1d
0x6d46bd3aff100f23c194e5312f93507978a6dc91
0x660bfcea3a5faf823e8f8bf57dd558db034dea1d
0x140c9ab92347734641b1a7c124ffdee58c20c3e3
0x8c7235e1a6eef91b980d0fca083347fbb7ee1806
0xb172f7e99452446f18ff49a71bfeecf0873003b4
0xcd7ec020121ead6f99855cbb972df502db5bc63a
0x0e8c1e2881f35ef20343264862a242fb749d6b35
0x2290937a4498c96effb87b8371a33d108f8d433f
0x1bb0970508316dc735329752a4581e0a4babc6b4
0xf0a16603289eaf35f64077ba3681af41194a1c09
0x5af75eab6bec227657fa3e749a8bfd55f02e4b1d
0xb4a862a81abb2f952fca4c6f5510962e18c7f1a2
0x959c4ca19c4532c97a657d82d97accbab70e6fb4
0xb72334cb9d0b614d30c4c60e2bd12ff5ed03c305
0xfc926659dd8808f6e3e0a8d61b20b871f3fa6465
0xfa3fcccb897079fd83bfba690e7d47eb402d6c49
0x51e9d833ecae4e8d9d8be17300aee6d3398c135d
0x1eb27f136bfe7947f80d6cee3cf0bfdf92b45e57
0x83c7678492d623fb98834f0fbcb2e7b7f5af8950
0x52207ec7b1b43aa5db116931a904371ae2c1619e
0x83ef5e80fad88288f770152875ab0bb16641a09e
0x23db729908137cb60852f2936d2b5c6de0e1c887
0xaf620e6d32b1c67f3396ef5d2f7d7642dc2e6ce9
0xcd1a4a457ca8b0931c3bf81df3cfa227adbdb6e9
0x96244d83dc15d36847c35209bbdc5bdde9bec3d8
0x09278b36863be4ccd3d0c22d643e8062d7a11377
0x3a21f4e6bbe527d347ca7c157f4233c935779847
0xbc3e5e8c10897a81b63933348f53f2e052f89a7e
0x9271eddda0f0f2bb7b1a0c712bdf8dbd0a38d1ab
0x4c198b3b5f3a4b1aa706dac73d826c2b795ccd67
0x684d4b58dc32af786bf6d572a792ff7a883428b9
0xd3c611aed139107dec2294032da3913bc26507fb
0x9ef42873ae015aa3da0c4354aef94a18d2b3407b
0xbde2cc5375fa9e0383309a2ca31213f2d6cabcbd
0xe69753ddfbedbd249e703eb374452e78dae1ae49
0xe9bc552fdfa54b30296d95f147e3e0280ff7f7e6
0xbca02b395747d62626a65016f2e64a20bd254a39

Update: 10K ETH split to another 9 addresses

0xF302572594a68aA8F951faE64ED3aE7DA41c72Be
0x21032176B43d9f7E9410fB37290a78f4fEd6044C
0xD5b58Cf7813c1eDC412367b97876bD400ea5c489
0xA5A023E052243b7cce34Cbd4ba20180e8Dea6Ad6
0x723a7084028421994d4a7829108D63aB44658315
0x1512fcb09463A61862B73ec09B9b354aF1790268
0xEB0bAA3A556586192590CAD296b1e48dF62a8549
0xf03AfB1c6A11A7E370920ad42e6eE735dBedF0b1
0x55CCa2f5eB07907696afe4b9Db5102bcE5feB734
21.02.2025, 19:00
t.me/investigations/217
361
263
44 k
21.02.2025, 19:00
t.me/investigations/216
The attacker just split 10K ETH to 39 addresses. If you are an exchange or service who follows my channel blacklist these addresses on all EVM chains:

0x40e98feeebad7ddb0f0534ccaa617427ea10187e
0x30a822cdd2782d2b2a12a08526452e885978fa1d
0x6d46bd3aff100f23c194e5312f93507978a6dc91
0x660bfcea3a5faf823e8f8bf57dd558db034dea1d
0x140c9ab92347734641b1a7c124ffdee58c20c3e3
0x8c7235e1a6eef91b980d0fca083347fbb7ee1806
0xb172f7e99452446f18ff49a71bfeecf0873003b4
0xcd7ec020121ead6f99855cbb972df502db5bc63a
0x0e8c1e2881f35ef20343264862a242fb749d6b35
0x2290937a4498c96effb87b8371a33d108f8d433f
0x1bb0970508316dc735329752a4581e0a4babc6b4
0xf0a16603289eaf35f64077ba3681af41194a1c09
0x5af75eab6bec227657fa3e749a8bfd55f02e4b1d
0xb4a862a81abb2f952fca4c6f5510962e18c7f1a2
0x959c4ca19c4532c97a657d82d97accbab70e6fb4
0xb72334cb9d0b614d30c4c60e2bd12ff5ed03c305
0xfc926659dd8808f6e3e0a8d61b20b871f3fa6465
0xfa3fcccb897079fd83bfba690e7d47eb402d6c49
0x51e9d833ecae4e8d9d8be17300aee6d3398c135d
0x1eb27f136bfe7947f80d6cee3cf0bfdf92b45e57
0x83c7678492d623fb98834f0fbcb2e7b7f5af8950
0x52207ec7b1b43aa5db116931a904371ae2c1619e
0x83ef5e80fad88288f770152875ab0bb16641a09e
0x23db729908137cb60852f2936d2b5c6de0e1c887
0xaf620e6d32b1c67f3396ef5d2f7d7642dc2e6ce9
0xcd1a4a457ca8b0931c3bf81df3cfa227adbdb6e9
0x96244d83dc15d36847c35209bbdc5bdde9bec3d8
0x09278b36863be4ccd3d0c22d643e8062d7a11377
0x3a21f4e6bbe527d347ca7c157f4233c935779847
0xbc3e5e8c10897a81b63933348f53f2e052f89a7e
0x9271eddda0f0f2bb7b1a0c712bdf8dbd0a38d1ab
0x4c198b3b5f3a4b1aa706dac73d826c2b795ccd67
0x684d4b58dc32af786bf6d572a792ff7a883428b9
0xd3c611aed139107dec2294032da3913bc26507fb
0x9ef42873ae015aa3da0c4354aef94a18d2b3407b
0xbde2cc5375fa9e0383309a2ca31213f2d6cabcbd
0xe69753ddfbedbd249e703eb374452e78dae1ae49
0xe9bc552fdfa54b30296d95f147e3e0280ff7f7e6
0xbca02b395747d62626a65016f2e64a20bd254a39
21.02.2025, 18:59
t.me/investigations/215
960
593
67 k
If you are an exchange or service who follows my channel blacklist these addresses on all EVM chains:

0x47666fab8bd0ac7003bce3f5c3585383f09486e2
0xa4b2fd68593b6f34e51cb9edb66e71c1b4ab449e
0x36ed3c0213565530c35115d93a80f9c04d94e4cb
0x1542368a03ad1f03d96D51B414f4738961Cf4443
0xdD90071D52F20e85c89802e5Dc1eC0A7B6475f92
21.02.2025, 18:34
t.me/investigations/214
977
1.5 k
101 k
My sources confirm it's a security incident
21.02.2025, 18:32
t.me/investigations/213
600
1.1 k
85 k
mETH & stETH is currently being swapped on DEXs for ETH
21.02.2025, 18:26
t.me/investigations/212
897
3.1 k
153 k
Currently monitoring suspicious outflows from Bybit of $1.46B+ will update as information becomes available

0x47666Fab8bd0Ac7003bce3f5C3585383F09486E2
21.02.2025, 18:20
t.me/investigations/211
1.1 k
74
47 k
Have turned off my DMs on X/Twitter for the next few weeks as people do not respect my time and lack basic financial literacy or common sense.

This means there’s currently no way to contact me so do not get scammed.
21.02.2025, 12:15
t.me/investigations/209
839
193
17 k
On-chain clown of the day: DPRK was attemping to deposit 46.3K XRP ($121K) from a hack to an exchange 30 minutes ago and forgot to include the destination tag in the transaction.

For those who are unfamiliar with Ripple this means the funds were not credited to an account as exchanges would not know who to credit the funds to.

Transaction Hash
79858B66DAA0F5BF28FC8E2ACC8C05CBE5105FEA0EA678CB78E8876294BEE185
4.02.2025, 17:31
t.me/investigations/208
496
198
21 k
Coinbase has a serious fraud problem just uncovered many more recent thefts from Coinbase users with tanuki42 so I think I will need to dedicate an entire post on X/Twitter to them.

The $150M / yr stolen from Coinbase users is just from thefts i independently confirmed so it's more than likely multiples of this number…..
31.01.2025, 17:30
t.me/investigations/207
397
292
22 k
A Coinbase user was likely social engineered and scammed for 110 cbBTC ($11.5M) on Base last month by a threat actor.

The stolen funds were immediately swapped, bridged, and laundered through multiple instant exchanges and funds consolidated with other Coinbase victims on Ethereum.

Theft transaction hash
0x8639f4b4420d47d68f27dc27967ff62ec913106e5b9ce99011de99b8d91813cd
0xb5895314777776da645529df83cd0d0883ed456e2c81e27c97eb5cf45a59c36b
0xfa26f3917519444c7d3d9ca05fc70b289d44958cb55801b9221d7b492f41c76d

Coinbase social engineering scams have resulted in $150M+ / yr stolen from users due to data breaches, email/call spoofing, bad detection, etc
31.01.2025, 15:59
t.me/investigations/206
304
183
14 k
It seems someone was likely hacked for $29M (6.27M SUI) on Sui last month on December 12th, 2024.

The stolen funds were bridged from Sui to Ethereum via Bridgers and then deposited to Tornado Cash in batches.

Primary theft address
0x731c2cd8f060428e7bb520899c855b48bf4b22d981f07a69ce3d0a258f3e589a

Theft transaction hash
4xo5ub1BbxgHjFwJv7iBaC4mfds8JSpHAYihAeKDwPBU
6VbgJTWMvomi4VY8hoZcUNPUVaaFcWjZRfxjtdV6MCHo
2WHUdTGonBwDsYW4nVK7zVEVtG9PnRSE9HCRgcmouYgM

The victim transferred their .sui domains to a new uncompromised address shortly after the theft.

Current limitations with Sui block explorers and Sui analytics tools make the theft difficult to trace.
26.01.2025, 16:14
t.me/investigations/205
95
16 k
26.01.2025, 10:47
t.me/investigations/204
502
91
16 k
If you somehow fell for the Dean Norris, Ross Gerber, or Keith Urban X/Twitter hacks after my warning it’s probably a sign you are not built for the trenches and are simply exit liquidity.
26.01.2025, 10:47
t.me/investigations/203
248
86
12 k
The P2P marketplace Noones was likely exploited for ~$7.9M on Ethereum, Tron, Solana, & BSC on January 1-2, 2025 as its hot wallets saw hundreds of suspicous outflows for <$7K per txn.

Shortly after the platform made an announcement about maintenance although no official statement was made about any security incident.

Funds were bridged to Ethereum/BSC and then deposited to Tornado Cash.

Theft consolidation addresses:

Ethereum
0x72c1eabafc42a2ac6d0447b02c657b96f07402e6
0x4b0edd27196063476d91b634333be289beca9202
0x6c9b55b50e6a42fd7a14b49ba7747096090b0465
Tron
TLRzLWbrCPVjXEcTDHv4Lavm6CxonUgJST
TSnsmxEPy7rqk9XRsCiYEk5ntchweGFq2A
BSC
0x72c1eabafc42a2ac6d0447b02c657b96f07402e6
Solana
BBJoEgHq1igbH4fXfLtxRBodpFb1qcYQRk4UCpzVKobo
24.01.2025, 11:24
t.me/investigations/202
490
133
15 k
It seems apparent for a lot of you that you do not understand the current scammer meta is to hack X/Twitter accounts with weak security that are in same niche as the current meme coin meta and immediately drop tokens.

Most recently that has been large political accounts, government accounts, country usernames

Now scammers are rotating back to celebrity accounts again.

In general when you see a surprise announcement for a meme coin launch it’s more than likely a scam as scammers only have access to the account for a few hours at most before losing access depending on the time of day.

Sadly the Trump/Melania surprise announcement meme coin launches probably helped add legitimacy to the hacked account token launches.

This post is mostly catered to average / newbie degens and not more sophisticated people who have an edge to profit from this.

Be diligent as scammers are easily making 6-7 figs off of these hacked accounts for the moment (EX: Nasdaq).
24.01.2025, 08:30
t.me/investigations/201
Os resultados da pesquisa são limitados a 100 mensagens.
Esses recursos estão disponíveis apenas para usuários premium.
Você precisa recarregar o saldo da sua conta para usá-los.
Filtro
Tipo de mensagem
Cronologia de mensagens semelhante:
Data, mais novo primeiro
Mensagens semelhantes não encontradas
Mensagens
Encontre avatares semelhantes
Canais 0
Alta
Título
Assinantes
Nenhum resultado corresponde aos seus critérios de pesquisa