Tellor’s Official X Account Hacked In Phony TRB Airdrop Scam

ByBitcoin21

Nov 5, 2023

A recent report from PeckShield Alert brought to light that Tellor’s official X (formerly known as Twitter) account, @WeAreTellor, fell victim to a cunning phishing scam.

#PeckShieldAlert Tellor’s X (formerly Twitter) account (@WeAreTellor) has been hacked pic.twitter.com/WwP9GSdMCe
— PeckShieldAlert (@PeckShieldAlert) November 3, 2023
a

In a concerning turn of events, attackers masquerading as Tellor posed a substantial threat to users by promising a generous TRB airdrop, only to lead them into a perilous trap.

A misleading tweet surfaced, proclaiming, “The $TRB airdrop is live on an EVM chain near you…” and redirecting users to a deceptive tellor[.]co website that strikingly resembled the genuine Tellor URL.

Adding to the treachery, a subsequent tweet falsely asserted that “$75,000 had already been claimed from our TRB airdrop,” perpetuating the phishing link in an attempt to siphon off funds from unsuspecting victims.

Swiftly, PeckShield Alert sounded the alarm, issuing a warning that the “Claim your TRB” message and accompanying link were components of a cunning phishing scheme.

The perpetrators behind this malevolent operation sought to exploit the trust of crypto enthusiasts.

To shield themselves from potential losses, users were advised to exercise caution, steering clear of crypto giveaway promotions on social media, and instead, access Tellor’s official website directly.

Tellor’s team acted promptly, confirming on their Discord channel that the announcements were fraudulent, and there was no ongoing airdrop event.

They urged the community to abstain from clicking any links or sharing wallet information, emphasising the importance of vigilance.

In a screenshot shared by PeckShield Alert, a troubling revelation emerged.

Aegis Web3 identified “tellor.co” as a phishing site, posing a significant menace to unsuspecting users.

It is important to note that these malicious sites often harbour sinister intentions, including the theft of private keys, the duping of users into providing token approvals, or enticing them into purchasing deceptive tokens.



Source link