- The scammer uses the EOA to drain the wallet after granted approval.
- President of the latest Deepfake goal of Binance’s CZ and Ashesi University.
- MCAFEE says the average Americans are seeing three deep sea every day.
The scammer combines Deepfake technology and sophisticated blockchain tactics to deceive Crypto users out of millions of people.
According to the discovery of the GoPlus Security, the waves of new sophisticated attacks are rapidly raising the loss of encryption.
This system combines the long -term phishing campaign with the AI -producing Deep Pike’s head of AI, contributing to the loss of more than $ 200 million in the first quarter of 2025.
This shows an amazing trend that a scammer exploits both the technical loopholes of the token approval and the psychological trust generated through the synthetic media.
Micro-rewarts fraud ends in a wallet drainage
In the latest analysis, the GOPLUS Security has over some multi -level campaigns that cross major blockchain ecosystems.
This attack starts with the launch of what is seen as a legitimate token or project, and provides stable rewards in USDT to complete simple tasks.
This includes a survey of social media handles, a Telegram channel, or a survey that appears to be harmless.
To build trust, a scammer sends a fine asset (USDT or token) to the user’s wallet.
Over a few days, they repeat these transactions and slowly establish justification.
GOPLUS pointed out that this extended participation is the core of the strategy.
Instead of a smart contract, the trap pops out when the user is coordinating to grant the token approval authority to the external ownership account (EOA).
When access is given, the high frequency bot waits for a wallet balance to hit the target threshold.
When this happens or when a sign is detected, the bot starts to run the front to drain the funds in a few seconds, regardless of the gas fee.
ZACHXBT urges to withdraw the token approval.
Goplus Security and Blockchain Sleuth ZachxBt urge users to use safety tools that limit token approval and automatically cancel dormant permissions.
According to ZACHXBT, the legitimacy, approval scope restrictions and monitoring activities are essential for preventing theft.
This warning has been increasing for several months for the token approval, which was a soft object of a con artist.
As the tokens and decentralized finance (Defi) tools become more complicated, bad actors now use the behavioral tactics where justifiable projects begin to solve the gap between technical tricks and social engineering.
Deepfakes used encryption approval as a fake
Token approval fraud has existed for many years, but 2025 records a new chapter of encryption fraud with the inorganization of Deepfake AI.
Scammers are producing fake video contents of the main character that promotes the current platform that does not exist.
In one example, CHANGPENG ZHAO (CZ), co -founder of Binance, warned followers in January that the AI created video is false with fraud investments.
In Ghana, scammers made the deep sea of Patrick Auah Jr. of Ashsi University, and approved a fake plan called “Crypto Klutz”.
This video is included in the Graphic Online version, a major news outlet nationwide, along with fake X posts to increase reliability.
Ashesi University issued an official statement that is far from fraud, calling the public to report cases and to prevent further spread.
AI fraud is extended to synthetic media
MCAFEE’s recent studies have shown that average Americans are now watching at least three Deepfake videos every day regarding the Cryptocurrency fraud.
The company has confirmed five teleced signs of AI -centered fraud, including emergency, celebrity guarantee, wallet key or prepaid payments, fake exchanges and too good profits.
In the first quarter of 2025, this wave of synthetic media support fraud shows an important stage of fraud complexity.
A scammer can now use the creation AI to create a convincing content at a low cost, so that the campaign can be expanded quickly.
As trading bots become faster and fake guarantees are getting more and more difficult, encryption space is becoming a threat of new threats that are no longer optional.