Scan to download
BTC $76,868.00 -0.09%
ETH $2,133.05 +0.55%
BNB $642.52 +0.00%
XRP $1.39 -0.63%
SOL $85.13 -0.00%
TRX $0.3567 +0.05%
DOGE $0.1051 -1.53%
ADA $0.2518 +0.45%
BCH $379.72 -1.13%
LINK $9.72 +1.85%
HYPE $47.59 +3.62%
AAVE $89.36 +0.79%
SUI $1.06 +1.94%
XLM $0.1470 -1.77%
ZEC $570.91 +4.72%
BTC $76,868.00 -0.09%
ETH $2,133.05 +0.55%
BNB $642.52 +0.00%
XRP $1.39 -0.63%
SOL $85.13 -0.00%
TRX $0.3567 +0.05%
DOGE $0.1051 -1.53%
ADA $0.2518 +0.45%
BCH $379.72 -1.13%
LINK $9.72 +1.85%
HYPE $47.59 +3.62%
AAVE $89.36 +0.79%
SUI $1.06 +1.94%
XLM $0.1470 -1.77%
ZEC $570.91 +4.72%

ZachXBT: Scammers are impersonating a16z team members to conduct social engineering attacks

2024-06-12 23:29:25
Collection

ChainCatcher news, ZachXBT posted on social media that his followers fell victim to a social engineering attack impersonating a16z team members, resulting in a loss of $245,000 after inadvertently downloading malicious software onto their computers.

It is reported that the scammer claimed to be the account of Peter Lauten from the a16z team, sending messages to a project team inquiring about potential podcast collaboration.

The real Peter Lauten had changed his X (Twitter) handle from "peter_lauten" to "lauten," but the a16z official website still listed his old handle, and several posts from the a16z X account also tagged his old username. The victims were unaware of this and were subsequently targeted by the impersonator, who installed a fake meeting application called "Vortax" on their devices, which was actually malware.

app_icon
ChainCatcher Building the Web3 world with innovations.