Scan to download
BTC $75,626.99 -0.99%
ETH $2,237.81 -2.83%
BNB $613.30 -1.73%
XRP $1.36 -1.71%
SOL $82.39 -1.78%
TRX $0.3232 +0.03%
DOGE $0.1017 +2.15%
ADA $0.2421 -2.15%
BCH $445.31 -1.03%
LINK $9.02 -2.66%
HYPE $39.97 -0.32%
AAVE $93.59 -3.20%
SUI $0.8984 -3.13%
XLM $0.1593 -1.90%
ZEC $322.05 -3.59%
BTC $75,626.99 -0.99%
ETH $2,237.81 -2.83%
BNB $613.30 -1.73%
XRP $1.36 -1.71%
SOL $82.39 -1.78%
TRX $0.3232 +0.03%
DOGE $0.1017 +2.15%
ADA $0.2421 -2.15%
BCH $445.31 -1.03%
LINK $9.02 -2.66%
HYPE $39.97 -0.32%
AAVE $93.59 -3.20%
SUI $0.8984 -3.13%
XLM $0.1593 -1.90%
ZEC $322.05 -3.59%

ZachXBT: Scammers are impersonating a16z team members to conduct social engineering attacks

2024-06-12 23:29:25
Collection

ChainCatcher news, ZachXBT posted on social media that his followers fell victim to a social engineering attack impersonating a16z team members, resulting in a loss of $245,000 after inadvertently downloading malicious software onto their computers.

It is reported that the scammer claimed to be the account of Peter Lauten from the a16z team, sending messages to a project team inquiring about potential podcast collaboration.

The real Peter Lauten had changed his X (Twitter) handle from "peter_lauten" to "lauten," but the a16z official website still listed his old handle, and several posts from the a16z X account also tagged his old username. The victims were unaware of this and were subsequently targeted by the impersonator, who installed a fake meeting application called "Vortax" on their devices, which was actually malware.

app_icon
ChainCatcher Building the Web3 world with innovations.