【CryptoWorld】A shocking large-scale scam has recently occurred. According to on-chain security monitoring data, a scammer successfully deceived $50 million USDT through a social engineering method called “transfer record poisoning attack.” Even more astonishing is the speed of the fund transfer—just 30 minutes after the funds arrived, the scammer initiated a laundering process.
Their operational approach is worth noting: first, they used MetaMask Swap to directly exchange $50 million USDT for DAI stablecoin, then quickly converted all DAI into 16,690 ETH. In the final step, all funds were sent to the mixing service Tornado Cash for obfuscation.
This case exposes several issues. First, the power of social engineering attacks like transfer record poisoning; second, the rapid flow of scam funds. From stablecoin to stablecoin, then to mainstream cryptocurrencies, and finally to mixers, the entire chain demonstrates the malicious actors’ deep understanding of transaction processes. Users need to be vigilant about unfamiliar transfer records, especially seemingly “reasonable” transaction prompts, as they may hide significant risks.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
19 Likes
Reward
19
5
Repost
Share
Comment
0/400
AlwaysQuestioning
· 12-23 01:37
50 million gone in 30 minutes? This guy's speed is incredible...
---
Tornado Cash really needs to be banned...
---
To be honest, this kind of social engineering is impossible to guard against; no matter how cautious, it’s useless
---
MetaMask directly swaps to the mixer, their process is too smooth
---
Another case of transaction record poisoning, why is this tactic so effective?
---
50 million dollars, how many years do I have to earn to get that...
---
Why can't the exchange detect it? Is on-chain data really that transparent?
---
This mixer is truly an accomplice to bad deeds
---
Fast circulation → mixing coins, this tactic has become an industry
---
Wait, how did this scammer pull it off? I just want to know the specific social engineering methods
---
Stablecoin trapped in stablecoin and then into Mainstream Token? Incredible, the counter-investigation ability is so strong
---
Is there still someone using Tornado Cash even after it was sanctioned?
View OriginalReply0
BridgeTrustFund
· 12-22 14:23
Cleaning 50 million dollars in 30 minutes, this speed is truly amazing... This set of moves from Tornado Cash is the core!
View OriginalReply0
HashBrownies
· 12-20 03:10
Oh no, 30 minutes to run away, this speed is too skilled. This isn't the first time playing this trick, right?
---
Is Tornado Cash still in the wild? That takes some serious guts.
---
I just realized the transaction record was poisoned. I need to be extra careful next time.
---
50 million USD just disappeared... On-chain transparency has actually become a disadvantage, how ironic.
---
MetaMask→DAI→ETH→Mixer, this process has long been figured out by others.
---
The question is, when will things like TornadoCash truly be stopped?
---
Social engineering scams are always the deadliest. No matter how secure the blockchain is, it can't prevent foolish people.
View OriginalReply0
SerumSquirter
· 12-20 03:10
Damn, that's a brilliant method... Can it be cleaned in just 30 minutes? We're still researching how to prevent social engineering here.
View OriginalReply0
CrossChainBreather
· 12-20 03:02
Oh no, it only took 30 minutes to clean up, how skilled must that be... I really didn't expect the social engineering attack to be used for poisoning transfer records.
---
50 million just disappeared like that? Social engineering attacks are more outrageous than technical vulnerabilities.
---
Tornado Cash, this mixer, should have been shut down long ago. It has truly become a haven for money laundering.
---
Just saw this case and instantly felt that I need to lock my small amount of U into a cold wallet to feel secure...
---
Transfer → Exchange → Transfer → Wash, a one-stop process, this is too professional.
---
Does anyone still trust MetaMask? Moving such large amounts of funds directly inside it, really bold.
---
The question is, can this money really not be recovered now? Or can any clues be traced later?
---
Social engineering attacks are indeed the hardest to defend against. No matter how advanced the technology is, it can't withstand human greed.
---
16,690 ETH directly into Tornado... Goodbye everyone, this money has become history.
$50 million USDT scam case follow-up: How funds flow to mixers within half an hour
【CryptoWorld】A shocking large-scale scam has recently occurred. According to on-chain security monitoring data, a scammer successfully deceived $50 million USDT through a social engineering method called “transfer record poisoning attack.” Even more astonishing is the speed of the fund transfer—just 30 minutes after the funds arrived, the scammer initiated a laundering process.
Their operational approach is worth noting: first, they used MetaMask Swap to directly exchange $50 million USDT for DAI stablecoin, then quickly converted all DAI into 16,690 ETH. In the final step, all funds were sent to the mixing service Tornado Cash for obfuscation.
This case exposes several issues. First, the power of social engineering attacks like transfer record poisoning; second, the rapid flow of scam funds. From stablecoin to stablecoin, then to mainstream cryptocurrencies, and finally to mixers, the entire chain demonstrates the malicious actors’ deep understanding of transaction processes. Users need to be vigilant about unfamiliar transfer records, especially seemingly “reasonable” transaction prompts, as they may hide significant risks.