56.5 F
Washington D.C.
Thursday, April 25, 2024

Scammers Target and Exploit Owners of Cryptocurrencies in Liquidity Mining Scam

Whatever initial contact method is used, victims who express an interest in the investment receive a link to the fraudulent liquidity mining application.

The FBI is issuing this Public Service Announcement to warn American citizens about a cryptocurrency scam using an investment strategy called Liquidity Mininga in which scammers exploit owners of cryptocurrency, typically Tether (USDT) and/or Ethereum (ETH). The scammer builds a professional or personal relationship with victims over a few days to weeks, gives instructions for purchasing if the victims do not already own cryptocurrency, and entices them to participate in liquidity mining by guaranteeing a return on investment of one to three percent daily. Scammers convince victims to link their cryptocurrency walletb to a fraudulent liquidity mining applicationc. Scammers then wipe out the victims’ funds without notification or permission from the victim.

Since January 2019, according to the FBI’s Internet Crime Complaint Center (IC3) and open source, this scam has been responsible for over $70 million in combined victim losses.

Tactics:

Scammers approach potential victims through an unsolicited direct message (DM) on social media, dating applications, or messaging services such as Facebook, Instagram, Twitter, LinkedIn, WhatsApp, etc. Victims may also learn of the fraudulent liquidity mining site through someone they know who is unwittingly being scammed on the same platform. Scammers do not differentiate between individuals who own or do not own cryptocurrency, directing victims who do not already own cryptocurrency to set up an account with a wallet service and purchase cryptocurrency. The scam does not require a minimum investment, allowing the victims to “invest” any amount they want.

In the DM approach, scammers send out unsolicited messages to potential victims through social media or messaging services. The scammer engages the victim in conversation and attempts to initiate a personal or professional relationship, building trust over a period of days to weeks. During this period, the scammer will bring up the topic of cryptocurrency investment opportunities, including liquidity mining. The scammer states they have used this technique for a long time and have seen an amazing return on investment. The scam is not immediately apparent since the overall conversation is two people trying to get to know each other.

In the word-of-mouth approach, victims who invested into the scammers’ liquidity mining initially see the purported returns on investment, building a false sense of security that encourages victims to continue purchasing and “invest” additional cryptocurrency. The first victim then tells their contacts about this lucrative investment opportunity, bringing more victims into the scam. The scammers then proceed to empty the victims’ wallets. This approach may be more effective since the fraudulent platforms are recommended by someone a victim trusts rather than an unknown party.

Whatever initial contact method is used, victims who express an interest in the investment receive a link to the fraudulent liquidity mining application. In order to begin investing, the victim must link their cryptocurrency wallet to the application. The scammers instruct victims on how to connect their cryptocurrency wallet to the liquidity mining operation by clicking a button to receive a so-called mining certificate, voucher, or node, in exchange for a small fee. A pop-up designed to mirror the interface of the wallet application presents a list of permissions it is allegedly requesting. By clicking the link and accepting the permissions presented, victims unknowingly authorize scammers to pull an unlimited amount of funds out of their cryptocurrency wallets without permission or notification.d

In the liquidity mining scam, victims move cryptocurrency from their wallets to the liquidity mining platform and see the purported returns on a falsified dashboard. Believing their investments to be a success, victims purchase additional cryptocurrency. Scammers ultimately move all stored cryptocurrency and investments made to a scammer-controlled wallet.

Once the victim’s money is stolen, the victim typically contacts their wallet provider or the customer service portal on the scam application. Individuals purporting to be customer service representatives for the scam may present one of several explanations as to where the money went and why it is no longer accessible, culminating in the assertion that the victim needs to deposit additional funds in order to receive their money back. Victims are unable to reclaim their funds even if they add additional funds as directed.

Actions to Protect Yourself

  • Be cognizant that investors in legitimate liquidity mining operations deposit funds into the platform and later withdraw the original funds along with any returns generated. Reconsider joining pools that stray from this procedure. In a legitimate liquidity mining process, returns are usually tied to cryptocurrency market fluctuations in the specific cryptocurrency or cryptocurrency pair being used.
  • Be vigilant when learning of investment opportunities via online research. Scam websites or applications are not usually advertised online, nor are they allowed to be indexed by webcrawlers from search engines like Google and others. Verify the spelling of web addresses, websites, and email addresses that look trustworthy, but may be imitations of legitimate websites.
  • If you are concerned about the legitimacy of the domain, do not connect your cryptocurrency wallet.
  • Do not send payment to someone you have only spoken to online, even if you believe you have established a relationship with the individual.
  • Authenticate all links sent from known and unknown contacts before clicking.
  • Periodically use a third-party token allowance checker to determine whether you have inadvertently permitted any sites or applications access to your wallet.

Reporting Notice

If you believe you have been a victim of a Liquidity Mining Scam or other fraudulent scheme, please file a report with the FBI’s Internet Crime Complaint Center at www.ic3.gov. If possible, include the following:

  • Identifying information about the individuals, including name, phone number, address, and email address.
  • Financial transaction information such as the date, type of payment, amount, account numbers involved (to include cryptocurrency wallet), the name and address of the receiving financial institution, and receiving cryptocurrency addresses.

Read more at IC3

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles