Scan to download
BTC $71,527.87 +0.50%
ETH $2,191.48 -0.69%
BNB $602.14 -0.28%
XRP $1.34 -1.18%
SOL $82.43 -0.93%
TRX $0.3184 +0.24%
DOGE $0.0918 -1.34%
ADA $0.2518 -0.79%
BCH $436.80 -1.77%
LINK $8.83 -2.22%
HYPE $39.47 +2.02%
AAVE $90.57 -3.47%
SUI $0.9198 -1.17%
XLM $0.1535 -3.51%
ZEC $318.41 -2.79%
BTC $71,527.87 +0.50%
ETH $2,191.48 -0.69%
BNB $602.14 -0.28%
XRP $1.34 -1.18%
SOL $82.43 -0.93%
TRX $0.3184 +0.24%
DOGE $0.0918 -1.34%
ADA $0.2518 -0.79%
BCH $436.80 -1.77%
LINK $8.83 -2.22%
HYPE $39.47 +2.02%
AAVE $90.57 -3.47%
SUI $0.9198 -1.17%
XLM $0.1535 -3.51%
ZEC $318.41 -2.79%

ZachXBT: Scammers are impersonating a16z team members to conduct social engineering attacks

2024-06-12 23:29:25
Collection

ChainCatcher news, ZachXBT posted on social media that his followers fell victim to a social engineering attack impersonating a16z team members, resulting in a loss of $245,000 after inadvertently downloading malicious software onto their computers.

It is reported that the scammer claimed to be the account of Peter Lauten from the a16z team, sending messages to a project team inquiring about potential podcast collaboration.

The real Peter Lauten had changed his X (Twitter) handle from "peter_lauten" to "lauten," but the a16z official website still listed his old handle, and several posts from the a16z X account also tagged his old username. The victims were unaware of this and were subsequently targeted by the impersonator, who installed a fake meeting application called "Vortax" on their devices, which was actually malware.

app_icon
ChainCatcher Building the Web3 world with innovations.