Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000%

Deceptive actors are manipulating pool liquidity, sending token prices soaring by a shocking 22,000%.
80,000 Heist Unveiled: The manipulation of pool liquidity resulted in a swift and calculated theft of $80,000 from unsuspecting token holders.
Check Point Research recently delved into the intricacies of a rug pull orchestrated through a fake token factory.
Check Point's Blockchain Threat Intelligence system raised an alert on pool liquidity manipulation, resulting in a staggering token price increase of 22,000%.
Using the first wallet, they deployed the contract token WIZ and its liquidity pool pair address, which included reserves of WETH and WIZ tokens.
In the second wallet, the scammer created a malicious contract designed to exploit a backdoor and manipulate the WIZ token price, resulting in an $80,000 theft from victims.
Token Creation: The scammer launches a new cryptocurrency token, pairs it with a well-known cryptocurrency on a decentralized exchange, creating a liquidity pool.
Pool Manipulation: After accumulating substantial investments, the scammer manipulates the pool reserve by burning most WIZ tokens, reducing the supply, and temporarily inflating the token's price by 22,000%.
Picture a sizable digital reservoir holding two distinct cryptocurrencies-let us call them Token A and Ethereum.
Now, when an individual decides to exchange Token A for Ethereum, they contribute Token A to the pool and withdraw an equivalent value of Ethereum.
The dynamic pricing within the pool fluctuates based on the quantity of each token present.
If there is an abundance of Token A but a scarcity of Ethereum, the value of Token A decreases while Ethereum's value rises.
In the case at hand, the scammer manipulates the pool balance by burning tokens.
Burning tokens within a liquidity pool, like the WIZ/WETH pool, can boost the token's value by adhering to the core principles of supply and demand.
Liquidity pools follow a formula that harmonizes the quantities of two tokens.
When one token type undergoes reduction through burning, the relative value of the other token in the pool escalates to maintain equilibrium.
The crux of this strategy lies in the transient inflation of the token's price within the liquidity pool.
This blog zeroes in on the former, unraveling the narrative of a scammer concealing a backdoor to manipulate the WIZ/WETH liquidity pool by incinerating their tokens.
The scammer's approach involves temporarily inflating the token price in the liquidity pool.
Scammers leverage backdoors and exploits to manipulate token prices, emphasizing the importance of vigilance in the decentralized finance space.


This Cyber News was published on blog.checkpoint.com. Publication date: Tue, 05 Dec 2023 13:13:05 +0000


Cyber News related to Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000%

Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000% - Deceptive actors are manipulating pool liquidity, sending token prices soaring by a shocking 22,000%. 80,000 Heist Unveiled: The manipulation of pool liquidity resulted in a swift and calculated theft of $80,000 from unsuspecting token holders. Check ...
11 months ago Blog.checkpoint.com
Hackers Exploiting Crypto Liquidity Pools to Execute Trades - Crypto pool liquidity is the total assets locked in a decentralized finance liquidity pool. Hackers manipulate the pool liquidity to create artificial imbalances that allow them to control prices and execute profitable trades. Cybersecurity ...
11 months ago Cybersecuritynews.com
Deception Tech: The Art of Cyber Counterintelligence - One of the technologies quickly gaining popularity is deception technology. Unlike standard security methods that directly stop or identify threats, deception technology uses a more subtle strategy. Deception tech is more about being proactive - not ...
10 months ago Securityboulevard.com
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction - There is a possibility that artificial intelligence models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and ...
9 months ago Cysecurity.news
Feds Seize 'Sinbad' Crypto Mixer Used by North Korea's Lazarus - In its continued efforts to crack down on North Korea's most formidable state-sponsored threat group, the US government has seized a virtual currency mixer that has been serving as the principal way the group launders money stolen from its ...
11 months ago Darkreading.com
A High Fee Discovered for the Latest Dingo Cryptocurrency Token - Researchers at IT security company Check Point Security have identified Dingo Token as a potential scam after discovering a function that allows the project's owner to manipulate trading fees up to 99% of the transaction value. Check Point has ...
1 year ago Bleepingcomputer.com
Crypto Enthusiasts Embrace New Frontier: Investing in Bitcoin ETFs Explained - This was the first time the Securities and Exchange Commission approved an exchange-traded fund that contained bitcoin, but the Commission stressed that its decision does not mean it endorses or approves Bitcoin, but that it remains deeply sceptical ...
9 months ago Cysecurity.news
GigaOm's Cloud Network Security Radar Ranks Check Point as the Industry Leader - This article introduces GigaOm's inaugural Radar for Cloud Network Security and explains why Check Point was ranked as the Leader as well as a Fast Mover. Firstly, it is the cloudified version of Check Point's on-premises network security, from which ...
10 months ago Blog.checkpoint.com
From Implicit to Authorization Code With PKCE, BFF - Lack of Refresh Token Support occurs when there are no refresh tokens, and frequent requests for new tokens are necessary, increasing the chances of token leakage and misuse. The Implicit Flow had several security vulnerabilities, such as token ...
4 months ago Feeds.dzone.com
Check Point Research Unfolds: Navigating the Deceptive Waters: Unmasking A Sophisticated Ongoing NFT Airdrop Scam - Sophisticated Scam Targeting Token Holders: Over 100 popular projects' token holders targeted with fake NFT airdrops appearing from reputable sources. Multi-Stage Deception Uncovered: The ongoing Scam involves enticing victims to fraudulent websites ...
9 months ago Blog.checkpoint.com
CVE-2018-2682 - Vulnerability in the Oracle Financial Services Liquidity Risk Management component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows ...
5 years ago
CVE-2024-21281 - Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.7.0.6.0. Difficult to exploit vulnerability allows high privileged ...
3 weeks ago Tenable.com
Unveiling the New Threats: Rhadamanthys v0.5.0 A Research Overview by Check Point Research - Key Insights: The Evolving Threat: The Rhadamanthys stealer, a multi-layered malware, is now available in its latest iteration, version 0.5.0, enhancing its capabilities and introducing new spying functions. Check Point Research's Expert Analysis: ...
10 months ago Blog.checkpoint.com
The Week in Ransomware - January 20th, 2023 Crypto Exchanges Under Attack - The week of January 20th, 2023 brought yet another wave of ransomware attacks targeting crypto exchanges. Crypto exchanges all around the world have been hit by a barrage of sophisticated and well-planned ransomware campaigns. From high-profile ...
1 year ago Bleepingcomputer.com
Navigating the Perilous Waters of Crypto Phishing Attacks - Key Highlights: Check Point Research Unveils Rise in Sophisticated Crypto Phishing: An investigation reveals an alarming increase in advanced phishing schemes targeting a variety of blockchain networks, employing wallet-draining techniques. ...
10 months ago Blog.checkpoint.com
Rug Pull Schemes: Crypto Investor Losses Near $1M - Check Point's Threat Intel Blockchain system has revealed a new scam, shedding light on the persistent threat of Rug Pulls - a deceptive tactic causing financial losses for investors. The company's system recently identified suspicious activities ...
11 months ago Infosecurity-magazine.com
Web3 security firm CertiK's X account hacked to push crypto drainer - The Twitter/X account of blockchain security firm CertiK was hijacked today to redirect the company's more than 343,000 followers to a malicious website pushing a cryptocurrency wallet drainer. Crypto fraud sleuth ZachXBT later leaked screenshots of ...
10 months ago Bleepingcomputer.com
SEC Approves Bitcoin ETFs, Crypto Industry Rejoices - The US securities regulator has officially approved the first US-listed exchange traded funds to track bitcoin, in what is being labelled a watershed moment for the world's largest cryptocurrency, as well as the broader crypto industry. Earlier this ...
9 months ago Silicon.co.uk
Bloomberg Crypto X account snafu leads to Discord phishing attack - The official Twitter account for Bloomberg Crypto was used earlier today to redirect users to a deceptive website that stole Discord credentials in a phishing attack. As first spotted by crypto fraud investigator ZachXBT, the profile contained a link ...
11 months ago Bleepingcomputer.com
Artificial Deception: The State Of "AI" In Defense and Offense - If you have seen any of my talks, I often say that the infosec industry wouldn't exist without deception. Although I've seen enough nature documentaries to know deception exists throughout the rest of the animal kingdom, humans have the cunning ...
10 months ago Cyberdefensemagazine.com
Best Platform To Catch Up on Crypto News? - That is why crypto publications such as InsideBitcoins.com are getting a lot of traction. These guides give a complete analysis of new and old cryptocurrencies through multiple perspectives. Crypto price predictions are where InsideBitcoins.com's ...
10 months ago Hackread.com
Netgear, Hyundai latest X accounts hacked to push crypto drainers - The official Netgear and Hyundai MEA Twitter/X accounts are the latest hijacked to push scams designed to infect potential victims with cryptocurrency wallet drainer malware. While Hyundai has already regained access to their account and has cleaned ...
9 months ago Bleepingcomputer.com
Check Point Supercharges Brisbane Catholic Education's Security Stack to Improve Threat Detection and Streamline Manageability - Brisbane Catholic Education is a learning community comprising more than 140 schools that deliver quality learning outcomes to 77,000 prep-to-year-12 students. BCE's education and administrative workflows are powered by a large and distributed hybrid ...
6 months ago Blog.checkpoint.com
CVE-2018-2720 - Vulnerability in the Oracle Financial Services Liquidity Risk Management component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows low ...
5 years ago
CVE-2020-2891 - Vulnerability in the Oracle Financial Services Liquidity Risk Management product of Oracle Financial Services Applications (component: User Interfaces). The supported version that is affected is 8.0.6. Easily exploitable vulnerability allows low ...
4 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)