Google Ad for Sony’s Soneium Blockchain is a Crypto Wallet Drainer, Warns Scam Sniffer

Google Scam Sony

Scam Sniffer revealed that the ad linked to a website with a domain name similar to Soneium’s official site. Last updated:

October 22, 2024 03:11 EDT

Author

Ruholamin Haqshanas

Author

Ruholamin Haqshanas

About Author

Ruholamin Haqshanas is a contributing crypto writer for CryptoNews. He is a crypto and finance journalist with over four years of experience. Ruholamin has been featured in several high-profile crypto…

Author Profile

Share

Copied

Last updated:

October 22, 2024 03:11 EDT

Why Trust Cryptonews With over a decade of crypto coverage, Cryptonews delivers authoritative insights you can rely on. Our veteran team of journalists and analysts combines in-depth market knowledge with hands-on testing of blockchain technologies. We maintain strict editorial standards, ensuring factual accuracy and impartial reporting on both established cryptocurrencies and emerging projects. Our longstanding presence in the industry and commitment to quality journalism make Cryptonews a trusted source in the dynamic world of digital assets. Read more about Cryptonews Google Ad for Sony’s Soneium Blockchain is a Crypto Wallet Drainer, Warns Scam SnifferA sponsored Google ad posing as a link to Sony’s blockchain project, Soneium, has been exposed as a cleverly disguised crypto wallet drainer, according to blockchain security firm Scam Sniffer.

In an October 22 post on X, the firm detailed that a search for “soneium” on Google led users to a phishing site designed to steal crypto assets.

Scam Sniffer revealed that the ad linked to a website with a domain name similar to Soneium’s official site, which appeared as a legitimate yet unfinished landing page for a radiology service based in the UK.

Deceptive Site Contains Hidden Wallet Drainer

The deceptive site contained a hidden wallet drainer, ready to exploit unsuspecting visitors.

“It’s easy to fall victim to phishing when you’re not paying close attention, especially if you mistype ‘Soneium’ as ‘Someium’,” Scam Sniffer explained.

The firm also noted that the website creators used sophisticated techniques to evade detection by Google, making it difficult for the search engine to flag the malicious ad.

Soneium is an Ethereum layer-2 blockchain developed by Sony Block Solutions Labs, a joint venture between Sony and blockchain firm Startale Labs. The platform launched its testnet in August.

⚠️ Searched for Soneium on Google, clicked a phishing ad.
After connecting your wallet and signing a phishing signature, your assets disappeared… 😱💸 pic.twitter.com/5Hpi9OTZ4S

— Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) October 22, 2024

The latest incident follows a report from Scam Sniffer earlier this month that revealed over $46 million in crypto was stolen from more than 10,800 phishing victims in September alone.

In the third quarter of 2024, over $127 million in crypto assets were stolen, with Ether wallets being the prime targets in these phishing attacks.

Fake Wallet App Steals $70K in Crypto

In another incident, a fraudulent cryptocurrency wallet app on Google Play has reportedly stolen $70,000 from users in a sophisticated scam that has been described as a world-first for targeting mobile users exclusively.

The malicious app, named WalletConnect, mimicked the reputable WalletConnect protocol but was, in fact, a sophisticated scheme to drain crypto wallets.

The deceptive app managed to deceive over 10,000 users into downloading it, according to Check Point Research (CPR), the cybersecurity firm that uncovered the scam.

The scammers behind the app were well aware of the typical challenges faced by web3 users, such as compatibility issues and the lack of widespread support for WalletConnect across different wallets.

They cleverly marketed the fraudulent app as a solution to these problems, taking advantage of the absence of an official WalletConnect app on the Play Store.

As reported, Cybersecurity scammers are using automated email replies to compromise s and deliver stealthy crypto mining malware.

This comes on the heels of another malware threat identified in August.

The “Cthulhu Stealer,” which affects MacOS s, similarly disguises itself as legitimate software and targets personal information, including MetaMask passwords, IP addresses, and cold wallet private keys.

Follow us on Google News

This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin