Thursday, January 22, 2026

Organized Traffer Gang on the Rise Targeting Web3 Employees and Crypto Holders


  Author(s): Vlad Pasca, Radu-Emanuel Chiscariu
  • Sophisticated cybercriminal operation targets cryptocurrency users and Web3 employees

  • Malware delivered through fake Electron applications disguised as legitimate tools

  • Uses extensive infrastructure of 80+ domains across multiple campaigns

  • Employs advanced social engineering with elaborate fake company ecosystems

  • Shared infrastructure suggests links to multiple traffer groups including "Marko Polo", "CrazyEvil", and "Wagmi"

  • Documented earnings of at least $2.4 million from cryptocurrency theft

Hybrid Analysis has identified a sophisticated cybercriminal operation targeting cryptocurrency users and Web3 employees. This threat actor is part of an organized "traffer gang" – an organized cybercriminal operation with hierarchical structures that specialize in delivering malware through convincing social engineering lures for financial gain. It has evolved from basic phishing to highly targeted attacks using fake companies, sophisticated malware, and elaborate social engineering techniques. The campaign shows clear signs of Russian-speaking threat actors, based on code comments and operational patterns.

A Hybrid Analysis Perspective

As we can see in the Hybrid Analysis report, the process drops multiple compressed files, namely app-64.7z and app.asar.

Figure 1 – Multiple encrypted or compressed files are dropped

The malware also creates multiple executables and DLLs, some of them being dependencies for Electron applications (Figure 2).

Figure 2 – Dependencies and other suspicious executables are created by the malware

As we can see in the process tree, the process spawns a new executable called Opulous Client.exe and queries the registry for the machine GUID value:

Figure 3 – Process tree

A Deeper Dive

In the first part of the analysis, we analyze a malicious Electron-based application called “Opulous”. The application asks a user to register or login in the main window:

Figure 4 – Malicious application’s main window

The malicious component can be found in the 7-Zip archive app-64.7z, specifically app.asar file, which is an archive format designed for Electron apps. Asar7z is a plugin for the 7-Zip tool that can be used to extract the content of an ASAR archive.

Figure 5 – Content of the app.asar archive after extraction

The JS file main.original.js is a leftover by the threat actor that contains the unobfuscated JavaScript code, and the main.js file is the obfuscated version. We continue with the analysis of the unobfuscated script.


Figure 6 reveals the command-and-control (C2) server opulous-app[.]live and a series of comments in Russian. The malware can specify command line arguments such as “novm” or “disablechecks”, which skips the verification of the VM and Server detection.

Figure 6 – The original script highlights the C2 server and has comments in Russian

First, the malware calls a function named sendClientName() that extracts many details of the machine. It creates a payload based on this info and exfiltrates data to the “/client-name” URI on the C2 server:

Figure 7 – Extract system information and exfiltrate it to the C2 server

The extracted information includes the following (Figure 8):

  • Private and public IP address

  • CPU model and RAM size

  • OS version

  • Hostname and Username

  • GPU information

  • Installed antivirus software

  • Language and country extracted from the public IP

  • Whether the machine is a virtual machine or a server

Figure 8 – Collect information about the infected machine

The malware extracts the local IP address by calling the networkInterfaces function. The public IP address is retrieved using a list of four legitimate websites, as highlighted below.

Figure 9 – Private and public IP addresses are retrieved by the malware

The malicious process obtains GPU information using three methods displayed in Figure 10.

Figure 10 – Obtain information about the GPU

The executable is looking for registry keys, services, and processes associated with multiple antivirus vendors:

Figure 11 – Antivirus detection

Even if the initial executable is a Windows PE file, we’ve identified JavaScript code that suggests Linux machines could be a target as well. As we can see below, the process verifies the presence of multiple AV processes and services on Linux OS:

Figure 12 – Linux antivirus processes and services

The malware verifies whether the current host is a virtual machine by checking information against a list of machine GUIDs, processes, services, and so on. We’ve identified a GitHub repository containing the same characteristics of the sandboxes used by VirusTotal dynamic analysis feature.

Figure 13 – VM detection based on known artifacts

For server detection, the malware verifies if the OS version contains a list of keywords and the presence of strings in the hostname that could indicate a Cloud or Enterprise environment. It also verifies if the role of the current machine in the workgroup is 2 (“StandaloneServer”):

Figure 14 – Verify if the infected host is a server

The process listens to multiple channels such as “process-auth-data”, “submit-email”, “get-system-detail”, and others. When new messages arrive, a specific function would be executed. For the first channel we mentioned, the process generates an email address based on the input username in the app and exfiltrates the system information to the C2 server, requesting a file that would be downloaded, decrypted, and executed on the local machine:

Figure 15 – Generate an email based on the username and execute the downloaded file

The email generation function combines the username with known email domains (see Figure 16).

Figure 16 – Email address generation

The file specified by the C2 server is Base64-decoded and decrypted using AES256, with the key being transmitted by the server, and IV is composed of NULL bytes. The newly-created executable is saved as tradingview.exe and spawned by the process:

Figure 17 – Decrypt the content using the AES256 algorithm and run the newly-created file

The second Electron-based downloader we have identified needs a token to run properly. This token can be extracted from the command line arguments or the App Launcher’s URL and is validated with the C2 server:

Figure 18 – A token is mandatory for a successful execution

The process displays a fake verification screen while the verification is in progress:

Figure 19 – Verification screen is displayed to the unsuspecting user

The malware sends the token along with system information such as OS version, username, CPU name, RAM size, MAC address, and GPU information:

Figure 20 – Data to be exfiltrated to the C2 server

The malware acts as a downloader by downloading and running executable and MSI files based on two fields called “link1” and “link2”, specified by the C2 server (Figure 21).

Figure 21 – Download and execute .exe and .msi files

The binary can also run Python scripts using the Python executable disguised as a different executable name:

Figure 22 – Run Python scripts

According to previous campaigns and our analysis, the second stage can be an information stealer such as Rhadamanthys and Lumma on Windows and Amos/Atomic Stealer on MacOS.


Mapping the infrastructure

From July 2024 through June 2025, a series of sophisticated cryptocurrency-focused social engineering campaigns emerged, targeting Web3 developers and project teams. Beginning in summer 2024, attackers utilized fake websites, GitHub repositories, and social media presence to distribute malware through seemingly legitimate applications. By September 2024, researchers identified 'Marko Polo', a financially motivated traffer team managing a Traffic Distribution System (TDS) responsible for over 30 social media scams using multiple malware families. December 2024 saw the emergence of the 'Meeten campaign' targeting Web3 employees with fake meeting software. Early 2025 brought an expansion of the fake company ecosystem, with threat actors adopting verification badges on social media platforms. By spring 2025, the NexVoo campaign demonstrated refined two-stage social engineering tactics and implemented invitation codes distributed through social apps to avoid detection. April 2025 research revealed the Wagmi traffer team's operations, which generated $2.4 million between June 2023 and March 2025 through sophisticated cryptocurrency targeting. By June 2025, the campaign had evolved to include numerous fake companies, leading to the revocation of a legitimate certificate from Paperbucketmdb ApS due to malicious usage.

Our investigation identified over 80 domains in this campaign, showing how these operations have evolved from basic phishing to targeted attacks against Web3 users. The malware analyzed in the previous section represents the initial infection vector that compromises machines, profiles them, and can execute additional second stage payloads. We present the evolution of activities below.

September-October 2024: We observe new infrastructure with the same AI-themed productivity tools. Domains like klast[.]ai (registered 2024-07-16), slaxai[.]app, swox[.]ai, and dexis[.]io emerged, again with shared web template similarities. Threat actors pivoted to using Electron apps for malware delivery, conducting exfiltration through JavaScript. C2 infrastructure included cnfreund[.]com, hojosy[.]com, and sumachpress[.]com.


Figure 23 – Various lures with “AI-powered productivity apps” theme.

November-December 2024: Operation evolved to target crypto investors with fake Web3 gaming projects. New domains included metatoy[.]io, primalverse[.]io (impersonating Cavemen Club game), and streamyard variants. Technical sophistication increased with NSIS installer abuse (90MB+ signed executables) to avoid detection. Malware samples contained Russian comments ("Собираем информацию о системе", "Перехватываем сообщения из консоли").

May-July 2025: We observed further infrastructure expansion with lapeai[.]io (registered May 9, 2025), scoil[.]ai, scoil[.]cc, and speeka.ai variants, all cloning https[:]//affine[.]pro/ web template and its Github repo README.md template. Threat actors created elaborate fake team structures with 35+ "core members" to enhance legitimacy. From these, only some of the accounts actively promoted the projects while others were purchased/compromised accounts with crypto-themed usernames or otherwise valid accounts with bios and posts related to web3/crypto.

July-November 2025: Latest evolution includes vixcall domains and expanded C2 infrastructure (pelletibor[.]com, dloutstanding[.]com, itmab[.]com, mrajhhosdoahjsd[.]com, solus[.]today, and solus-app[.]digital). 

September-October 2025: Significant pivot to airdrop-themed infrastructure observed with the creation of multiple domains targeting DeFi users. Infrastructure analysis revealed a shared hosting pattern with eight malicious domains (asterdex-drop[.]eu, asterdrop[.]run, fluencedrop[.]digital, aster-dex[.]eu, asterdrop[.]digital, sunperp[.]icu, meteoradrop[.]com, and fluencedrop[.]eu) all hosted on the same IP address (62.60.226[.]16) as the previously identified solus-app[.]digital and solus[.]today domains. These new domains – created between September 24 and October 7, 2025 – showed high detection rates by security vendors (11 malicious detections for asterdex-drop[.]eu at the time of writing), indicating a coordinated campaign shift toward exploiting airdrop FOMO in the crypto community.

Our investigation uncovered an extensive network of 80+ domains associated with this campaign, revealing a more complex picture of the threat actors' infrastructure than previously documented. The malware contained distinctive Russian comments in the code, including "Функция для генерации случайной строки" (Function for generating random strings) and "Перехватываем сообщения из консоли" (Intercepting console messages), providing potential attribution indicators. Beyond the domains mentioned in published reports, we discovered additional C2 infrastructure including macattic[.]com, woaihuanbao[.]com, addonsystem[.]com, shedegei[.]com, and tmcxchem[.]com, as well as previously undocumented distribution sites like flowus variants, talkon variants, yovox domains, and zynce[.]org. The September 2025 pivot to airdrop-themed domains (created between September 24 and October 7) represents a significant tactical shift, suggesting the threat actors are adapting to target the growing interest in token airdrops following major DeFi protocol launches.

We have identified the following accounts promoting the malicious apps on Social Media:

  • SpeekaAI (Telegram, X)

  • NexBeeAI (Telegram, X)

  • CryptalixAI (X)

  • AppScoil (X)

  • ScoilApp (GitHub, GitBook, linktr.ee)

  • SlaxApp (GitHub, Telegram, GitBook, linktr.ee)

  • SolusApp (X, GitBook, Telegram, linktr.ee)

  • FlowUsApp (X)

  • Yovox (X, Medium, GitBook)

  • VocaLinkLive (X)

  • NexVoo (GitHub,Telegram)

  • TalkOn_AI (X)

Technical Evolution

  1. Initial Delivery: Evolved from simple malicious downloads to sophisticated signed executables (certificates from "IT POLONIA SP Z O O", "Richester Business Network Inc.", "HAM AND FIRKIN LIMITED", "Jiangyin Fengyuan Electronics Co., Ltd.", and "Paperbucketmdb ApS"). The TRAC Labs research revealed that traffer groups like Wagmi systematically abuse code signing certificates, cycling through multiple GlobalSign EV certificates after each revocation, demonstrating a persistent pattern of certificate abuse across the ecosystem.

  2. Malware Capabilities: Progressed from basic fingerprinting to comprehensive system profiling:

    • Username, CPU model, processor count, RAM, OS version, MAC address, GPU information

    • Anti-analysis techniques including file size randomization (0.2-2MB of random data)

    • Random directory creation for evasion

    • Anti-VM/sandbox detection for macOS (checks for QEMU, VMWare, Docker-OSX)

  3. Social Engineering: Advanced from opportunistic phishing to highly targeted approaches:

    • Initial: Generic productivity tool lures

    • Mid-stage: AI-powered applications targeting tech enthusiasts

    • Current: Customized approaches based on victim profiles with just-in-time infrastructure

    • Latest: Fake conference presentations with photoshopped images (e.g., Eternal Decay)

    • Automated victim identification tools like the "Wagmiscapper" that collects cryptocurrency wallet addresses from Twitter to identify high-value targets

  4. Legitimacy Building: Increasingly sophisticated methods to appear genuine:

    • GitHub repositories with fake contributors and inflated metrics

    • AI-generated Medium blog posts and documentation

    • Fake team structures with purchased/compromised social media accounts

    • Merchandise sections on websites (conveniently already sold-out) to enhance credibility

    • Notion pages for product roadmaps and employee details

    • Fake company registration information linking to legitimate but unrelated businesses

    • Detailed fake "Staff Guidance Manuals" and "FAQ" documents to build trust with victims

  5. Platform Targeting: Expanded from Windows-only to cross-platform attacks:

    • Windows: Electron applications with Python components for stealer functionality, evolving to use HijackLoader to deliver Rhadamanthys and Lumma stealers

    • macOS: DMG files containing Amos/Atomic Stealer with persistence via LaunchAgent

    • The malicious binaries cannot be downloaded without registration codes – given by the social media group admins –  to limit analysis exposure

    • Browser-based attacks including wallet drainers targeting Phantom wallet users

  6. Infrastructure Sharing: Evidence of template and infrastructure sharing between different traffer groups:

    • Vixcall template reused by Wagmi for their Splare meeting software

    • Common API paths for payload delivery across different campaigns

    • Shared hosting infrastructure between different scam operations

    • Domains with similar naming conventions/themes created after previous domains are taken down

    • Standardized victim tracking using build IDs in Telegram logs

There is a clear evolution from opportunistic phishing to highly targeted attacks against the Web3/crypto ecosystem, with threat actors continuously adapting their technical capabilities and social engineering techniques to evade detection and maximize success rates. The operation has clearly grown from isolated incidents to a sophisticated ecosystem of interconnected fake companies, mimicking the "CrazyEvil" TPPs documented in previous research, a traffer group that has reportedly generated millions in revenue from cryptocurrency theft. While definitive attribution to CrazyEvil or associated teams cannot be indisputably confirmed, the tactical patterns align closely. 

We assess with moderate confidence that there is a connection between the Marko Polo and Wagmi traffer operations.  This assessment is based on multiple converging indicators, including: shared website design patterns and information architecture; parallel operational pivots from AI productivity applications to crypto/web3 themes; concurrent domain registration timeframes; similar legitimacy-building tactics; consistent naming conventions (nexvoo, nexbee, swox, dexis, yovox, slax, klast); distribution of identical malware families (HijackLoader and AMOS); comparable domain replacement agility when facing blocks; and preference for similar TLDs (.app, .io, .ai). While each indicator individually provides weak correlation, their convergence suggests shared infrastructure, methodology, or coordinated operations.

This operation showcases the extensive effort threat actors invest in establishing legitimate-appearing companies, combined with their use of increasingly evasive malware to target cryptocurrency holders.

Indicators of Compromise

C2 servers

cnfreund[.]com

hojosy[.]com

sumachpress[.]com

macattic[.]com

woaihuanbao[.]com

pelletibor[.]com

dloutstanding[.]com

itmab[.]com

addonsystem[.]com

shedegei[.]com 

tmcxchem[.]com 

trouveur[.]com 

opulous-app[.]live





Distribution/Malicious websites

speeka[.]app

speeka[.]ai

lapeai[.]io

lapeai[.]app

nexbee[.]app

nexbee[.]ai

flowus[.]tech

flowus[.]world

flowus[.]org 

flow-us[.]com 

flowus[.]io 

flowus[.]app 

flowus[.]com[.]co 

primalverse[.]io

metatoy[.]io

metatoy[.]ai

streamyard[.]ai

streamyard[.]t[.]com 

streamyard[.]studio 

streamyard[.]life

streamyard[.]zone 

streamyard[.]app 

scoil[.]ai

scoil[.]cc

klast[.]ai

slaxai[.]app

swox[.]ai 

swoxapp[.]com 

swox[.]us

swox[.]cc

dexis[.]io 

dexis[.]app

jandi[.]ai

beesy[.]app

cryptalix[.]ai

solus[.]run

solus[.]today

solus-app[.]digital 

talkon[.]app 

talkonai[.]app

talkonai[.]io 

talkon[.]cc 

vocalink[.]live 

yovox[.]xyz 

yovox[.]space 

yovox[.]world 

yonda[.]tech 

yonda[.]us

nexvoo[.]app

nexvoo[.]us 

nexvoo[.]net 

nexoracore[.]org 

nexloop[.]cc 

nexloop[.]me

nexloop[.]xyz 

zynce[.]org 

opulousai[.]com 

opulousapp[.]com 

opulousapp[.]org 

texdezyn[.]com 

kkkkkk[.]digital

vixcall[.]com

vixcallai[.]io

vixcall[.]io

vixcall[.]live

shperia[.]app 

playspheria[.]xyz

spheriagames[.]xyz

delgone[.]space

asterdex-drop[.]eu

asterdrop[.]run

fluencedrop[.]digital

aster-dex[.]eu

asterdrop[.]digital

sunperp[.]icu

meteoradrop[.]com

fluencedrop[.]eu

defillama[.]pro

coinkbase[.]com

blurbox[.]xyz

1inhc[.]com

laxminarayanfinancepvtltd[.]com

news18bangla[.]in

pancakeswap[.]network

metamask987[.]com

pancakescwap[.]finance

claim.arbdogeai[.]xyz



SHA256

0e1dcb37220190d6bf0923da49fb0cbb5575e15f6d6bfa465dfe0facb5405f52

2aea8a0c9008ee45b35ca6df79a987f22fdc869c539a0770daa986fafa68bb0e

f4789d5904f3cb214e03d5978b41a989a51e2833856c8079a6adab50031ec2c0

3a21e48a711ee1ad6ebe8a291d0289a7b12414f74bb5839f12a83736aa1c34de

78af2a44ac04dd59a7082e56d893bcb756f362ae03a9e00b2c8c0ffd000cce56

7c5583fff213bd93237b110c274a7ceb8063dd7ee1d0b4fd38351e2975be5cee

99f346bb7d3fc6c9f7148c20a9b7d76687ab52233f627252bab524d0b5c0d124

d8d3b736e8acd28e227c07f533e4be70a085c9cd22858b0816b1aa968c302db9

e643b9c1050e152e9729d0765e0be588c6383a50ecd4edb8bd7a7322f1d27a2e

c18e1ffc26dd255f8539d241560177a4a088980b12c6c70fef4a43e35c0b80f6

56db138c5104db75c6f4231a787d600e20a8baf40f0ee6439736e8ea3f0dd008

9899780232af2aeb82caa8d3d73f9209477256669b1c77f8434d975707804d5f

9bc667f5c068227368178267eff7c6a65e406dd02186856e76221a2d25057e17

0d7191500b429e6d258dc09807e52b59dd739c6636ce01ae945caf3170d49325

1f5823734e47720858f9d49060cde39c3a7313d99198c65dca70d67b2b1eff0c

4190e1a35960c3a6df633cec467ac6243917a626f1bb27da8619d3f3cad6996a

469734a8acf5f8adf7869abaf1958ba12373aa4434a9aae7b4232e497ba845a2

490b38eba85b6e32ddf95b9c51d6284ba3730bf640e0a13f1d52b435d262493b

cd03e9300bb9b923e4af97cde2b2b896272d803b74e42c6234f57610788053b9

ec8cdf1f2a0d43aa9a3cade5a3a1f6aaa5cd3f3c61cd442b31f523a066c6d286

31373f9fa6608dc5f5ebeae69ef28d819e52d0d13d5e83ca84e7326bf627a220

9f093863c2a17ecd3ff9dcb3243008de5feb3adc1a6e5db281b06c4612d27f91

d6080024e295c3dedaf15f9d30c159ea2d5fc49ab4d16a1462669fb03824a4ab

ffe6f590b2317b800ac1174e64a09d95bb6e3453f84ae1b321679647584abd5c

1450b45187c0f485fad45496717be8e45dec1d4f619ee4294febeeb1d01fd66c

2da1ef66fe4a06954b0f4cabcf8aff063bdf3ab5dc885ec5d4824e5917b7b315

96dae56157c83592173bb690733271e45fcf35dfa83c63e7c7583eada041da45

e98c9a8116f1264b96eeec6dbf88ee158678e73bbfd9588f903ba57380e52283

f46efe00b3a4276ec32460d49073225d9001af29e54ff5d10b10120cc365a669

33c12dad258263b2c2e35b503892fd242726beaff5ff83ad49d990c8e1d00205

4e7559d17bf416dafb08bd5867169a9eb4457505fc696b352f4950726029b80e

602ef7a402596575d3b4157c70f677cfb5db795165fb2e5b5af12d2d69bde77f

ae51a24354d6c863a25bbf9b45cf50db2a514ffc2714d551ed8639b52530e50b

ae9b40767de258feaac87186168e070cbc5af1120723bf1ef5068a534a7e0350

dce96f220fca15e105160d35cddb9022207da667c22a6607ea1f3249b0653287

fbb2e77ec1bdd7de4fb18d203a194f66daf77a98a9fa73e0face2f8e5c210b36

1650500d5d6bb35c81f8eaf1cf144774822e854e39e749172b69ddf781b802d1

20d0339a9ec51028c1cd28065e83f8aa9e74c0ff95041ae306d786b22282d5e6

73108dfaa8a0753f8cfabccad0e3e449f7691e8a11c81a30995cce517175ea4c

76440e548a502da8f54bcb97f9804df7bbea02272782abca870b4ba72259d1c2

97e710dceb55e68455f8bfb3247415d0b42c936b2205d56c10dc26621790a4f1

a3f8c8669f6355884030919fbdb2c164589428fdecf1188694633f6ea68946b2

a65ce6aee2140e44ccb35e2e61a6f56f62745bb4ec47395ce5aefc5e6fac4f10

faf1f944a96e112ed2eff1bf1d5154ba25f8793feedec46eaffbedb95ac95149

2625199238ecc4c980f9bf2072ccf9bbe2b643e732a807d1750f3700d3e1a087

39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4

66ea34eb0a6e41dcb21620a1dc6c3c224e99c8fa7831d7fbd3cf187b97bc54c0

6b4af4590b3c4da860428c8b6aaacecb9f5340d7b6afa30f1cd726654e3af381

af8fb1eb39c43742df7a42b5722f3760ad8d50b98229cbbef0d1c78bbd2f74b6

f3150607a5969442f7bdbc546357273fab290bfb9b5b50349e8b6a57e678c85a

b4b950df9574b5fe83d3d10058422d944c3887a269ce64074b88f87ada78c84c

367a9e988aa72e96a38c026c41ed595f8b60db22487c7ce62dd434c68279754e

19af43c086ffd982b76b2a9d687057a278c1c0aa712d3816f5b913aee4d6a1cc

b558723fb69c3519bfc67bd2a3d9b43f7e0942422f92e6ebf307137ac800b323

d8372c2a47d09ebd914aed0c3c8c24a7f64d514c7acc199e47e5c1c0b5012849

875c1a2a1971d3f406c77195f9643a26514047e0d403b49d1a6345e2826f83ee

382781e889eaf60d150f2d5b838c36d5b46eb517395ce9dd7c84e5e32e2dcbd1

f4789d5904f3cb214e03d5978b41a989a51e2833856c8079a6adab50031ec2c0

237ad929dcf3a0af15d25a0d4c79e563caddc7d0864ab1801dcaa18ca60bf06a

e23c189a2a8e4b23ad165f878fa1416491313cdae5aa746485eb8e6982064dca

2456565ce958e46bc919a83236fe78afaa04d2001e052d105ddf6163662efb77

74723f21739f2245b40e9c5152259a12c442c094ddc4066f81d396abeef24769

8453e51c613da106911e10a5181a670c59c4f314c44717f283d2796ae7187b17

9f4c3fd8f5cf10b9cfb2eae6f3c49f29f713d5224825cb14d96670e6f6245026

c60f79c9fd9432f493256c8c5aa794dd141f9480c3d4fe187e4c48ceaf79088f

7cf9bdc16fa6c7b650ecc6c064dc0fe051af753872f274d5868226323e1c7e2d

7949cd61121371c8e7c142206f3759c8d4728ec95d1fa61ccdd593793357c31c

e7c279525833df14dee323e66902672d10db8129a3361bbbdcbbb8f0a3331262

9f7e82e850b448cf8525b5031c49737ead7b14740f8d9780e1516886d8a7696d



References


  1. https://www.darktrace.com/fr/blog/crypto-wallets-continue-to-be-drained-in-elaborate-social-media-scam

  2. https://cyberstrategy1.medium.com/nexvoo-scam-the-technical-approach-fc6389688eea

  3. https://web.archive.org/web/20251112125112/https://go.recordedfuture.com/hubfs/reports/cta-2024-0917.pdf 

  4. https://slowmist.medium.com/cunning-phishing-in-the-dark-forest-493221c34687 

  5. https://lumma-labs.com/the-wagmi-manual-copy-paste-and-profit-2803a15bf540?gi=da4a2d3a5885

  6. https://www.cadosecurity.com/blog/meeten-malware-threat

  7. https://web.archive.org/web/20250810175036/https://go.recordedfuture.com/hubfs/reports/cta-2025-0123.pdf