Star Tower Chain
Star Tower Chain
Star Tower Chain
  • StarTower
  • basic knowledge
    • What is blockchain
    • What is a decentralized wallet
    • What are private keys, mnemonic words, and passwords?
    • What is the miner's fee?
    • What is DeFi
    • What is DEX
    • What is a keystore
    • What is a hardware wallet
    • What is a cold wallet?
    • What is a hot wallet?
    • What is an observation wallet
    • What is a multi-signature wallet?
    • What is a plug-in wallet?
    • What is Passphrase?
  • Safety Knowledge
    • Common fraud cases
      • Beware of custom RPC node scams
      • Stay away from fake links and wallet scams
      • Beware of fake customer service wallet verification scams
      • Beware of SMS sharing fake wallet scams
      • Beware of TRON malicious permission change scams
      • Beware of "zero amount" transfer scams
      • Beware of precise fake addresses
      • Beware of receiving code fraud
      • Beware of new airdrop scams
      • Beware of Mnemonic Phrase Sharing Scams
      • BSC chain malicious authorization fraud
      • Fake Airdrop Scam
      • Fake QR code scam
      • Fake link/App scam
      • Phishing scam
      • Fake Token Scams
      • Fake customer service scam
      • Dapp authorization scam
  • Safety measures
    • How to use revoke.cash authorization management tool
    • Precautions for using third-party DApps
    • Guidelines for using the token contract security detection tool
    • Please keep your private key/mnemonic safe!
    • Please be careful with tokens or website links marked as risky
    • A text to distinguish whether the StarTower wallet is genuine
    • Official website genuine wallet verification method
    • Authorization (Approve) is explained in detail!
    • How to view/cancel malicious Approve (authorization)?
    • Asset loss prevention
    • Asset theft prevention
    • MEV protection function tutorial
    • Fake wallet solution
    • Safety Operation Guidelines
    • Precautions for using third-party DApps
  • Wallet FAQ
  • BTC Wallet
    • Adding/transferring/trading runes
    • What is Runes Protocol
    • What is a Bitcoin ETF?
    • A quick overview of Bitcoin, Lightning Network, Nostr, Nostr Assets Protocol, and Taproot Assets Pro
    • Use StarTower Wallet to transfer BRC-20, one step faster
    • How to use BTC acceleration function
    • View and send Ordinals in your wallet
    • What is a Partially Signed Bitcoin Transaction (PSBT)
    • What are Bitcoin Ordinals
    • What is BTC network congestion and how to solve it.
    • What is Observer Wallet
    • What is the change address?
    • What is the UTXO model?
    • What is OP_RETURN?
    • What is a path
    • What is Taproot?
    • What is Segregated Witness
  • Group 1
    • About RBF and CPFP
Powered by GitBook
On this page
  1. Safety Knowledge
  2. Common fraud cases

Beware of new airdrop scams

Recently, we received feedback from users who said they received airdropped tokens from exchanges (this scam can imitate any platform label). When users participated in the execution of the tokens, they found that there were some problems with the tokens, such as being able to buy but not sell. In response, the StarTower security department analyzed the on-chain information reported by users and found that this was a new type of scam that forged transaction records of transfers between any addresses by using browsers/wallets to parse transfer transaction records. This type of transaction record forgery can only target tokens issued by scammers. Mainstream token trading scammers cannot forge it.

Therefore, the most effective way to prevent such airdrop scams is to not believe in any airdrops from unknown sources. Exchanges will not take the initiative to airdrop to on-chain wallets. In the face of a complex environment, you must accumulate self-security knowledge, strengthen the study of anti-fraud knowledge, do not believe anyone who actively chats with you privately, do not use any recommended official websites or apps, do not open third-party links and authorize them at will, and keep private keys and mnemonics safely and do not lose or share them with anyone.

PreviousBeware of receiving code fraudNextBeware of Mnemonic Phrase Sharing Scams

Last updated 7 months ago