Unraveling a New Scam: Maliciously Modifying RPC Node Links to Steal Assets

5/8/2024, 2:56:42 PM
Intermediate
BlockchainWallets
Users often focus solely on whether funds have been credited to their wallets, overlooking potential underlying risks. Through a series of seemingly genuine operations like transferring small amounts, scammers deceive users into falling for their schemes. This article analyses the malicious process, reminding users to exercise caution and vigilance during transactions.

Background:

Feedback from our partner imToken has revealed a new type of cryptocurrency scam. This scam primarily targets offline physical transactions using USDT as the payment method. It involves maliciously modifying the Ethereum Remote Procedure Call (RPC) node links to carry out fraudulent activities.

Scam Process

The Slowmist Security team has analysed this scam, and the attacker’s malicious process is as follows:

First, the scammer lures the target user into downloading the official imToken wallet and gains their trust by sending them 1 USDT and a small amount of ETH as bait. Then, the scammer guides the user to redirect their ETH RPC node address to the scammer’s node (https://rpc.tenderly.co/fork/34ce4192-e929-4e48-a02b-d96180f9f748).

This node has been modified by the scammer using Tenderly’s Fork feature, falsifying the user’s USDT balance to make it appear as if the scammer has already deposited funds into the user’s wallet. Seeing the balance, the user is led to believe that the payment has been received. However, when the user tries to transfer miner fees to cash out the USDT from their account, they realize they have been scammed. By then, the scammer has already disappeared.

In fact, in addition to the balance display being modified, Tenderly’s Fork function can even change contract information, posing a greater threat to users.

(https://docs.tenderly.co/forks)

Here, we need to address what RPC is. To interact with the blockchain, we require a suitable method to access network servers through a standard interface. RPC serves as a connection and interaction method, enabling us to access network servers and perform operations such as viewing balances, creating transactions, or interacting with smart contracts. By embedding RPC functionality, users can execute requests and interact with the blockchain. For instance, when users access decentralized exchanges through wallet connections (like imToken), they are communicating with blockchain servers via RPC. Generally, all types of wallets are connected to secure nodes by default, and users do not need to make any adjustments. However, if users carelessly trust others and link their wallets to untrusted nodes, the displayed balances and transaction information in their wallets may be maliciously modified, leading to financial losses.

MistTrack Analysis

We used the on-chain tracking tool MistTrack to analyze one of the known victim wallet addresses (0x9a7…Ce4). We can see that this victim’s address received a small amount of 1 USDT and 0.002 ETH from the address (0x4df…54b).

By examining the funds of the address (0x4df…54b), we found that it has transferred 1 USDT to three different addresses, indicating that this address has already been scammed three times.

Tracing further up, this address is associated with multiple trading platforms and has interacted with addresses marked as “Pig Butchering Scammer” by MistTrack.

Summary

The cunning nature of this scam lies in exploiting users’ psychological weaknesses. Users often focus solely on whether funds have been credited to their wallets, overlooking potential underlying risks. Scammers take advantage of this trust and negligence by employing a series of seemingly genuine operations, such as transferring small amounts, to deceive users. Therefore, the Slowmist Security team advises all users to remain vigilant during transactions, enhance self-protection awareness, and avoid trusting others blindly to prevent financial losses.

Disclaimer:

  1. This article is reprinted from Slowmist Technology, with the original title “Unraveling a New Scam: Maliciously Modifying RPC Node Links to Steal Assets”. The copyright belongs to the original author [Lisa]. If there are any objections to the reprint, please contact the Gate Learn team, who will handle the matter according to the relevant procedures.

  2. Disclaimer: The views and opinions expressed in this article are solely those of the author and do not constitute any investment advice.

  3. Other language versions of this article are translated by the Gate Learn team and may not be copied, disseminated, or plagiarized without mentioning Gate.io.

Share

Crypto Calendar

Major Events
SOL Strategies will begin trading its common stock on the Nasdaq Global Select Market under the ticker symbol STKE starting September 9.
SOL
-0.77%
2025-09-09
Token unlock
Sonic (S) will unlock 150 million Tokens on September 9 at 8:00, valued at approximately 45.68 million USD, accounting for 5.02% of the Circulating Supply.
S
-4.29%
2025-09-09
Token unlock
Movement (MOVE) will unlock 50 million Tokens on September 9 at 20:00, worth approximately 5.94 million USD, accounting for 1.89% of the Circulating Supply.
MOVE
0.9%
2025-09-09
Hackathon
Arbitrum launches a three-week Open House India online buildathon featuring workshops, panel talks, AMA sessions, pitch practice, and a build competition. The program opens on Aug 22 with a kickoff stream, followed by a panel on building globally from India and a builder speed-dating session on Discord. Across the schedule: tooling & Solidity onboarding, proxy patterns with community experts, on-chain chess in Rust via Stylus, common smart-contract security pitfalls, token design with a guest from the Ethereum Foundation, and three “friendly pitch” rounds on Aug 29, Sep 3, and Sep 5. Winners are announced on Sep 10 with a Proof-of-Build celebration.
ARB
-4.33%
2025-09-09
“Facade” by Gavin Meeler Launch
SuperRare is set to feature “Facade”, a new collection by artist Gavin Meeler, starting September 10. The drop includes three unique 1/1 pieces—On the Brink, Unraveled, and The Glare—each with a reserve price of 1.5 ETH. The expressive, abstract works will be available on the on-chain art marketplace for a limited bidding period.
RARE
-4.82%
2025-09-09

Related Articles

Solana Need L2s And Appchains?
Advanced

Solana Need L2s And Appchains?

Solana faces both opportunities and challenges in its development. Recently, severe network congestion has led to a high transaction failure rate and increased fees. Consequently, some have suggested using Layer 2 and appchain technologies to address this issue. This article explores the feasibility of this strategy.
6/24/2024, 1:39:17 AM
The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline
Beginner

The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline

This article explores the development trends, applications, and prospects of cross-chain bridges.
12/27/2023, 7:44:05 AM
Sui: How are users leveraging its speed, security, & scalability?
Intermediate

Sui: How are users leveraging its speed, security, & scalability?

Sui is a PoS L1 blockchain with a novel architecture whose object-centric model enables parallelization of transactions through verifier level scaling. In this research paper the unique features of the Sui blockchain will be introduced, the economic prospects of SUI tokens will be presented, and it will be explained how investors can learn about which dApps are driving the use of the chain through the Sui application campaign.
8/13/2025, 7:33:39 AM
How to Do Your Own Research (DYOR)?
Beginner

How to Do Your Own Research (DYOR)?

"Research means that you don’t know, but are willing to find out." - Charles F. Kettering.
12/15/2022, 9:56:17 AM
What Is Fundamental Analysis?
Intermediate

What Is Fundamental Analysis?

Suitable indicators and tools combined with crypto news make up the best possible fundamental analysis for decision-making
8/12/2025, 10:42:08 AM
Navigating the Zero Knowledge Landscape
Advanced

Navigating the Zero Knowledge Landscape

This article introduces the technical principles, framework, and applications of Zero-Knowledge (ZK) technology, covering aspects from privacy, identity (ID), decentralized exchanges (DEX), to oracles.
1/4/2024, 4:01:13 PM
Start Now
Sign up and get a
$100
Voucher!