AML Crypto was contacted by a victim of a Dust attack scam. The victim (identity withheld to protect personal data) told her story, providing key information about the events that led to the loss of funds.
It all started with a routine transfer of funds between the victim and her regular counterparty, with whom successful transactions had previously taken place
When analyzing the data provided, the AML Crypto team discovered that the victim had fallen victim to a Dust attack.
In Part I of the investigation, we will examine the flow of funds that were stolen in this incident.
To further analyze the attacker’s actions related to the laundering of funds on the blockchain, we consider a layered diagram that illustrates the connections between the addresses of the victim, the attacker, and the centralized services on the blockchain (interconnection graph):
The second part of the investigation focused on the dummy token that the attacker used to populate the victim’s address [17].
Analyzing the attacker’s address [11] revealed an address [8] associated with the creation of fake tokens. The process of issuing tokens is relatively simple for experienced market participants and requires only a small cost for smart contract interaction fees. The transactions involved in token creation have been identified through links between address [8] and other addresses [1], [6], [7], [9], [10].
Address [8] used funds withdrawn from centralized exchanges (addresses [2], [3], [4], [5]) to cover commissions. These links provide an opportunity to direct formal inquiries to the exchanges in order to obtain data on the account owner who initiated the withdrawal of funds to realize the fraudulent scheme.
Addresses [12], [13], [14], [15], [16] belong to unknown users who, presumably, are also victims of this scheme, but are not directly related to the victim from the described incident.