Cyber criminals use Elon Musk’s name in a giveaway scam

Cybercriminals used name-dropping Bitcoin vanity addresses to steal $2 million in two months

Bitcoin cryptocurrency mining

Cyber criminals are back to their old tricks, according to Cyware, and have been discovered encouraging users to send them Bitcoin with the promise to return double the amount to them as part of a giveaway.

This time around, though, cyber criminals are using Elon Musk to dupe their victims into handing over their bitcoin. Over the past two months, these savvy scammers have reportedly made more than $2 million.

The scammers are using Bitcoin vanity addresses like "1ELonMUsKZzpVr5Xok8abiXhhqGbdrnK5C” to make their scam appear credible. The vanity URLs were shared via YouTube live streams as giveaway scams.

Scammers commandeered YouTube channels Juice TV, Right Human and MaximSakulevich as part of the scam and renamed them “SpaceX Live” or “SpaceX” to promote the phoney giveaways.

Per Justin Lister, CEO of cyber-security firm Adaptiv, 67 Bitcoin vanity addresses have been associated with the scams. 

Elon Musk’s name has been used to lure unsuspecting victims before. In August 2018, a hacker broke into a verified Twitter account and rebranded it as Musk’s account. After doing so, the hacker posted fake tweets promising free bitcoin and Ethereum giveaways. Musk had over 22 million followers at the time. Similar incidents took place in November 2018 and June 2019.

In June 2018, scammers used Musk’s name on Twitter to siphon off 8,148 Ether, which was valued at $4.3 million. The scam included fake Twitter accounts attributed to popular celebrities like Musk and promised sizable giveaway returns.

Cyber criminals have used giveaways to lure their victims for years. YouTube, Twitter, Facebook, Instagram and other platforms have all experienced such scams. To prevent yourself from falling for these too-good-to-be-true offers, we recommend confirming an account holder’s identity before participating in a cryptocurrency giveaway.

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

Microsoft touts new cyber security help for nonprofits
cyber security

Microsoft touts new cyber security help for nonprofits

22 Oct 2021
A quarter of all malicious JavaScript is obfuscated
hacking

A quarter of all malicious JavaScript is obfuscated

20 Oct 2021
Organizations warned of ransomware risk from smaller operators
ransomware

Organizations warned of ransomware risk from smaller operators

19 Oct 2021
Iranian hacking group continues to target US citizens
hacking

Iranian hacking group continues to target US citizens

18 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Cryptocurrency: Should you invest?
cryptocurrencies

Cryptocurrency: Should you invest?

27 Oct 2021