OXFORD, U.K. — Maggio 17, 2022 —

Sophos, a global leader in next-generation cybersecurity, today released threat research about nascent cybercrime in the article, “Liquidity Mining Scams Add Another Layer to Cryptocurrency Crime.” The article is the first in a series lifting the lid off scammers who are taking advantage of the hype about cryptocurrency trading and the vast sums of digital wealth users have made (and lost) in crypto markets to lure in and swindle would-be investors.

In the investigative article, Sophos explains how the complexity of cryptocurrency and decentralized finance (DeFi), the foundations of liquidity mining, create the ideal environment for criminals to easily camouflage and carry out their malicious intentions. Scammers are not shy when it comes to targeting their victims; they proactively spam recipients via Direct Message on Twitter, What’s App, Telegram, and other social networking platforms, and innocuously chat about liquidity mining to put targets at ease. From there, scammers escalate the swindle.

liquidity-mining-cryptocrime

Above, a screen shot of an initial stage conversation from a scammer luring in a target. As spammy as this Direct Message seems, people are falling prey to what ensues: liquidity mining CryptoCrime.

“Interactions from a single Direct Message on Twitter led to Sophos’ investigation that uncovered several liquidity mining fraud rings. Liquidity mining is a form of cryptocurrency-based investment in DeFi that even when ‘legitimate' is both dubious and complicated,” said Sean Gallagher, senior threat researcher at Sophos. “The strategies behind the investments themselves are complex, and there’s no regulation beyond the ‘smart contract’ code embedded in the DeFi network’s blockchain — code that many people can’t easily interpret even when it’s publicly published. There’s also a shortage of reliable information for new investors on how these networks work. Despite these risks, liquidity mining is the latest cryptocurrency investment craze, but because of these factors it’s also the perfect platform for scammers to leverage. Unfortunately, we expect liquidity mining CryptoCrime to continue; it hasn’t peaked. Hundreds of millions of dollars are at stake.”

How Liquidity Mining Works

Legitimate liquidity mining makes it possible for DeFi networks to automatically process trades using digital currency such as Ethereum, the preferred cryptocurrency for liquidity mining. Smart contracts built into the DeFi network must rapidly determine the relative value of the currencies being exchanged and execute the trade. Since there is no centralized pool of cryptocurrency for these distributed exchanges to pull from to complete trades, they rely on crowdsourcing to provide the pool of cryptocurrency capital required to complete a trade — a liquidity pool.

To create the liquidity pool — which handles transactions between a single pair of cryptocurrencies, such as Ethereum and Tether — investors commit equal values of both cryptocurrencies to the pool. In exchange for lending that cryptocurrency to the pool, the investors get a reward based on a percentage of the trading fees associated with the DeFi protocol.

Investors also receive liquidity pool tokens (LP tokens) — a representation of their share of the pool. These tokens can be “staked,” or linked back to the exchange, further committing the original contribution, and earning the investor dividends in the form of another cryptocurrency associated with the DeFi project. The value of these reward tokens can vary widely.

“The mechanics of liquidity mining in its legitimate form provide the perfect cover for old fashioned swindles re-minted for the cryptocurrency age,” said Gallagher. “Criminal liquidity mining schemes, like traditional Ponzi schemes, give targets the illusion that they can pull their money out at any time — even allowing them to make withdrawals early on. But scammers will continuously urge targets to keep investing and to ‘invest big’ by obscuring what’s really happening with fake applications, phony profit reports and the promise of lucrative pay outs. In reality, scammers have gained control of their targets’ cryptocurrency wallets and are withdrawing currency whenever they want. Gradually, scammers empty the wallets, all while continuing to assure targets that everything is fine, and finally cut off communications.”

More information is available in “Liquidity Mining Scams Add Another Layer to Cryptocurrency Crime.”

Informazioni su Sophos

Sophos, leader mondiale e innovatore nelle soluzioni di sicurezza avanzate per neutralizzare i cyberattacchi, tra cui servizi MDR (Managed Detection and Response) e incident response, mette a disposizione delle aziende un’ampia gamma di soluzioni di sicurezza per endpoint, network, email e cloud al fine di supportarle nella lotta ai cyber attacchi. In quanto uno dei principali provider di cybersecurity, Sophos protegge oltre 600.000 realtà e più di 100 milioni di utenti a livello globale da potenziali minacce, ransomware, phishing, malware e altro. I servizi e le soluzioni di Sophos vengono gestiti attraverso la console Sophos Central, basata su cloud, e si incentra su Sophos X-Ops, l'unità di threat intelligence cross-domain dell'azienda. Sophos X-Ops ottimizza l’intero ecosistema adattivo di cybersecurity di Sophos, che include un data lake centralizzato, che si avvale di una ricca serie di API aperti, resi disponibili ai clienti, ai partner, agli sviluppatori e ad altri fornitori di cyber security e information technology. Sophos fornisce cybersecurity as a service alle aziende che necessitano di soluzioni chiavi in mano interamente gestite. I clienti possono scegliere di gestire la propria cybersecurity direttamente con la piattaforma di Sophos per le operazioni di sicurezza o di adottare un approccio ibrido, integrando i propri servizi con quelli di Sophos, come il threat hunting e la remediation. Sophos distribuisce i propri prodotti attraverso partner e fornitori di servizi gestiti (MSP) in tutto il mondo. Sophos ha sede a Oxford, nel Regno Unito. Ulteriori informazioni sono disponibili su www.sophos.it.