Nearly half of the new tokens are suspected of fraud: A deep analysis of the $800 million Rug Pull case in the Ethereum ecosystem.

Unveiling the Chaos of Ethereum Token Ecosystem: An In-Depth Investigation of Rug Pull Cases

Introduction

In the Web3 world, new tokens are constantly emerging. Have you ever wondered how many new tokens are issued every day? Are these new tokens safe?

These concerns are not unfounded. In the past few months, a security team has captured a large number of Rug Pull transaction cases. Notably, all the tokens involved in these cases are newly launched tokens that have just gone on-chain.

Subsequently, the security team conducted an in-depth investigation into these Rug Pull cases and discovered the existence of organized criminal groups behind them, summarizing the patterned characteristics of these scams. Through a thorough analysis of the methods used by these groups, a possible scam promotion channel for Rug Pull groups was identified: Telegram groups. These groups leverage the "New Token Tracer" feature in certain groups to attract users to purchase scam Tokens and ultimately profit through Rug Pull.

The security team has compiled the token push information from these Telegram groups from November 2023 to early August 2024 and found a total of 93,930 new tokens pushed, of which 46,526 tokens are related to Rug Pulls, accounting for as high as 49.53%. According to statistics, the total investment cost behind these Rug Pull tokens by the gang is 149,813.72 ETH, and they profited 282,699.96 ETH with a return rate as high as 188.7%, equivalent to about 800 million USD.

In-depth Investigation of Rug Pull Cases, Revealing the Chaos in the Ethereum Token Ecosystem

To assess the proportion of new tokens pushed by Telegram groups on the Ethereum mainnet, the security team compiled data on new token issuances on the Ethereum mainnet during the same time period. The data shows that a total of 100,260 new tokens were issued during this period, with tokens pushed through Telegram groups accounting for 89.99% of the mainnet. On average, about 370 new tokens are born each day, far exceeding reasonable expectations. After an in-depth investigation, the truth discovered is disturbing—at least 48,265 tokens are involved in Rug Pull scams, accounting for as much as 48.14%. In other words, almost one in every two new tokens on the Ethereum mainnet involves a scam.

In-depth Investigation of Rug Pull Cases, Unveiling the Chaos in the Ethereum Token Ecosystem

In addition, more Rug Pull cases have been found in other blockchain networks. This means that not only the Ethereum mainnet, but the overall security situation of the new token ecosystem in Web3 is far more severe than expected. Therefore, this report hopes to help all Web3 members raise their awareness of prevention, remain vigilant in the face of the endless scams, and take necessary preventive measures in a timely manner to protect their asset security.

ERC-20 Token

Before we officially start this report, let's first understand some basic concepts.

ERC-20 tokens are one of the most common token standards on the blockchain today. It defines a set of specifications that allow tokens to be interoperable between different smart contracts and decentralized applications (dApp). The ERC-20 standard specifies the basic functions of tokens, such as transferring, checking balances, and authorizing third parties to manage tokens. Due to this standardized protocol, developers can more easily issue and manage tokens, simplifying the creation and use of tokens. In fact, any individual or organization can issue their own tokens based on the ERC-20 standard and raise startup funds for various financial projects through token presales. Because of the wide application of ERC-20 tokens, it has become the foundation for many ICOs and decentralized finance projects.

The USDT, PEPE, and DOGE we are familiar with are all ERC-20 tokens, and users can purchase these tokens through decentralized exchanges. However, certain scam groups may also issue malicious ERC-20 tokens with backdoor codes, list them on decentralized exchanges, and lure users into making purchases.

Typical Scam Cases of Rug Pull Tokens

Here, we borrow a case of a Rug Pull token scam to gain an in-depth understanding of the operational model of malicious token scams. First, it should be noted that a Rug Pull refers to the fraudulent act where the project team suddenly withdraws funds or abandons the project in a decentralized finance project, resulting in significant losses for investors. Rug Pull tokens are tokens specifically issued to carry out such fraudulent activities.

The Rug Pull tokens mentioned in this article are sometimes referred to as "Honey Pot( tokens" or "Exit Scam) tokens", but for the sake of consistency, we will refer to them as Rug Pull tokens in the following text.

( case

The attacker ) Rug Pull gang ### deployed the TOMMI Token using the Deployer address ( 0x4bAF ), then created a liquidity pool with 1.5 ETH and 100,000,000 TOMMI, and actively purchased TOMMI tokens through other addresses to fake the trading volume of the liquidity pool to attract users and on-chain new listing bots to buy TOMMI tokens. After a certain number of new listing bots were tricked, the attacker executed the Rug Pull using the Rug Puller address ( 0x43a9). The Rug Puller dumped 38,739,354 TOMMI tokens into the liquidity pool, exchanging it for about 3.95 ETH. The token source for the Rug Puller came from the malicious Approve authorization of the TOMMI token contract, which granted the approve permission for the liquidity pool to the Rug Puller when the TOMMI token contract was deployed, allowing the Rug Puller to directly withdraw TOMMI tokens from the liquidity pool and then perform the Rug Pull.

( related address

  • Deployer:0x4bAFd8c32D9a8585af0bb6872482a76150F528b7
  • TOMMI Token:0xe52bDD1fc98cD6c0cd544c0187129c20D4545C7F
  • Rug Puller:0x43A905f4BF396269e5C559a01C691dF5CbD25a2b
  • Rug Puller disguised user ) one of ###:0x4027F4daBFBB616A8dCb19bb225B3cF17879c9A8
  • Rug Pull fund transfer address: 0x1d3970677aa2324E4822b293e500220958d493d0
  • Rug Pull funds retention address: 0x28367D2656434b928a6799E0B091045e2ee84722

( related transactions

  • Deployer obtains startup capital from the exchange: 0x428262fb31b1378ea872a59528d3277a292efe7528d9ffa2bd926f8bd4129457
  • Deploy TOMMI Token: 0xf0389c0fa44f74bca24bc9d53710b21f1c4c8c5fba5b2ebf5a8adfa9b2d851f8
  • Create liquidity pool: 0x59bb8b69ca3fe2b3bb52825c7a96bf5f92c4dc2a8b9af3a2f1dddda0a79ee78c
  • The fund transfer address sends funds to one of the disguised users ) ###:0x972942e97e4952382d4604227ce7b849b9360ba5213f2de6edabb35ebbd20eff
  • Disguise user to purchase Token ( one of ):0x814247c4f4362dc15e75c0167efaec8e3a5001ddbda6bc4ace6bd7c451a0b231
  • Rug Pull:0xfc2a8e4f192397471ae0eae826dac580d03bcdfcb929c7423e174d1919e1ba9c
  • Rug Pull sends the funds to the intermediary address: 0xf1e789f32b19089ccf3d0b9f7f4779eb00e724bb779d691f19a4a19d6fd15523
  • The transit address sends funds to the fund retention address:0xb78cba313021ab060bd1c8b024198a2e5e1abc458ef9070c0d11688506b7e8d7

( Rug Pull process

  1. Prepare attack funds.

The attacker charged 2.47309009 Ether to the Token Deployer)0x4bAF### through the exchange as starting funds for the Rug Pull.

  1. Deploy Rug Pull tokens with backdoors.

Deployer creates TOMMI Token, pre-mining 100,000,000 Tokens and allocating them to itself.

  1. Create the initial liquidity pool.

The Deployer created a liquidity pool using 1.5 ETH and all pre-mined tokens, obtaining approximately 0.387 LP tokens.

  1. Destroy all pre-mined Token supply.

The Token Deployer sends all LP Tokens to the 0 address for destruction. Since the TOMMI contract does not have a Mint function, the Token Deployer has theoretically lost the ability to Rug Pull. ( This is also one of the necessary conditions to attract new listing bots. Some new listing bots will assess whether the newly added Tokens in the pool pose a Rug Pull risk. The Deployer also sets the contract Owner to the 0 address to trick the fraud detection programs of the new listing bots ).

  1. Faked trading volume.

Attackers actively purchase TOMMI tokens from the liquidity pool using multiple addresses, inflating the trading volume of the pool, further attracting new bot participants (. The basis for determining that these addresses are disguised by attackers: The funds of the related addresses come from the historical fund transfer addresses of the Rug Pull gang ).

  1. The attacker initiated a Rug Pull through the Rug Puller address (0x43A9), directly transferring 38,739,354 Tokens from the liquidity pool through the token's backdoor, and then used these Tokens to smash the pool, extracting about 3.95 Ether.

  2. The attacker sends the funds obtained from the Rug Pull to the intermediary address 0xD921.

  3. The transfer address 0xD921 sends funds to the fund retention address 0x2836. From here we can see that after a Rug Pull is completed, the Rug Puller will send the funds to a certain fund retention address. The fund retention address is a collection point for funds from numerous monitored Rug Pull cases, and it will split most of the received funds to initiate a new round of Rug Pull, while a small portion of the remaining funds will be withdrawn via exchanges. Several fund retention addresses have been identified, and 0x2836 is one of them.

( Rug Pull backdoor code

Although the attackers have attempted to prove to the outside world that they cannot perform a Rug Pull by destroying LP Tokens, in reality, they have left a malicious approve backdoor in the openTrading function of the TOMMI token contract. This backdoor allows the liquidity pool to approve the transfer of tokens to the Rug Puller address when creating the liquidity pool, enabling the Rug Puller address to directly transfer tokens from the liquidity pool.

The implementation of the openTrading function is shown in Figure 9. Its main function is to create a new liquidity pool, but the attacker called the backdoor function onInit) within this function, as shown in Figure 10, allowing uniswapV2Pair to approve the transfer of tokens with an amount of type###uint256( to the _chefAddress address. Here, uniswapV2Pair is the liquidity pool address, _chefAddress is the Rug Puller address, and _chefAddress was specified during the contract deployment, as shown in Figure 11.

![In-depth Investigation of Rug Pull Cases, Unveiling the Chaos in the Ethereum Token Ecosystem])https://img-cdn.gateio.im/webp-social/moments-e5f43d39fa77597ff8f872a1d98cd3ac.webp(

![In-depth Investigation of Rug Pull Cases, Revealing the Chaos in the Ethereum Token Ecosystem])https://img-cdn.gateio.im/webp-social/moments-ed67ee56316de1b6a3f2649e45ceeb82.webp(

![In-depth Investigation of Rug Pull Cases, Unveiling the Chaos in the Ethereum Token Ecosystem])https://img-cdn.gateio.im/webp-social/moments-21fdee332b94d46b0a63310dfa494de9.webp(

) Mode of operation

By analyzing the TOMMI case, we can summarize the following four characteristics:

  1. The Deployer obtains funds through the exchange: The attacker first provides a source of funds for the deployer address (Deployer) through the exchange.

  2. Deployer creates a liquidity pool and burns LP tokens: After creating the Rug Pull token, the deployer will immediately create a liquidity pool for it and burn the LP tokens to increase the project's credibility and attract more investors.

  3. Rug Puller exchanges a large amount of Tokens for ETH in the liquidity pool: Rug Pull address ( Rug Puller ) uses a large amount of Tokens ### usually far exceeding the total supply of Tokens ( to exchange for ETH in the liquidity pool. In other cases, Rug Puller also obtains ETH from the pool by removing liquidity.

  4. Rug Puller transfers the ETH obtained from the Rug Pull to the fund retention address: The Rug Puller will transfer the ETH obtained to the fund retention address, sometimes through

ETH1.28%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 6
  • Share
Comment
0/400
MoneyBurnervip
· 07-29 19:02
Only after the Floor Price was fully taken did I realize that the on-chain is full of traps... My mentality collapsed this time, next time I will bet heavily on long orders to recoup investment!
View OriginalReply0
BearMarketBrovip
· 07-29 18:57
Play people for suckers one after another...
View OriginalReply0
ZkProofPuddingvip
· 07-29 18:55
Suckers are still frantically earning new coins.
View OriginalReply0
AlwaysAnonvip
· 07-29 18:52
Hi, still dreaming of buying the dip.
View OriginalReply0
ContractHuntervip
· 07-29 18:52
I saw through those traps in the tg group early on.
View OriginalReply0
MetaDreamervip
· 07-29 18:35
The suckers were pulled out before they had fully grown.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)