Widget HTML #1

Victims Lose $165K in Sophisticated Fake Signature Crypto Scam

$165,000 Lost in Sophisticated Fake Signature Scam Targeting $BLOCK and $DOLO Crypto Holders


hokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanews



A highly coordinated crypto scam has left an investor $165,000 poorer after fraudsters exploited digital signature approvals to gain unauthorized access to two valuable crypto assets — $BLOCK and $DOLO tokens.

The case, first reported by blockchain security platform Scamsniffer, underscores the growing threat of signature-based scams in decentralized finance (DeFi). It also highlights a worrying trend: criminals are getting more patient, more professional, and more adept at exploiting gaps in user knowledge.

How the Scam Unfolded

According to blockchain transaction records, the victim unknowingly authorized malicious “approve” and “increaseAllowance” signatures — two common functions in the Ethereum ecosystem that, if misused, can give full access to a user’s assets.


hokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanews
Source: X


Once these signatures were confirmed on the blockchain, the scammers were able to drain the victim’s wallet in a matter of moments. In total, the attackers stole:

  • 646,616 $BLOCK tokens — valued at approximately $137,339

  • 117,805 $DOLO tokens — valued at approximately $28,583

The transfers, confirmed on Etherscan, show that the scammers operated through two Ethereum addresses identified as 0x0BE1cED347B9CAe3a21FEb1E416813092b6DA144 and 0xeE027495ef4E54CcD2a2BC03560d900AA3d0329b. The victim’s wallet address has also been documented: 0xD9Dbf7115cA53840D3105ED0067168f8146aa893.

Blockchain forensics suggest the attackers carefully crafted the operation, possibly setting up fake decentralized applications (DApps) or phishing websites to mimic legitimate platforms.


hokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanews
Source: X


Why This Scam Worked

One of the most effective tricks in the attacker’s playbook was exploiting the victim’s trust in what appeared to be a routine DeFi transaction. Approving a token allowance is a common step when interacting with decentralized exchanges, yield farming platforms, or staking services. But that convenience comes with risk.

When a user grants unlimited token approval — something that many DApps request for operational ease — they give the smart contract permission to move all of their tokens without further confirmation. Malicious actors can abuse this to drain entire wallets instantly.

In this case, the victim likely believed they were interacting with a legitimate service. But the scammers had created a deceptive interface that mirrored a real platform, leaving the victim unaware of the danger.

Security experts note that such scams often succeed because:

  • Complex blockchain jargon confuses even experienced users.

  • Social engineering tricks create a false sense of urgency or legitimacy.

  • Lookalike websites and contracts are designed to be indistinguishable from real ones.

  • Lack of centralized oversight in DeFi means once a signature is approved, there’s little recourse.

The Human Factor in Digital Theft

While blockchain technology is often praised for its transparency and security, incidents like this reveal that human behavior remains the weakest link.

Many crypto holders are in a rush to access new opportunities, from liquidity mining to NFT drops. That urgency can lead to overlooking small but critical details in a transaction request.

“The approve function is one of the most dangerous permissions in DeFi when misused,” said a security analyst at a major blockchain audit firm. “Once you give that kind of access, there’s no ‘undo’ button. The blockchain will execute exactly what’s been signed, no matter the intent.”

Financial and Reputational Damage

The immediate impact for the victim is clear — the loss of $165,922 worth of tokens. But the damage extends beyond one individual’s portfolio.

Such incidents tarnish the reputation of the projects involved, even though neither $BLOCK nor $DOLO’s core teams had any direct connection to the scam. New investors may be hesitant to participate in projects that have been linked, even indirectly, to security breaches.

On a macro level, these scams erode trust in the DeFi ecosystem as a whole. For a sector still in its early growth stages, trust is currency — and each high-profile theft chips away at its value.

Lessons for the Crypto Community

While law enforcement options are limited in decentralized finance, there are steps users can take to minimize the risk of falling victim to similar scams:

  1. Always double-check transaction details before signing.

  2. Avoid granting unlimited token approvals unless absolutely necessary.

  3. Use reputable DeFi platforms that have undergone third-party security audits.

  4. Regularly review and revoke allowances through tools like Etherscan’s Token Approval Checker.

  5. Bookmark official URLs to avoid phishing sites.

Wallet providers can also play a more proactive role by integrating more prominent warnings when a user is granting high-risk permissions. Some already do this, but as scams evolve, so too must the safeguards.


hokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanewshokanews,hoka news,hokanews.com,pi coin,coin,crypto,cryptocurrency,blockchain,pi network,pi network open mainnet,news,pi news  Coin Cryptocurrency  Digital currency     Pi Network     Decentralized finance     Blockchain     Mining     Wallet     Altcoins     Smart contracts     Tokenomics     Initial Coin Offering (ICO)     Proof of Stake (PoS) Airdrop   Proof of Work (PoW)     Public key cryptography Bsc News bitcoin btc Ethereum, web3hokanews
Source: X


The Bigger Picture: Professionalized Crypto Crime

Perhaps the most unsettling part of this incident is how calculated it appears to have been. Blockchain analysts point out that some scammers now wait months — or even years — after obtaining token approvals before exploiting them.

In a separate case earlier this year, a scammer waited 458 days before stealing $900,000 in assets from an unsuspecting wallet. This patience suggests a strategic shift among cybercriminals, who may accumulate multiple compromised wallets and strike at an opportune time to avoid detection.

“This is not amateur hacking,” said the analyst. “These are well-organized, highly skilled actors who understand the technology inside and out. They are exploiting the fact that in DeFi, convenience often comes at the expense of security.”

Calls for Industry-Wide Action

Security experts and community leaders are now calling for a coordinated response from developers, wallet providers, and DApp operators to prevent signature-based scams. Proposed measures include:

  • Enhanced wallet warnings for risky approvals.

  • Time-limited approvals that automatically expire after a set period.

  • Standardized transaction descriptions to make technical requests more understandable to everyday users.

  • On-chain monitoring systems that can flag suspicious behavior in real time.

Until such measures are widely adopted, however, the onus remains largely on individual users to protect themselves.

Conclusion

The $165,000 theft involving $BLOCK and $DOLO tokens is yet another reminder that in the decentralized finance world, trust must be earned, not assumed. The technology itself may be secure, but the people using it are vulnerable to deception.

As DeFi adoption grows, so too will the sophistication of scams. The best defense remains a combination of personal vigilance, community education, and industry-wide security innovations.

In the words of one blockchain security researcher: “In crypto, your signature is your handshake — and you have to know exactly who you’re shaking hands with.”


Writer @Erlin

Erlin is an experienced crypto writer who loves to explore the intersection of blockchain technology and financial markets. She regularly provides insights into the latest trends and innovations in the digital currency space.

 

 Check out other news and articles on Google News


Disclaimer:


The articles published on hokanews are intended to provide up-to-date information on various topics, including cryptocurrency and technology news. The content on our site is not intended as an invitation to buy, sell, or invest in any assets. We encourage readers to conduct their own research and evaluation before making any investment or financial decisions.


hokanews is not responsible for any losses or damages that may arise from the use of information provided on this site. Investment decisions should be based on thorough research and advice from qualified financial advisors. Information on HokaNews may change without notice, and we do not guarantee the accuracy or completeness of the content published.