Fraudsters are targeting the users of Basic Attention Token (BAT) in a new fraud that aims to phish for private keys of the users. in an email seen by Cryptoinfowatch titled, ” Brave – Bounty program launched The total distribution to participants will be 1,500,000$ In Tokens BAT”, the recipient was directed to a Google form which they are expected to fill to qualify for the bounty.
The content further described the features of the Brave browser and stated that to qualify for the bounty, users would need to update their Brave browser through a link that is obviously contains a code that’ll steal the private keys of anyone that downloads them.
The fraudster’s email is firstname.lastname@example.org and the address of the other recipients of the scam email could be seen having been pasted in the bcc field while composing. A second email is email@example.com which indicates that the fraudster targets several coins for their phishing scam. There is even a third email probably from the same fradster, this is firstname.lastname@example.org. Perhaps this would pop on down the line for security agencies such as FBI to nab these fraudsters.
In the email, they wrote:
“Hello, dear participants, we inform you about the distribution of BAT tokens. Please note that each participant who has fulfilled the program conditions will receive 1500 BAT coins.
To receive tokens, you need to go through a free registration in which the Twitter @Name, Bitcointalk Username and ETH address lines must be filled.Then upgrade to the latest version or install the Brave browser on your Windows or MacOS.
All data on AirDrop and a link to the official website are listed on the Google form…
Brave Moderator Team.