{"id":18223,"date":"2021-04-19T16:01:51","date_gmt":"2021-04-19T12:01:51","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/cryptoscam-fake-antminer\/18223\/"},"modified":"2021-04-19T16:03:29","modified_gmt":"2021-04-19T12:03:29","slug":"cryptoscam-fake-antminer","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cryptoscam-fake-antminer\/18223\/","title":{"rendered":"Cryptoscam with fake mining equipment"},"content":{"rendered":"<p>Rising cryptocurrency prices have led to an increase in demand for mining equipment, but COVID-19 restrictions have led to a drop in supply. As a result, the world is witnessing <a href=\"https:\/\/www.theverge.com\/2021\/1\/12\/22227040\/nvidia-amd-gpu-shortage-rtx-3080-3070-3060-ti-3090-rx-6800-xt\" target=\"_blank\" rel=\"nofollow noopener\">another shortage of powerful video cards and cryptomining equipment<\/a>, with months-long wait times for new deliveries. Cybercriminals, as always, are looking to capitalize on the crisis.<\/p>\n<p>For example, fraudsters have been extracting cryptocurrency from buyers using a popular Google service and a clone of a mining equipment manufacturer\u2019s website.<\/p>\n<h2>How the scam works<\/h2>\n<p>Scammers and spammers have long <a href=\"https:\/\/www.kaspersky.com\/blog\/spam-through-google-services\/27228\/\" target=\"_blank\" rel=\"noopener nofollow\">relied on Google services<\/a> (Forms, Sheets, Calendar, Photos and others) for their ability to send automatic notifications to anyone the author of a file (or a calendar entry, etc.) shares it with or mentions in it. The e-mails come not from the actual author, but from no less an authority than Google, so spam filters typically let them through.<\/p>\n<p>In this case, potential cryptocurrency miners are receiving e-mails saying they have been mentioned in a Google Docs file by a user with the nickname BitmainTech (the name of a real manufacturer of mining rigs). The respectable name \u2014 @docs[.]google[.]com \u2014 in the From field helps lower the recipient\u2019s guard. The displayed username is whatever the sender wants it to be, and the sender\u2019s real e-mail address remains hidden.<\/p>\n<div id=\"attachment_39400\" style=\"width: 1162px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160200\/cryptoscam-fake-antminer-screen-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39400\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160200\/cryptoscam-fake-antminer-screen-1.jpg\" alt=\"The e-mail reads: \" bitmaintech mentioned you in a document width=\"1152\" height=\"945\" class=\"size-full wp-image-18224\"><\/a><p id=\"caption-attachment-39400\" class=\"wp-caption-text\">The e-mail reads: \u201cBitmainTech mentioned you in a document\u201d<\/p><\/div>\n<p>Bait follows in the form of an announcement of a sale on Antminer S19j mining machines. Posing as the Bitmain sales department, the scammers report that the equipment is available to be ordered, but time\u2019s running out; stock is limited and delivery is on a first-come-first-served basis. The text is replete with trust-inspiring facts and figures.<\/p>\n<div id=\"attachment_39401\" style=\"width: 1136px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160208\/cryptoscam-fake-antminer-screen-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39401\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160208\/cryptoscam-fake-antminer-screen-2.jpg\" alt=\"Fake Bitmain sales team uses Google Docs to tell victim about Antminer S19j availability\" width=\"1126\" height=\"552\" class=\"size-full wp-image-18226\"><\/a><p id=\"caption-attachment-39401\" class=\"wp-caption-text\">Fake Bitmain sales team uses Google Docs to tell victim about Antminer S19j availability<\/p><\/div>\n<p>The same text appears in the Google Docs file, only with an active link that leads, through a chain of redirects, to bitmain[.]sa[.]com, a clone of the official bitmain[.]com website (note the differences in the address). A WHOIS check reveals that the domain of the fake site was <a href=\"https:\/\/whois.ru\/bitmain.sa.com\" target=\"_blank\" rel=\"nofollow noopener\">registered<\/a> in March 2021.<\/p>\n<p>For extra credibility, the cybercriminals use the HTTPS protocol. Readers of this blog already know HTTPS protects data from interception as it travels from user to site but does not guarantee a site is bona fide. If the destination site is malicious, using a secure protocol just means the data will travel securely to the cybercriminals.<\/p>\n<div id=\"attachment_39402\" style=\"width: 1304px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160216\/cryptoscam-fake-antminer-screen-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39402\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160216\/cryptoscam-fake-antminer-screen-3.png\" alt=\"Fake Bitmain site with Antminer S19j ad\" width=\"1294\" height=\"855\" class=\"size-full wp-image-18228\"><\/a><p id=\"caption-attachment-39402\" class=\"wp-caption-text\">Fake Bitmain site with Antminer S19j ad<\/p><\/div>\n<p>On the real Bitmain website, at the time of posting, the Buy button was inactive because the last Antminer S19j batch had already been snapped up; the site does not expect new deliveries to occur before October. But on the fake resource, the coveted mining machine slides right into the shopping cart, and for the same price as the real one, $5,017.<\/p>\n<div id=\"attachment_39403\" style=\"width: 1304px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160226\/cryptoscam-fake-antminer-screen-4.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39403\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160226\/cryptoscam-fake-antminer-screen-4.png\" alt=\"The fake website lets you add the mining machine to your shopping cart\" width=\"1294\" height=\"856\" class=\"size-full wp-image-18230\"><\/a><p id=\"caption-attachment-39403\" class=\"wp-caption-text\">The fake website lets you add the mining machine to your shopping cart<\/p><\/div>\n<p>To proceed to checkout, the victim has to sign in or register. There are two possible reasons to implement this requirement: for greater authenticity or to build a database of addresses and passwords for account hacking purposes. Despite registering (using a disposable e-mail address, of course), we never received a registration confirmation message.<\/p>\n<div id=\"attachment_39404\" style=\"width: 858px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160236\/cryptoscam-fake-antminer-screen-5.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39404\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160236\/cryptoscam-fake-antminer-screen-5.png\" alt=\"Fake Bitmain authorization page\" width=\"848\" height=\"580\" class=\"size-full wp-image-18232\"><\/a><p id=\"caption-attachment-39404\" class=\"wp-caption-text\">Fake Bitmain authorization page<\/p><\/div>\n<p>In any event, the system allows the user to sign in and finalize the order. The login procedure looks quite convincing.<\/p>\n<div id=\"attachment_39405\" style=\"width: 1301px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160243\/cryptoscam-fake-antminer-screen-6.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39405\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160243\/cryptoscam-fake-antminer-screen-6.png\" alt=\"The Antminer S19j is in the cart! Or is it?\" width=\"1291\" height=\"853\" class=\"size-full wp-image-18234\"><\/a><p id=\"caption-attachment-39405\" class=\"wp-caption-text\">The Antminer S19j is in the cart! Or is it?<\/p><\/div>\n<p>At the next stage, the victim is asked to provide a delivery address. Perhaps the scammers are collecting this data for sale as well.<\/p>\n<div id=\"attachment_39406\" style=\"width: 1301px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160252\/cryptoscam-fake-antminer-screen-7.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39406\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160252\/cryptoscam-fake-antminer-screen-7.png\" alt=\"A warning that the manufacturer cannot ship to mainland China if the order is placed on the English-language site\" width=\"1291\" height=\"852\" class=\"size-full wp-image-18236\"><\/a><p id=\"caption-attachment-39406\" class=\"wp-caption-text\">A warning that the manufacturer cannot ship to mainland China if the order is placed on the English-language site<\/p><\/div>\n<p>Most cryptomining rig manufacturers, including Bitmain, are located in China. Moving heavy and expensive equipment from there is not cheap, yet the cybercriminals charge roughly five dollars for shipping, regardless of destination and service (UPS, DHL, or FedEx).<\/p>\n<div id=\"attachment_39407\" style=\"width: 1303px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160301\/cryptoscam-fake-antminer-screen-8.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39407\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160301\/cryptoscam-fake-antminer-screen-8.png\" alt=\"Choosing a delivery service. The shipping cost is $5.45 no matter where the shipment is headed\" width=\"1293\" height=\"854\" class=\"size-full wp-image-18238\"><\/a><p id=\"caption-attachment-39407\" class=\"wp-caption-text\">Choosing a delivery service. The shipping cost is $5.45 no matter where the shipment is headed<\/p><\/div>\n<p>Next, the victim is asked to choose a payment method. They must use cryptocurrency but can choose BTC, BCH, ETH, or LTC.<\/p>\n<div id=\"attachment_39408\" style=\"width: 1303px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160310\/cryptoscam-fake-antminer-screen-9.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39408\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160310\/cryptoscam-fake-antminer-screen-9.png\" alt=\"Selecting a payment method: Bitcoin, Ethereum, Bitcoin Cash, or Litecoin\" width=\"1293\" height=\"855\" class=\"size-full wp-image-18240\"><\/a><p id=\"caption-attachment-39408\" class=\"wp-caption-text\">Selecting a payment method: Bitcoin, Ethereum, Bitcoin Cash, or Litecoin<\/p><\/div>\n<p>The final and most important step is making the payment. The cybercriminals provide cryptowallet details and warn that the transaction must be completed within two hours, otherwise the order will be canceled. Note that the cost of delivery, though minuscule, does not appear in the bill.<\/p>\n<div id=\"attachment_39409\" style=\"width: 1303px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160318\/cryptoscam-fake-antminer-screen-10.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39409\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160318\/cryptoscam-fake-antminer-screen-10.png\" alt=\"The total order price does not include shipping\" width=\"1293\" height=\"853\" class=\"size-full wp-image-18242\"><\/a><p id=\"caption-attachment-39409\" class=\"wp-caption-text\">The total order price does not include shipping<\/p><\/div>\n<p>After the victim has parted with a considerable amount of cryptocurrency, the air of legitimacy evaporates. The user\u2019s personal account contains no order data, and the buttons are inactive.<\/p>\n<div id=\"attachment_39410\" style=\"width: 1301px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160327\/cryptoscam-fake-antminer-screen-11.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39410\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/19160327\/cryptoscam-fake-antminer-screen-11.jpg\" alt=\"The inglorious finale\" width=\"1291\" height=\"856\" class=\"size-full wp-image-18244\"><\/a><p id=\"caption-attachment-39410\" class=\"wp-caption-text\">The inglorious finale<\/p><\/div>\n<h2>How to stay safe from scams<\/h2>\n<p>To avoid being duped, stay vigilant so as not to fall for hype.<\/p>\n<ul>\n<li>Stay wary, and pay particular attention if someone tries to hurry you into making a payment. In this case, the appearance of a scarce product for sale is no different than receiving news of a sudden lottery win (doubly suspicious if you didn\u2019t even buy a ticket).<\/li>\n<li>Check the official website. If you receive an offer from a well-known brand, find the official website and look there for information about the promotion. Always examine the address bar.<\/li>\n<li>Use an advanced security product with protection against phishing and online fraud, such as <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>How fake sellers are stealing bitcoins from buyers of sought-after mining equipment.<\/p>\n","protected":false},"author":2513,"featured_media":18246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1505,80,2444,1591,695,521],"class_list":{"0":"post-18223","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-cryptocurrencies","9":"tag-fraud","10":"tag-google-docs","11":"tag-mining","12":"tag-scam","13":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cryptoscam-fake-antminer\/18223\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cryptoscam-fake-antminer\/22741\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cryptoscam-fake-antminer\/24577\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cryptoscam-fake-antminer\/22606\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cryptoscam-fake-antminer\/21682\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cryptoscam-fake-antminer\/25095\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cryptoscam-fake-antminer\/24422\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cryptoscam-fake-antminer\/30532\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cryptoscam-fake-antminer\/9543\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cryptoscam-fake-antminer\/39398\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cryptoscam-fake-antminer\/16799\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cryptoscam-fake-antminer\/17335\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cryptoscam-fake-antminer\/14712\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cryptoscam-fake-antminer\/26531\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cryptoscam-fake-antminer\/30562\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cryptoscam-fake-antminer\/26926\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cryptoscam-fake-antminer\/23774\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cryptoscam-fake-antminer\/29115\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cryptoscam-fake-antminer\/28914\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2513"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18223"}],"version-history":[{"count":11,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18223\/revisions"}],"predecessor-version":[{"id":18245,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18223\/revisions\/18245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18246"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}