The perpetrator initiated their scheme by funding each wallet with small amounts of Ether and subsequently deploying a proprietary token named Gemstone (GEM), which was not open source. They then proceeded to whitelist all their wallets, claiming all self-deployed tokens in the process

Categories: Database

chaindaemon

Developer || Crypto Anarchist || Prompt Engineer

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *