FBI warns of fake ‘FBI token’ scam targeting Tron users

ambcryptoОпубликовано 2026-03-20Обновлено 2026-03-20

Введение

The FBI has issued a warning about a phishing scam involving fake tokens impersonating the agency on the Tron blockchain. These malicious tokens falsely claim a user’s wallet is under investigation and urge recipients to complete an AML verification process via an external website to avoid asset restrictions. The scam uses on-chain token transfers to deliver phishing messages directly to wallets, bypassing traditional spam filters and leveraging law enforcement impersonation to create urgency and pressure users into providing sensitive personal information. The FBI emphasized it does not issue tokens or request identity verification through such methods and advised users not to engage with suspicious messages or share personal data. Victims are encouraged to report incidents to the Internet Crime Complaint Center (IC3).

The Federal Bureau of Investigation [FBI] has issued a warning to crypto users after identifying a phishing scam involving fake tokens impersonating the agency on the Tron blockchain.

In a post shared by the FBI New York, the agency urged users to remain cautious if they encounter tokens claiming to be from the FBI, particularly those that prompt identity verification or link to external websites.

The warning follows reports of a malicious token circulating on Tron that falsely claims a user’s wallet is “under investigation.” It urges them to complete an AML verification process.

How the scam works

According to the alert, the scam leverages on-chain token transfers to deliver phishing messages directly into users’ wallets.

The fraudulent token includes a message instructing recipients to visit a website and verify their identity to avoid potential restrictions on their assets. The message is designed to create urgency, warning that a “total block” will occur if the user fails to act.

Once users interact with the linked website, they may be prompted to provide sensitive personal information, which attackers can then exploit.

The FBI emphasized that it does not issue tokens or request identity verification through such methods.

On-chain phishing raises new risks

Unlike traditional phishing attempts that rely on emails or fake websites, this approach embeds the scam directly into blockchain transactions.

By delivering messages directly to wallets, attackers can bypass conventional spam filters and reach users in a more convincing context.

The use of law enforcement impersonation further increases the likelihood of success. Users may feel pressured to comply with what appears to be an official directive.

FBI urges caution and reporting

The FBI advised users not to engage with any tokens or messages claiming to be from the agency. Also, users are told to avoid providing identifying information to associated websites.

Users who have already interacted with the scam or submitted personal data are encouraged to file a report through the Internet Crime Complaint Center [IC3].

The agency’s warning highlights the growing sophistication of crypto-related scams. Attackers continue to adapt their tactics to exploit new technologies and user behaviors.


Final Summary

  • The FBI’s warning highlights a shift toward on-chain phishing, in which scams are delivered directly via blockchain transactions.
  • Users are urged to ignore suspicious tokens and avoid sharing personal information, even when messages appear to come from official sources.

Связанные с этим вопросы

QWhat is the FBI warning Tron users about?

AThe FBI is warning Tron users about a phishing scam involving fake tokens that impersonate the agency.

QHow does the scam deliver its phishing message to users?

AThe scam leverages on-chain token transfers to deliver phishing messages directly into users’ wallets.

QWhat are users instructed to do by the fraudulent token message?

AThe message instructs recipients to visit a website and verify their identity to avoid potential restrictions on their assets, creating a false sense of urgency.

QWhat should users do if they have already interacted with the scam or provided personal information?

AThey should file a report through the Internet Crime Complaint Center (IC3).

QHow does this on-chain phishing method differ from traditional phishing attempts?

AUnlike traditional phishing that relies on emails or fake websites, this approach embeds the scam directly into blockchain transactions, bypassing conventional spam filters.

Похожее

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

The article "a16z: AI's 'Amnesia' – Can Continual Learning Cure It?" explores the limitations of current large language models (LLMs), which, like the protagonist in the film *Memento*, are trapped in a perpetual present—unable to form new memories after training. While methods like in-context learning (ICL), retrieval-augmented generation (RAG), and external scaffolding (e.g., chat history, prompts) provide temporary solutions, they fail to enable true internalization of new knowledge. The authors argue that compression—the core of learning during training—is halted at deployment, preventing models from generalizing, discovering novel solutions (e.g., mathematical proofs), or handling adversarial scenarios. The piece introduces *continual learning* as a critical research direction to address this, categorizing approaches into three paths: 1. **Context**: Scaling external memory via longer context windows, multi-agent systems, and smarter retrieval. 2. **Modules**: Using pluggable adapters or external memory layers for specialization without full retraining. 3. **Weights**: Enabling parameter updates through sparse training, test-time training, meta-learning, distillation, and reinforcement learning from feedback. Challenges include catastrophic forgetting, safety risks, and auditability, but overcoming these could unlock models that learn iteratively from experience. The conclusion emphasizes that while context-based methods are effective, true breakthroughs require models to compress new information into weights post-deployment, moving from mere retrieval to genuine learning.

marsbit1 ч. назад

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

marsbit1 ч. назад

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

An individual manipulated a weather sensor at Paris Charles de Gaulle Airport with a portable heat source, causing a Polymarket weather market to settle at 22°C and earning $34,000. This incident highlights a fundamental issue in prediction markets: when a market aims to reflect reality, it also incentivizes participants to influence that reality. Prediction markets operate on two layers: platform rules (what outcome counts as a win) and data sources (what actually happened). While most focus on rules, the real vulnerability lies in the data source. If reality is recorded through a specific source, influencing that source directly affects market settlement. The article categorizes markets by their vulnerability: 1. **Single-point physical data sources** (e.g., weather stations): Easily manipulated through physical interference. 2. **Insider information markets** (e.g., MrBeast video details): Insiders like team members use non-public information to trade. Kalshi fined a剪辑师 $20,000 for insider trading. 3. **Actor-manipulated markets** (e.g., Andrew Tate’s tweet counts): The subject of the market can control the outcome. Evidence suggests Tate’sociated accounts coordinated to profit. 4. **Individual-action markets** (e.g., WNBA disruptions): A single person can execute an event to profit from their pre-placed bets. Kalshi and Polymarket handle these issues differently. Kalshi enforces strict KYC, publicly penalizes insider trading, and reports to regulators. Polymarket, with its anonymous wallet-based system, has historically been more permissive, arguing that insider information improves market accuracy. However, it cooperated with authorities in the "Van Dyke case," where a user traded on classified government information. The core paradox is reflexivity: prediction markets are designed to discover truth, but their financial incentives can distort reality. The more valuable a prediction becomes, the more likely participants are to influence the event itself. The market ceases to be a mirror of reality and instead shapes it.

marsbit2 ч. назад

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

marsbit2 ч. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Как купить TRX

Добро пожаловать на HTX.com! Мы сделали приобретение TRON (TRX) простым и удобным. Следуйте нашему пошаговому руководству и отправляйтесь в свое крипто-путешествие.Шаг 1: Создайте аккаунт на HTXИспользуйте свой адрес электронной почты или номер телефона, чтобы зарегистрироваться и бесплатно создать аккаунт на HTX. Пройдите удобную регистрацию и откройте для себя весь функционал.Создать аккаунтШаг 2: Перейдите в Купить криптовалюту и выберите свой способ оплатыКредитная/Дебетовая Карта: Используйте свою карту Visa или Mastercard для мгновенной покупки TRON (TRX).Баланс: Используйте средства с баланса вашего аккаунта HTX для простой торговли.Третьи Лица: Мы добавили популярные способы оплаты, такие как Google Pay и Apple Pay, для повышения удобства.P2P: Торгуйте напрямую с другими пользователями на HTX.Внебиржевая Торговля (OTC): Мы предлагаем индивидуальные услуги и конкурентоспособные обменные курсы для трейдеров.Шаг 3: Хранение TRON (TRX)После приобретения вами TRON (TRX) храните их в своем аккаунте на HTX. В качестве альтернативы вы можете отправить их куда-либо с помощью перевода в блокчейне или использовать для торговли с другими криптовалютами.Шаг 4: Торговля TRON (TRX)С легкостью торгуйте TRON (TRX) на спотовом рынке HTX. Просто зайдите в свой аккаунт, выберите торговую пару, совершайте сделки и следите за ними в режиме реального времени. Мы предлагаем удобный интерфейс как для начинающих, так и для опытных трейдеров.

3.5k просмотров всегоОпубликовано 2024.03.29Обновлено 2025.06.04

Как купить TRX

Tron Bull: Полный Обзор

Tron Bull - это новаторский мемтокен, созданный в сети TRON.

2.3k просмотров всегоОпубликовано 2024.10.09Обновлено 2024.10.09

Tron Bull: Полный Обзор

Неделя обучения по популярным токенам 4: В 2025 году экосистема TRON переживает взрывной рост, TRON укрепляет позиции лидера по переводу стейблкоинов

В 2025 году экосистема TRON быстро развивается, уделяя особое внимание взаимодействию, безопасности и практическому внедрению.

2.0k просмотров всегоОпубликовано 2025.12.30Обновлено 2025.12.30

Неделя обучения по популярным токенам 4: В 2025 году экосистема TRON переживает взрывной рост, TRON укрепляет позиции лидера по переводу стейблкоинов

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на TRX (TRX) представлены ниже.

活动图片