After all these years in the crypto scene, what kinds of monsters and demons haven’t I seen? There are those who genuinely work hard on building, and plenty who just draw big pies and fool people. But the most disgusting are the teams who, after one round of scamming, just change their name and come back to keep harvesting.
The recently resurfaced CryptoDAO (V3 PRO version) is practically a textbook case of such scammers. If you dig into the on-chain data, you’ll see their methods—the address transfer patterns, token minting frequency, treasury fund flows, even their token creation habits—are exactly the same as those previous rug pull projects: AKAS, OLY, LynkCoDAO.
It’s the same old trick. New skin, same people, same scam. Wake up, everyone.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
10 Likes
Reward
10
4
Repost
Share
Comment
0/400
CodeAuditQueen
· 12-03 12:45
A quick look at the on-chain data reveals the reentrancy vulnerability. I've audited this pattern too many times; it's just a different contract address.
View OriginalReply0
EthMaximalist
· 12-03 12:44
Here we go again? I'm already tired of seeing this. Just a new skin and you still want to fool people.
View OriginalReply0
LiquidityOracle
· 12-03 12:40
It's the same old trick again, it's really so annoying.
View OriginalReply0
GateUser-bd883c58
· 12-03 12:30
I dug into the on-chain data, and it's definitely the same trick. They're really good at switching identities.
After all these years in the crypto scene, what kinds of monsters and demons haven’t I seen? There are those who genuinely work hard on building, and plenty who just draw big pies and fool people. But the most disgusting are the teams who, after one round of scamming, just change their name and come back to keep harvesting.
The recently resurfaced CryptoDAO (V3 PRO version) is practically a textbook case of such scammers. If you dig into the on-chain data, you’ll see their methods—the address transfer patterns, token minting frequency, treasury fund flows, even their token creation habits—are exactly the same as those previous rug pull projects: AKAS, OLY, LynkCoDAO.
It’s the same old trick. New skin, same people, same scam. Wake up, everyone.