CertiK Alert Issues Red Flag on a Discord Server Breach, Honeypot Scams
CertiK Alert uncovers $40k liquidity theft in MOAM scam.
In a swift and vigilant response to a potential breach, the CertiK Alert, a prominent purveyor of real-time insights into the crypto realm, issued an urgent message via Twitter. The tweet raised the alarm on an unsettling development surrounding Clique – the purveyors of identity oracles harmonizing the realms of Web2 and Web3.
“We are seeing reports that Clique Discord server has potentially been compromised,” the alert system proclaimed.
#CertiKSkynetAlert 🚨
We are seeing reports that @Clique2046 Discord server has potentially been #compromised!
Do not click on any links until the team has confirmed they’ve regained control of the server.#NFT #hacked #Discordhttps://t.co/JH7YZjIjlM
CertiK beseeched the crypto populace to exercise restraint and resist the allure of any hyperlinks emanating from the beleaguered Clique Discord server. However, it appears the compromised Clique has emerged victorious over the situation.
In a reply tweet, the Clique team acknowledged the security incident and revealed that they had wrested back control and brought the breach under control early.
“We have regained control and the compromise has been stemmed early,” the tweet read.
Meanwhile, the ordeal is yet to be over, as the team is currently engrossed in a thorough investigation to ascertain the extent and impact of the breach.
Similarly, CertiK Alert unveiled a concerning saga of a liquidity exodus that has unfolded upon a fabricated token known as SeaPad. According to the security firm, the liquidity has been drained, and suspicions are high that this token is a honeypot scam, with deployer-associated wallets artificially inflating its price.
#CertiKSkynetAlert 🚨
We have seen a large liquidity removal on a fake SeaPad token
Bsc: 0x0495C762A89FeD45c761ebAa5666a0ADaD5479a4
Token appears to be a honeypot with wallets associated with the deployer purchasing tokens to inflate the price.https://t.co/fHhiFyyucS — CertiK Alert (@CertiKAlert) August 5, 2023