In-depth investigation into the Rug Pull case to reveal the ecological chaos of Ethereum tokens

Reprinted from chaincatcher
01/08/2025·1MAuthor: CertiK
Introduction
In the Web3 world, new tokens are constantly emerging. Have you ever wondered how many new tokens are issued every day? Are these new coins safe?
These questions are not without purpose. Over the past few months, the CertiK security team has captured a large number of Rug Pull transactions. It is worth noting that the tokens involved in these cases are all new tokens that have just been put on the chain.
Subsequently, CertiK conducted in-depth investigations into these Rug Pull cases and found that there were organized criminal gangs behind them, and summarized the pattern characteristics of these scams. Through in-depth analysis of the modus operandi of these gangs, CertiK discovered a possible fraud promotion method of the Rug Pull gang: Telegram groups. These gangs use the "New Token Tracer" function in groups such as Banana Gun and Unibot to attract users to purchase fraudulent tokens and ultimately make profits through Rug Pull.
CertiK counted the token push information of these Telegram groups from November 2023 to early August 2024, and found that a total of 93,930 new tokens were pushed, of which 46,526 tokens involved Rug Pull, accounting for 49.53% . According to statistics, the cumulative investment cost of the group behind these Rug Pull tokens was 149,813.72 ETH, and they made a profit of 282,699.96 ETH at a rate of return of up to 188.7%, equivalent to approximately US$800 million.
In order to evaluate the proportion of new tokens pushed by Telegram groups in the Ethereum main network, CertiK collected data on new tokens issued on the Ethereum main network during the same time period. Data shows that a total of 100,260 new tokens were issued during this period, of which tokens pushed through Telegram groups accounted for 89.99% of the main network. On average, about 370 new tokens are created every day, far exceeding reasonable expectations. After continued in-depth investigation, we discovered the disturbing truth - at least 48,265 tokens were involved in Rug Pull scams, accounting for a whopping 48.14%. In other words, almost one out of every two new tokens on the Ethereum mainnet is involved in a scam.
In addition, CertiK discovered more Rug Pull cases in other blockchain networks. This means that not only the Ethereum mainnet, but also the security situation of the entire Web3 newly issued token ecosystem is far more severe than expected. Therefore, CertiK wrote this research report, hoping to help all Web3 members increase their awareness of prevention, stay vigilant in the face of endless scams, and take necessary preventive measures in a timely manner to protect the security of their assets.
ERC-20 Token
Before we officially start this report, let's first understand some basic concepts.
ERC-20 tokens are currently one of the most common token standards on the blockchain. They define a set of specifications that allow tokens to interoperate between different smart contracts and decentralized applications (dApps). . The ERC-20 standard stipulates the basic functions of tokens, such as transferring funds, checking balances, authorizing third parties to manage tokens, etc. Thanks to this standardized protocol, developers can issue and manage tokens more easily, simplifying token creation and usage. In fact, any individual or organization can issue their own tokens based on the ERC-20 standard and raise startup funds for various financial projects through pre-sale of tokens. Because of the wide application of ERC-20 tokens, it has become the basis for many ICO and decentralized finance projects.
The familiar USDT, PEPE, and DOGE are all ERC-20 tokens, and users can purchase these tokens through decentralized exchanges. However, some fraud groups may also issue malicious ERC-20 tokens with code backdoors, list them on decentralized exchanges, and then induce users to purchase them.
Typical scam cases of Rug Pull tokens
Here, we use a Rug Pull token fraud case to gain an in-depth understanding of the operating model of malicious token fraud. First of all, it needs to be explained that Rug Pull refers to a fraudulent behavior in which the project party suddenly withdraws funds or abandons the project in a decentralized financial project, causing investors to suffer huge losses. The Rug Pull token is a token specifically issued to carry out this kind of fraud.
The Rug Pull tokens mentioned in this article are sometimes also called "Honey Pot tokens" or "Exit Scam tokens", but in the following we will refer to them as Rug Pull tokens. .
· Case
The attacker (Rug Pull gang) deployed TOMMI tokens with the Deployer address (0x4bAF), then created a liquidity pool with 1.5 ETH and 100,000,000 TOMMI, and actively purchased TOMMI tokens through other addresses to fake the liquidity pool transaction volume to attract Users and new robots on the chain purchase TOMMI tokens. When a certain number of new robots were fooled, the attacker used the Rug Puller address (0x43a9) to execute the Rug Pull. The Rug Puller used 38,739,354 TOMMI tokens to pour into the liquidity pool and redeemed approximately 3.95 ETH. Rug Puller's tokens come from the malicious Approve authorization of the TOMMI token contract. When the TOMMI token contract is deployed, it will grant Rug Puller the approve permission of the liquidity pool, which allows Rug Puller to directly transfer TOMMI tokens from the liquidity pool. Then do the Rug Pull.
·Related addresses
- Deployer: 0x4bAFd8c32D9a8585af0bb6872482a76150F528b7
- TOMMI Token: 0xe52bDD1fc98cD6c0cd544c0187129c20D4545C7F
- Rug Puller: 0x43A905f4BF396269e5C559a01C691dF5CbD25a2b
- Rug Puller disguised user (one of them): 0x4027F4daBFBB616A8dCb19bb225B3cF17879c9A8
- Rug Pull fund transfer address: 0x1d3970677aa2324E4822b293e500220958d493d0
- Rug Pull fund retention address: 0x28367D2656434b928a6799E0B091045e2ee84722
·Related transactions
- Deployer obtains startup funds from centralized exchanges: 0x428262fb31b1378ea872a59528d3277a292efe7528d9ffa2bd926f8bd4129457
- Deploy TOMMI token: 0xf0389c0fa44f74bca24bc9d53710b21f1c4c8c5fba5b2ebf5a8adfa9b2d851f8
- Create a liquidity pool: 0x59bb8b69ca3fe2b3bb52825c7a96bf5f92c4dc2a8b9af3a2f1dddda0a79ee78c
- The fund transfer address sends funds to the disguised user (one of them): 0x972942e97e4952382d4604227ce7b849b9360ba5213f2de6edabb35ebbd20eff
- Pretend user to purchase tokens (one of them): 0x814247c4f4362dc15e75c0167efaec8e3a5001ddbda6bc4ace6bd7c451a0b231
- Rug Pull: 0xfc2a8e4f192397471ae0eae826dac580d03bcdfcb929c7423e174d1919e1ba9c
- Rug Pull will send the funds obtained to the transfer address: 0xf1e789f32b19089ccf3d0b9f7f4779eb00e724bb779d691f19a4a19d6fd15523
- The transfer address sends funds to the fund retention address: 0xb78cba313021ab060bd1c8b024198a2e5e1abc458ef9070c0d11688506b7e8d7
· Rug Pull process
1. Prepare attack funds.
The attacker recharged 2.47309009ETH to Token Deployer (0x4bAF) through the centralized exchange as the starting capital for Rug Pull.
_Figure 1 Deployer obtains startup capital transaction information from the exchange_
2. Deploy the Rug Pull token with backdoor.
Deployer creates TOMMI tokens, premines 100,000,000 tokens and allocates them to itself.
_Figure 2 Deployer creates TOMMI token transaction information_
3. Create an initial liquidity pool.
Deployer used 1.5 ETH and all pre-mined tokens to create a liquidity pool and obtained approximately 0.387 LP tokens.
_Figure 3 Deployer creates a liquidity pool and trades fund flows_
4. Destroy all pre-mined Token supply.
Token Deployer sends all LP tokens to the 0 address for destruction. Since there is no Mint function in the TOMMI contract, Token Deployer has theoretically lost its Rug Pull capability at this time. (This is also one of the necessary conditions to attract new robots to enter the market. Some new robots will evaluate whether newly added tokens to the pool are at risk of Rug Pull. The Deployer will also set the owner of the contract to the 0 address, all in order to deceive new robots. Robot anti-fraud program).
Figure 4 Deployer destroys LP token transaction information
5. Falsifying trading volume.
The attacker uses multiple addresses to actively purchase TOMMI tokens from the liquidity pool, increasing the transaction volume of the pool, and further attracting new robots to enter the market (the basis for judging that these addresses are the attacker's disguise: the funds for the relevant addresses come from the Rug Pull gang) historical fund transfer address).
_Figure 5 Transaction information and fund flows of attackers purchasing TOMMI tokens from other addresses_
6. The attacker initiated a Rug Pull through the Rug Puller address (0x43A9), transferred 38,739,354 tokens directly from the liquidity pool through the token’s backdoor, and then used these tokens to smash into the pool and withdraw approximately 3.95 ETH.
_Figure 6 Rug Pull transaction information and capital flow_
7. The attacker sends the funds obtained from the Rug Pull to the transit address 0xD921.
_Figure 7 Rug Puller sends attack proceeds to the transit address transaction information_
8. The transfer address 0xD921 sends the funds to the fund retention address 0x2836. From here we can see that when the Rug Pull is completed, the Rug Puller will send the funds to a certain fund retention address. The fund retention address is where the funds for a large number of Rug Pull cases that we monitor are gathered. The fund retention address will split most of the funds received to start a new round of Rug Pull, while the remaining small amount of funds will go through centralized transactions. Withdrawal. We found several fund retention addresses, and 0x2836 is one of them.
_Figure 8 Transfer address fund transfer information_
· Rug Pull code backdoor
Although the attacker has tried to prove to the outside world that they cannot perform Rug Pull by destroying LP tokens, in fact the attacker has left a malicious approve backdoor in the openTrading function of the TOMMI token contract. This backdoor will create a flow When the liquidity pool is used, the liquidity pool approves the transfer permission of tokens to the Rug Puller address, so that the Rug Puller address can directly transfer tokens from the liquidity pool.
_Figure 9 openTrading function in TOMMI token contract_
_Figure 10 onInit function in TOMMI token contract_
The implementation of the openTrading function is shown in Figure 9. Its main function is to create a new liquidity pool, but the attacker called the backdoor function onInit within this function (shown in Figure 10), allowing uniswapV2Pair to approve the number of _chefAddress addresses. Token transfer permission of type(uint256). Among them, uniswapV2Pair is the liquidity pool address, _chefAddress is the Rug Puller address, and _chefAddress is specified when the contract is deployed (shown in Figure 11).
_Figure 11 Constructor in TOMMI token contract_
·Modeling of crime
By analyzing the TOMMI case, we can summarize the following four characteristics:
1. Deployer obtains funds through a centralized exchange: The attacker first provides a source of funds for the deployer address (Deployer) through a centralized exchange.
2. Deployer creates a liquidity pool and destroys LP tokens: After the deployer creates the Rug Pull token, it will immediately create a liquidity pool for it and destroy the LP token to increase the credibility of the project and attract more investor.
3. Rug Puller uses a large amount of tokens to exchange for ETH in the liquidity pool: The Rug Pull address (Rug Puller) uses a large amount of tokens (usually far exceeding the total supply of tokens) to exchange for ETH in the liquidity pool. In other cases, Rug Puller has also removed liquidity to obtain ETH in the pool.
4. Rug Puller transfers the ETH obtained from Rug Pull to the fund retention address: Rug Puller will transfer the ETH obtained to the fund retention address, sometimes through an intermediate address.
The above characteristics are commonly found in the cases we captured, which shows that Rug Pull behavior has obvious pattern characteristics. In addition, after the Rug Pull is completed, the funds are usually funneled to a fund retention address, which implies that the same group or even the same fraud gang may be involved behind these seemingly independent Rug Pull cases.
Based on these characteristics, we extracted a Rug Pull behavior pattern and used this pattern to scan and detect the monitored cases in order to build a portrait of a possible fraud gang.
Rug Pull gang
· Mining the fund storage address
As mentioned before, Rug Pull cases usually funnel funds to the fund retention address at the end. Based on this pattern, we selected several highly active fund retention addresses with obvious modus operandi of related cases for in-depth analysis.
A total of 7 fund retention addresses came into our view, and there were a total of 1,124 Rug Pull cases associated with these addresses, which were successfully captured by our on-chain attack monitoring system (CertiK Alert). After the Rug Pull gang successfully implements the scam, it will funnel the illegal profits to these fund retention addresses. These fund retention addresses will split the precipitated funds and use them for activities such as creating new tokens and manipulating liquidity pools in new Rug Pull scams in the future. In addition, a small part of the accumulated funds are cashed out through centralized exchanges or flash exchange platforms.
The fund data statistics about the fund retention address are shown in Table 1:
By counting the costs and revenues of all Rug Pull scams in each fund retention address, we obtained the data in Table 1.
In a complete Rug Pull scam, the Rug Pull gang usually uses an address as the deployer of Rug Pull tokens and obtains startup funds through withdrawals from centralized exchanges to create Rug Pull tokens and corresponding liquidity. pool. When a sufficient number of users or new robots are attracted to use ETH to purchase Rug Pull tokens, the Rug Pull gang will use another address as a Rug Pull executor (Rug Puller) to operate and transfer the resulting funds to the fund retention address.
In the above process, we regard the ETH obtained by the Deployer through the exchange, or the ETH invested by the Deployer when creating a liquidity pool, as the cost of Rug Pull (how to calculate it depends on the behavior of the Deployer). The ETH that the Rug Puller transfers to the fund retention address (or other transfer address) after completing the Rug Pull is regarded as the income of the Rug Pull. Finally, the data on income and expenses in Table 1 are obtained, in which the USD Profit Conversion Center The ETH/USD price used (1 ETH = 2,513.56 USD, price acquisition time is August 31, 2024) is calculated based on the real-time price at the time of data integration.
It should be noted that when implementing the scam, the Rug Pull gang will also actively use ETH to purchase the Rug Pull tokens they created to simulate normal liquidity pool activities, thereby attracting new robots to purchase. However, this part of the cost is not included in the calculation, so the data in Table 1 overestimates the actual profits of the Rug Pull gang, and the real profits will be relatively low.
_Figure 12 Pie chart of profit ratio of fund retention addresses_
Use the Rug Pull profit data of each address in Table 1 to generate a profit proportion pie chart, as shown in Figure 12. The top three addresses with the highest profit share are 0x1607, 0xDF1a and 0x2836. Address 0x1607 earned the highest profit, approximately 2,668.17 ETH, accounting for 27.7% of all address profits.
In fact, even if the funds are ultimately funneled to different fund retention addresses, we are still highly suspicious of these fund retention addresses due to the large number of commonalities between the cases associated with these addresses (such as the backdoor implementation of Rug Pull, cash out paths, etc.) It may be the same gang behind it.
So, is there possibly some connection between these fund retention addresses?
· Mining the correlation between fund retention addresses
_Figure 13 Fund flow diagram of fund retention address_
An important indicator to determine whether there is a correlation between fund retention addresses is to see whether there is a direct transfer relationship between these addresses. In order to verify the correlation between the fund retention addresses, we crawled and analyzed the historical transaction records of these addresses.
In most of the cases we have analyzed in the past, the proceeds of each Rug Pull scam will only flow to a certain fund retention address. It is impossible to track the direction of proceeds and associate different fund retention addresses. Therefore, we need to detect the flow of funds between these fund retention addresses in order to obtain the direct correlation between the fund retention addresses. The detection results are shown in Figure 13.
It should be noted that the addresses 0x1d39 and 0x6348 in Figure 13 are the Rug Pull infrastructure contract addresses shared by each fund retention address. The fund retention address splits the funds through these two contracts and sends them to other addresses, and these addresses that receive the split funds use these funds to fake the transaction volume of Rug Pull tokens.
According to the direct transfer relationship of ETH in Figure 13, we can divide these fund retention addresses into three address sets:
1. 0xDF1a and 0xDEd0;
2. 0x1607 and 0x4856;
3. 0x2836, 0x0573, 0xF653 and 0x7dd9.
There is a direct transfer relationship within the address collection, but there is no direct transfer behavior between the collections. Therefore, it seems that these 7 fund retention addresses can be divided into 3 different groups. However, these three address sets all split ETH through the same infrastructure contract for subsequent Rug Pull operations, which made the originally seemingly loose three address sets linked together to form a whole. So, does this suggest that the same group is behind these addresses?
This issue will not be discussed in depth here, and everyone can think about the possibilities by themselves.
· Uncovering shared infrastructure
There are two main infrastructure addresses shared by the fund retention addresses mentioned earlier, namely
0x1d3970677aa2324E4822b293e500220958d493d0 and 0x634847D6b650B9f442b3B582971f859E6e65eB53.
Among them, the infrastructure address 0x1d39 mainly contains two functional functions: "multiSendETH" and "0x7a860e7e". The main function of "multiSendETH" is to perform split transfers. The fund retention address splits part of the funds to multiple addresses through the "Multi Send ETH" function of 0x1d39, which is used to forge the transaction volume of Rug Pull tokens. The transaction information is shown in Figure 14 shown.
This split operation helps attackers fake the activity of tokens, making these tokens look more attractive, thereby inducing more users or new bots to buy. Through this method, the Rug Pull gang can further increase the deception and complexity of the scam.
_Figure 14 Fund retention address splitting fund transaction information through 0x1d39_
The function of "0x7a860e7e" is used to purchase Rug Pull tokens. Other addresses disguised as ordinary users will either directly interact with Uniswap's Router to purchase Rug Pull tokens after receiving the split funds from the fund retention address, or through 0x1d39’s “0x7a860e7e” function purchases Rug Pull tokens to fake active trading volume.
The main function of infrastructure address 0x6348 is similar to 0x1d39, except that the function name for purchasing Rug Pull tokens is changed to "0x3f8a436c", which will not be elaborated here.
In order to further understand the use of these infrastructures by the Rug Pull gang, we crawled and analyzed the transaction history of 0x1d39 and 0x6348, and counted the frequency of use of the two functional functions in 0x1d39 and 0x6348 by external addresses. The results are as shown in Table 2 and Table 2 3 shown.
As can be seen from the data in Tables 2 and 3, the Rug Pull gang’s use of infrastructure addresses has obvious characteristics: they only use a small amount of fund retention addresses or transfer addresses to split the funds, but use a large number of other addresses to forge Rug Pull token transaction volume. For example, there are even as many as 6,224 addresses that fake transaction volume through address 0x6348. Such a large number of addresses greatly increases the difficulty of distinguishing attacker addresses from victim addresses.
It should be noted that the Rug Pull gang's method of forging transaction volume is not limited to using these infrastructure addresses. Some addresses will also directly exchange tokens through exchanges to forge transaction volume.
In addition, we also counted the usage of each functional function in the two addresses 0x1d39 and 0x6348 by the seven fund retention addresses mentioned above, as well as the amount of ETH involved in each function. The final data are as shown in Table 4 and Table 5 shown.
As can be seen from the data in Tables 4 and 5, the fund retention address has split funds a total of 3,616 times through the infrastructure, with the total amount reaching 9,369.98 ETH. Furthermore, with the exception of address 0xDF1a, all fund retention addresses only conduct split transfers through the infrastructure, while purchases of Rug Pull tokens are completed by the addresses that receive these split funds. This shows that these Rug Pull gangs have clear ideas and clear division of labor during their crimes.
Address 0x0573 did not split funds through infrastructure, and the funds used to forge transaction volume in its associated Rug Pull case came from other addresses, which shows that there are certain differences in the crime styles of different fund retention addresses.
By analyzing the financial connections between different fund retention addresses and their use of infrastructure, we have a more comprehensive understanding of the connections between these fund retention addresses. The way these Rug Pull gangs commit crimes is more professional and standardized than we imagined, which further proves that there are criminal groups behind the scenes who carefully plan and operate all of this to carry out systematic fraud activities.
· Digging into the sources of funds for committing crimes
When Rug Pull gangs conduct Rug Pull, they usually use a new external account address (EOA) as a Deployer to deploy Rug Pull tokens, and these Deployer addresses usually obtain startup funds through centralized exchanges or flash swap platforms. To this end, we conducted a fund source analysis on the Rug Pull case associated with the fund retention address mentioned above, aiming to obtain more detailed information on the source of funds for the crime.
Table 6 shows the distribution of the number of Deployer fund source tags associated with Rug Pull cases in each fund retention address.
It can be seen from the data in Table 6 that in the Rug Pull cases associated with each fund retention address, most of the Deployer funds for Rug Pull tokens come from centralized exchanges (CEX). Among all the 1,124 Rug Pull cases we analyzed, the number of cases with funds coming from centralized exchange hot wallets reached 1,069, accounting for 95.11%. This means that for the vast majority of Rug Pull cases, we can trace the account KYC information and withdrawal history of the centralized exchange to the specific account holder, thereby obtaining key clues to solve the case.
With in-depth research, we found that these Rug Pull gangs often obtain funds for crimes from multiple exchange hot wallets at the same time, and the usage level (number of uses, proportion) of each wallet is roughly the same. This shows that the Rug Pull gang intends to increase the independence of the capital flow of each Rug Pull case, so as to make it more difficult for outsiders to trace their origins and increase the complexity of tracking.
Through detailed analysis of these fund retention addresses and Rug Pull cases, we can draw a portrait of these Rug Pull gangs: they are well-trained, have a clear division of labor, are premeditated and well-organized. These characteristics demonstrate the high level of professionalism of the gang and the systematic nature of its fraudulent activities.
Faced with such well-organized criminals, we can’t help but have questions and curiosity about their promotion methods: How do these Rug Pull gangs allow users to discover and purchase these Rug Pull tokens? To answer this question, we started focusing on the victim addresses in these Rug Pull cases and tried to reveal how these gangs lured users into participating in their scams.
· Mining victim addresses
Through the analysis of fund correlation, we maintained a list of addresses of the Rug Pull gang and used it as a blacklist to screen out the set of victim addresses from the transaction records of the liquidity pool corresponding to the Rug Pull token.
After analyzing these victim addresses, we obtained the victim address information associated with the fund retention address (Table 7) and the contract call information of the victim address (Table 8).
As can be seen from the data in Table 7, among the Rug Pull cases captured by the on-chain monitoring system (CertiK Alert) we analyzed, the average number of victim addresses per case was 26.82. This number is actually higher than we originally expected, which also means that these rug pull cases cause more harm than we previously thought.
It can be seen from the data in Table 8 that in the contract calls of the victim address to purchase Rug Pull tokens, in addition to more conventional purchase methods such as Uniswap and MetaMask Swap, 30.40% of Rug Pull tokens were purchased through Maestro Purchased from well-known on-chain sniper robot platforms such as Banana Gun.
This discovery reminds us that on-chain sniper robots may be one of the important promotion channels for the Rug Pull gang. Through these sniper robots, the Rug Pull gang can quickly attract participants, especially those who focus on token hunting. Therefore, we focus our attention on these on-chain sniper bots to further understand their role in Rug Pull scams and their promotion mechanisms.
Rug Pull Token Promotion Channel
We investigated the current Web3 new ecosystem, studied the operation mode of on-chain sniper robots, and combined with certain social engineering methods, finally locked in two possible Rug Pull gang advertising channels: Twitter and Telegram groups.
It should be emphasized that these Twitter and Telegram groups were not specially created by the Rug Pull group, but existed as basic components in the new ecosystem. They are maintained by third-party organizations such as the on-chain sniper robot operation team or the professional innovator team, and are dedicated to pushing newly launched tokens to innovators. These groups have become a natural advertising channel for the Rug Pull gang, attracting users to purchase malicious tokens by pushing new tokens, thereby committing fraud.
· Twitter advertising
_Figure 15 Twitter advertisement of TOMMI token_
Figure 15 shows the advertisement of the TOMMI token mentioned above on Twitter. It can be seen that the Rug Pull gang used Dexed.com's new currency push service to expose its Rug Pull tokens to the outside world in order to attract more victims. In actual research, we found that a considerable number of Rug Pull tokens can find their corresponding advertisements on Twitter, and these advertisements often come from the Twitter accounts of different third-party organizations.
· Telegram group ads
_Figure 16 Banana Gun new currency push group_
Figure 16 shows the Telegram group maintained by the on-chain sniper robot Banana Gun team specifically for pushing newly launched tokens. This group not only pushes basic information about new tokens, but also provides users with a convenient purchase entrance. After the user configures the basic settings of Banana Gun Sniper Bot, click the "Snipe" button corresponding to the token push information in the group (red box in Figure 16) to quickly purchase the token.
We conducted a manual inspection of the tokens pushed in this group and found that a large proportion of the tokens were Rug Pull tokens. This discovery further deepens our speculation that Telegram groups are likely to be an important advertising channel for the Rug Pull gang.
The question now is, what proportion of the new tokens pushed by third-party institutions are Rug Pull tokens? What is the scale of these Rug Pull gangs' crimes? In order to clarify these issues, we decided to conduct a systematic scan and analysis of the new token data pushed in the Telegram group to reveal the scale of the risk behind it and the influence of the fraud.
Ethereum Token Ecological Analysis
· Analyze tokens pushed in Telegram groups
In order to study the Rug Pull proportion of new tokens pushed in these Telegram groups, we crawled Banana Gun, Unibot and other third-party Token message groups through Telegram’s API between October 2023 and August 2024. Pushed Ethereum new token information, it was found that these groups pushed a total of 93,930 tokens during this period.
According to our analysis of the Rug Pull case, the Rug Pull gang usually uses Rug Pull tokens to create a liquidity pool in Uniswap V2 and invests a certain amount of ETH when committing crimes. After a user or a new robot purchases Rug Pull tokens in the pool, the attacker makes a profit by destroying the market or removing liquidity. The entire process usually ends within 24 hours.
Therefore, we summarized the following detection rules for Rug Pull tokens and used these rules to scan these 93,930 tokens with the purpose of determining the proportion of Rug Pull tokens among the new tokens pushed in these Telegram groups:
1. There has been no transfer of the target token in the past 24 hours: Rug Pull tokens usually no longer have any activity after the sell-off is completed;
2. There is a liquidity pool for the target token and ETH in Uniswap V2: The Rug Pull group will create a liquidity pool for the token and ETH in Uniswap V2;
3. The total number of Transfer events since the creation of the token to the time of detection does not exceed 1,000: Rug Pull tokens generally have fewer transactions, so the number of transfers is relatively small;
4. There was a large amount of liquidity pool withdrawal or selling behavior in the last 5 transactions involving the token: The Rug Pull token will undergo a large amount of liquidity withdrawal or selling behavior at the end of the scam.
These rules were used to detect the tokens pushed by the Telegram group, and the results are shown in Table 10.
As shown in Table 9, among the 93,930 tokens pushed by the Telegram group, a total of 46,526 Rug Pull tokens were detected, accounting for 49.53%. This means that almost half of the tokens pushed in the Telegram group are Rug Pull tokens.
Considering that some project parties will also withdraw liquidity after the project fails, this behavior should not be simply classified as the Rug Pull fraud mentioned in this article. Therefore, we need to consider the impact of false positives that this situation may cause on the results of this article's analysis. Although Article 3 of our detection rules has been able to filter out most similar situations, misjudgments may still occur.
In order to better understand the impact of these potential false positives, we conducted statistics on the active time of these 46,526 tokens that were detected as Rug Pulls. The results are shown in Table 10. By analyzing the active time of these tokens, we can further distinguish between true Rug Pull behavior and liquidity withdrawal behavior due to project failure, thereby making a more accurate assessment of the actual scale of Rug Pull.
Through the statistics of active time, we found that the active time of 41,801 Rug Pull tokens (the time from token creation to the final execution of Rug Pull) is less than 72 hours, accounting for 89.84%. Under normal circumstances, 72 hours is not enough time to judge whether a project has failed. Therefore, this article believes that the Rug Pull behavior that is active for less than 72 hours is not a normal behavior of the project party to withdraw funds.
Therefore, even in the least ideal situation, the remaining 4,725 Rug Pull tokens with active time greater than 72 hours do not belong to the Rug Pull fraud cases defined in this article, our analysis still has a high reference value, because there are still 89.84% of the cases met expectations. In fact, the 72-hour time setting is still relatively conservative, because in actual sampling testing, a considerable part of the tokens that have been active for more than 72 hours still fall into the Rug Pull fraud category mentioned in this article.
It is worth mentioning that the number of tokens active for less than 3 hours is 25,622, accounting for 55.07%. This shows that the Rug Pull gang is committing crimes in a cycle with very high efficiency. The crime style tends to be "short, flat and fast" and the capital turnover rate is extremely high.
We also evaluated the cash-out methods and contract calling methods of these 46,526 Rug Pull token cases in order to confirm the committing crimes of these Rug Pull groups.
The evaluation of cash-out methods mainly counts the number of cases corresponding to the various methods used by the Rug Pull group to obtain ETH from the liquidity pool. The main methods are:
1. Smashing: The Rug Pull gang uses tokens obtained through pre-allocation or code backdoors to redeem all ETH in the liquidity pool.
2. Removing liquidity: The Rug Pull group withdraws all the funds they originally added to the liquidity pool.
The evaluation of the contract calling method is to check the target contract object called by the Rug Pull team when executing Rug Pull. The main objects are:
1. Decentralized exchange Router contract: used to directly operate liquidity.
2. The attack contract built by the Rug Pull gang: a custom contract used to perform complex fraud operations.
By evaluating cash-out methods and contract calling methods, we can further understand the operating modes and characteristics of the Rug Pull gang, so as to better prevent and identify similar fraud behaviors.
The relevant evaluation data of the cash-out method is shown in Table 11.
It can be seen from the evaluation data that the number of cases in which the Rug Pull group cashed out by removing liquidity was 32,131, accounting for 69.06%. This shows that these Rug Pull groups are more inclined to cash out by removing liquidity. The possible reason is that this method is simpler and more direct and does not require complex contract writing or additional operations. In contrast, the method of cashing out through selling requires the Rug Pull gang to pre-set a backdoor in the contract code of the token, allowing them to obtain the tokens required for selling at zero cost. This operation process is cumbersome and may increase risks. , so there are relatively few cases choosing this method.
The relevant evaluation data of the contract calling method is shown in Table 12.
It can be clearly seen from the data in Table 12 that the Rug Pull group prefers to perform Rug Pull operations through Uniswap’s Router contract, and has performed a total of 40,887 times, accounting for 76.35% of the total number of executions. The total number of Rug Pull executions is 53,552, which is higher than the number of Rug Pull tokens, 46,526. This shows that in some cases, the Rug Pull gang will perform multiple Rug Pull operations, possibly to maximize profits or target different victims. Cash out in batches.
Next, we conducted a statistical analysis of the cost and benefit data of 46,526 Rug Pull cases. It should be noted that we regard the ETH obtained by the Rug Pull group from the centralized exchange or flash exchange service before deploying the token as a cost, and the ETH recovered during the final Rug Pull is treated as income for relevant statistics. . Since the ETH invested by some of the Rug Pull gangs themselves in forging the liquidity pool transaction volume is not taken into account, the actual cost data may be higher.
Cost and benefit data are shown in Table 13.
In the statistics of these 46,526 Rug Pull tokens, the final total profit was 282,699.96 ETH, with a profit margin as high as 188.70%, equivalent to approximately US$800 million. Although the actual profit may be slightly lower than the above data, the overall scale of funds is still very amazing, showing that these Rug Pull gangs have obtained huge profits through fraud.
Judging from the token data analysis of the entire Telegram group, the current Ethereum ecosystem is already filled with a large number of Rug Pull tokens. However, we still need to confirm an important question: Do the tokens pushed in these Telegram groups cover all tokens launched on the Ethereum mainnet? If not, what percentage do they account for among the tokens launched on the Ethereum mainnet?
Answering this question will give us a comprehensive understanding of the current Ethereum token ecosystem. Therefore, we began to conduct an in-depth analysis of the tokens on the Ethereum mainnet to determine the coverage of tokens pushed by the Telegram group among the entire mainnet tokens. Through this analysis, we can further clarify the severity of the Rug Pull problem in the entire Ethereum ecosystem, as well as the influence of these Telegram groups in token push and promotion.
· Analysis of tokens issued by Ethereum mainnet
We crawled block data through RPC nodes in the same time period (October 2023 to August 2024) as the above analysis of Telegram group token information, and obtained newly deployed tokens (not included) from these blocks Tokens that implement business logic through proxies, because tokens deployed through proxies involve very few Rug Pull cases). The final number of captured tokens was 154,500, of which the number of Uniswap V2’s liquidity pool (LP) tokens was 54,240, and LP tokens are not within the scope of this article’s observation.
Therefore, we filtered the LP tokens and the final number of tokens was 100,260. Relevant information is shown in Table 14.
We conducted Rug Pull rule testing on these 100,260 tokens, and the results are shown in Table 15.
Among the 100,260 tokens that were tested for Rug Pull, we found that 48,265 tokens were Rug Pull tokens, accounting for 48.14% of the total. This proportion is consistent with the proportion of Rug Pull tokens among the tokens pushed in the Telegram group About the same.
In order to further analyze the inclusion relationship between the tokens pushed by the Telegram group and all tokens launched on the Ethereum mainnet, we conducted a detailed comparison of the information of these two groups of tokens, and the results are shown in Table 16.
As can be seen from the data in Table 16, there are 90,228 intersections between tokens pushed by the Telegram group and tokens captured by the mainnet, accounting for 89.99% of the mainnet tokens. There are 3,703 tokens in the Telegram group that are not included in the tokens captured by the mainnet. After sampling inspection, these tokens are all tokens that implement contract agents, and we did not include them when we captured the mainnet tokens. Token that implements agency.
As for the 10,032 mainnet tokens that have not been pushed by the Telegram group, the reason may be that these tokens are filtered out by the push rules of the Telegram group. The reason for being filtered may be due to lack of sufficient appeal or Certain push criteria were not met.
For further analysis, we separately conducted Rug Pull detection on these 3,703 tokens that implemented contract agents, and finally found only 10 Rug Pull tokens. Therefore, these contract proxy tokens will not cause much interference to the Rug Pull detection results of the tokens in the Telegram group, which shows that the Rug Pull detection results of the tokens pushed by the Telegram group and the mainnet tokens are highly consistent.
These 10 Rug Pull token addresses that implement proxy are listed in Table 17. If you are interested, you can check the relevant details of these addresses by yourself. This article will not go into further details here.
Through this analysis, we confirmed that the tokens pushed by the Telegram group have a high degree of overlap with the mainnet tokens in the Rug Pull token ratio, further verifying the importance and influence of these push channels in the current Rug Pull ecosystem. force.
Now we can answer the question, that is, do the tokens pushed in the Telegram group cover all the tokens launched on the Ethereum mainnet, and if not, what proportion do they account for?
The answer is that the tokens pushed by the Telegram group account for about 90% of the main network, and its Rug Pull test results are highly consistent with the Rug Pull test results of the main network tokens. Therefore, the previous Rug Pull detection and data analysis of tokens pushed by Telegram groups can basically reflect the current status of the token ecology of the Ethereum main network.
As mentioned earlier, the Rug Pull tokens on the Ethereum mainnet account for approximately 48.14%, but we are also interested in the remaining 51.86% of non-Rug Pull tokens. Even excluding Rug Pull tokens, there are still 51,995 tokens in an unknown state, which is far more than we would expect for a reasonable number of tokens. Therefore, we made statistics on the time from creation to the final cessation of activity for all tokens on the main network, and the results are shown in Table 18.
As can be seen from the data in Table 18, when we expand our horizons to the entire Ethereum main network, the number of tokens with a token life cycle less than 72 hours will be 78,018, accounting for 77.82% of the total. This number is significantly higher than the number of Rug Pull tokens we detected, which shows that the Rug Pull detection rules mentioned in this article cannot fully cover all Rug Pull cases. In fact, through sampling testing, we did find that there were undetected Rug Pull tokens. At the same time, this may also mean that there are some other forms of fraud that are not covered, such as phishing attacks, Pixiu disks, etc., which still require further digging and exploration.
In addition, the number of tokens with a life cycle greater than 72 hours is also as high as 22,242. However, this part of the token is not the focus of this article, so there may still be other details waiting to be discovered. Perhaps some of these tokens represent failed projects, or projects that had a certain user base but failed to gain long-term development support. The stories and reasons behind these tokens may hide more complex market dynamics.
The token ecology of the Ethereum mainnet is much more complex than we expected, with various short-term and long-term projects intertwined, and potential frauds emerging in endlessly. This article is mainly to arouse everyone's attention. I hope everyone can realize that in our unknown corners, criminals have been acting quietly. We hope that through such analysis, we can encourage more people to pay attention and research to improve the security of the entire blockchain ecosystem.
think
Among the newly issued tokens on the Ethereum mainnet, Rug Pull tokens account for as high as 48.14%, which is a very warning figure. It means that on average, for every two tokens launched on Ethereum, one is used for fraud, which reflects the chaos and disorder of the current Ethereum ecosystem to a certain extent. However, the real concern goes far beyond the current state of the Ethereum token ecosystem. We found that among the Rug Pull cases captured by the on-chain monitoring program, the number of cases in other blockchain networks is even greater than that of Ethereum. So what is the token ecology of other networks like? It is also worthy of further in-depth study.
In addition, even if you exclude Rug Pull tokens, which account for 48.14%, Ethereum still has about 140 new tokens launched every day, and its daily issuance range is still much higher than the reasonable range. Are there other tokens hidden among these uninvolved tokens? Unrevealed secrets? These issues are worthy of our in-depth thinking and research.
In the meantime, there are a number of key points in this article that need further exploration:
1. How to quickly and efficiently determine the number of Rug Pull groups and their connections in the Ethereum ecosystem?
Regarding the large number of Rug Pull cases detected so far, how to effectively determine how many independent Rug Pull gangs are hidden behind these cases, and whether there are connections between these gangs? This analysis may require a combination of fund flows and address sharing.
2. How to more accurately distinguish the victim address and attacker address in the Rug Pull case?
Distinguishing victims and attackers is an important step in identifying fraud, but the boundaries between victim addresses and attacker addresses are blurred in many cases. How to distinguish more accurately is a problem worthy of in-depth study.
3. How to move the Rug Pull detection to during or even before the event?
The current Rug Pull detection method is mainly based on post-event analysis. Is it possible to develop an in-process or pre-event detection method to identify possible Rug Pull risks in currently active tokens in advance? This ability will help reduce investor losses and intervene promptly.
4. What is the profit strategy of the Rug Pull gang?
Research the profit conditions under which Rug Pull gangs will conduct Rug Pull (for example, when the average profit is, they choose to run away, please refer to Table 13 of this article), and whether they ensure their profits through certain mechanisms or means . This information helps predict the occurrence of Rug Pull behavior and strengthen prevention.
5. In addition to Twitter and Telegram, are there any other promotion channels?
The Rug Pull gang mentioned in this article mainly promotes its fraudulent tokens through channels such as Twitter and Telegram, but are there other promotion channels that may be exploited? For example, forums, social media, advertising platforms, etc. Do these channels also have similar risks?
These issues are worthy of our in-depth discussion and thinking. They will not be discussed here and are left for everyone’s research and discussion. The Web3 ecosystem is developing rapidly, and ensuring its security not only relies on technological progress, but also requires more comprehensive monitoring and more in-depth research to deal with changing risks and challenges.
suggestion
As mentioned above, the current token ecosystem is full of scams. As a Web3 investor, you may suffer losses if you are not careful. As the offensive and defensive confrontation between the Rug Pull gang and the anti-fraud team continues to escalate, it is increasingly difficult for investors to identify fraudulent tokens or projects.
Therefore, for investors who want to enter new markets, our team of security experts provides the following suggestions for reference:
1. Try to purchase new tokens through well-known centralized exchanges: Give priority to well-known centralized exchanges for purchasing new tokens. These platforms are more stringent in project review and are relatively safer.
2. When purchasing new tokens through a decentralized exchange, you need to be sure of its official website and on-chain address: ensure that the purchased tokens come from the officially released contract address to avoid mistakenly buying fraudulent tokens.
3. Before purchasing new tokens, verify whether the project has an official website and community: Projects without an official website or active community tend to have higher risks. Pay special attention to new tokens pushed by third-party Twitter and Telegram groups. Most of these pushes have not been verified for security.
4. Check the creation time of the token and avoid purchasing tokens that were created less than 3 days ago: If you have a certain technical foundation, you can check the creation time of the token through the block browser and try to avoid purchasing tokens that were created less than 3 days ago. coins because Rug Pull tokens are usually active for a short period of time.
5. Use the token scanning service of a third-party security agency: If conditions permit, you can use the token scanning service provided by a third-party security agency to detect the security of the target token.
call
In addition to the Rug Pull fraud gang that is the focus of this article, more and more similar criminals are using the infrastructure and mechanisms of various fields or platforms in the Web3 industry to make illegal profits, making the current security situation of the Web3 ecosystem increasingly severe. We need to start paying attention to some issues that are often overlooked and not give criminals an opportunity to take advantage of them.
As mentioned earlier, the capital inflows and outflows of the Rug Pull gang will eventually flow through major exchanges, but we believe that the capital flow of Rug Pull fraud is just the tip of the iceberg, and the scale of malicious funds flowing through exchanges may be far beyond our imagination. Therefore, we strongly call on major exchanges to adopt stricter regulatory measures against these malicious capital flows and actively crack down on illegal and fraudulent activities to ensure the safety of users' funds.
Similar to third-party service providers such as project promotion and on-chain sniper bots, their infrastructure has actually become a profit-making tool for fraud groups. Therefore, we call on all third-party service providers to strengthen security review of their products or content to avoid malicious use by criminals.
At the same time, we also call on all victims, including MEV arbitrageurs and ordinary users, to actively use security scanning tools to detect target projects before investing in unknown projects, refer to project ratings from authoritative security agencies, and proactively disclose the malicious behavior of criminals. Expose illegal practices in the industry.
As a professional security team, we also call on all security practitioners to proactively discover, screen, and fight illegal behaviors, and to speak out diligently to protect users' property safety.
In the Web3 field, third-party service providers such as users, project parties, exchanges, MEV arbitrageurs, and Bots all play a vital role. We hope that every participant can contribute to the sustainable development of the Web3 ecosystem and jointly create a more secure and transparent blockchain environment.