From: thepipeline_xyz

The practice of maintaining a trading journal, while beneficial for personal reflection and strategy development, can inadvertently expose individuals to sophisticated online scams [00:00:04]. Scammers often leverage the visibility and trust built by prominent traders to execute fraudulent schemes designed to compromise digital assets [00:00:47].

Case Study: The y22 Trader Compromise

A notable example involves a trader known as y22, who gained significant attention by publicly sharing his trading journal on Twitter [00:00:00]. His success made him a target for a sophisticated scam [00:00:05].

The scam unfolded through the following steps:

  1. Impersonation and Lure A scammer posted a link to a fake Telegram group in y22’s Twitter thread, mimicking his actual Twitter handle and history, including follower count [00:00:08], [00:00:34]. The imposter even displayed a gold check mark on their profile to enhance credibility [00:00:44].
  2. Forced Verification Upon joining the Telegram group, users were prompted to undergo a verification process [00:00:11].
  3. Desktop Action Requirement The verification included “extra added steps” that required the user to perform a specific action on their desktop browser [00:00:16]. This often involved moving from a mobile device to a desktop [00:00:22].
  4. Hot Wallet Compromise Performing the requested action on the desktop browser, where the victim’s hot wallet was located, led to its compromise [00:00:27]. As a result, y22 “more or less lost everything” [00:00:31].

Scammer Tactics and Effort

Scammers are willing to go to “very extreme lengths to compromise” individuals [00:00:47]. This includes investing significant resources, potentially “five figures,” in social engineering campaigns that demand considerable “time and effort and money” to successfully compromise multiple targets [00:00:51].

“People will go to very extreme lengths to compromise you. Don’t assume somebody’s not willing to shell out like five figures…” [00:00:47]