Skip to main content
Blog & Knowledge Base :: More ongoing soft-rug scams in Solana
Contact Page | Privacy Policy

More ongoing soft-rug scams in Solana

Cyber:Assist.Zone Team March 27, 2026 Threat reports

Note: Updated on 08 April 2026.

Summary

Since mid‑2025 a coordinated campaign has deployed multiple malicious Solana SPL tokens (notably AZR, TYN, SNT, LYRA, and others) that leverages freeze authority, social‑engineering via Telegram, and look‑alike websites to trick victims into approving SOL/WSOL transfers.

The operation primarily targets Russian‑speaking investors and other non‑professional traders attracted by memecoin hype and quick‑profit promises. Victims' newly created Solana SPL token accounts are frequently frozen shortly after swaps, and attackers then use fake "support" channels and fraudulent verification sites to obtain signatures that move SOL/WSOL to scammer‑controlled wallets. Proceeds are consolidated through intermediary accounts,  with linked accounts holding an estimated > USD 4.1 million.

Hundreds of token holders have been affected, resulting in locked assets and material financial losses; on‑chain pseudonymity and multi‑account laundering make recovery difficult.

Background

The risk monitoring firm Solidus Labs found that since 2024 over 7 million tokens were launched on Solana’s Pump.fun platform, and an alarming 98.6% of them were flagged as rug pulls or manipulative schemes, with only about 97,000 tokens holding more than $1,000 in liquidity. The report also identified widespread liquidity manipulation on Raydium—around 93% of pools showing "soft rug" behavior—while high‑profile memecoins. [Source]

Key findings

Tactics observed

  • Creation of malicious Solana SPL token mints with freeze authorities to lock or control holder balances.
  • Social engineering via Telegram channels and contacts to recruit victims and provide instructions.
  • Malicious, look‑alike websites that prompt wallet connections and signatures to approve transactions or transfer funds.
  • Impersonation of token support (Telegram and websites) to instruct victims to perform "verification" steps that transfer funds to attacker wallets.

Overview of the attack flow

Phase 1 - Establishing trust and initiating trades

Through the Telegram channel @kapitalist_crypto, an individual posts advice on crypto assets (for example, BTC and BNB), often with a focus on futures trading. The channel operator, who uses the handle @Oleg_Kapitalist (hereinafter "the Scammer"), invites followers to join a private channel and begin trading under his supervision. He states that he will receive a percentage of any successful trades.

After a user requests to join the private channel, the Scammer sends instructions to begin trading under his guidance. The Scammer recommends using the Phantom wallet and converting at least $1,000 into a cryptocurrency he claims has strong upside potential. Specifically, he instructs victims to swap into crypto coin SOL and then use the Raydium.io decentralized exchange to buy a particular Solana SPL token.

In case questions raised by the user, the Scammer asks to ignore the following red flags:

  • The SPL token has an enabled Freeze authority - the token accounts can be frozen prevented from trading.
  • A large amount of Liquidity Pool (LP) tokens are unlocked, allowing the owner to remove liquidity at any point.
  • The SPL token is not listed on the Raydium.io official token list.
  • The SPL token is flagged as "SPAM" in the Phantom wallet.

Shortly after the swap, the victim’s newly created Solana SPL token account is immediately frozen.

A few days later, the Scammer asks for an update on the position and recommends closing the trade. Once the victim’s token account is unfrozen, the user is able to swap the tokens back to the SOL. The Scammer also advises executing the swaps in smaller batches to avoid large price slippage.

Example:

  • (1) On 16 February 2026 the victim named as "Victim_DA" with the wallet address DAafmK7Fqa4isZoPPDkXnXvBnSXB6khnvpgiMNFKJkVV swapped 11.72 SOL for the SPL token TYN.
  • (2) Two days later, on 18 February 2026, the victim swapped the TYN back and received 19.06 SOL.
  • (3) Then 2.05 SOL was transferred from the victim account Victim_DA to the account ScamProfit. The victim’s net gain from these trades was 5.29 SOL (approximately USD 450).

The Scammer then demands at least 30% of the profits be transferred to the account ScamProfit (HEqPoMJo7CiRDHTcsG95enrHMWmjKkXecudTBsBbbP1W). The Scammer confirms receiving of the his part of the profit.

Profit flow

Recent fund transfers into the ScamProfit account were forwarded to the account  Global_Scam  (BfP2dBiHbiqYvsmESsgHEL8wQtZt25sbDNKnwmNRB34G). The combined value held by Global_Scam and its directly linked accounts is estimated at over USD 4.1 million. 

Phase 2 - Soliciting Additional Investment 

Immediately after collecting his share, the Scammer pressures the victim to enter a new trade and suggests to increase their investment. He bolsters this pitch with a screenshot that supposedly shows a large personal stake.

The victim is instructed to swap their funds into a different Solana SPL token. Attracted by the promise of quick gains, the victim dismisses the warning signs and proceeds despite the risks. Shortly after the swap, the victim’s SPL token account is frozen. 

Example:

  • (4) On 18 February 2026 the victim transferred 17.01 SOL from the account Victim_DA into a newly created SPL Token AZR account.
  • (5) After 2 minutes the Victim_DA_AZR account was frozen by the account AZR_Scammer, who is the owner of the SPL Token AZR. 
  • As a result, the victim’s funds in that token account were locked and rendered non‑transferable.

Later the same day (or within a short time), the Scammer can repeat the scheme with another token: the victim is asked to invest again (without unblocking existing SPL Token Accounts), swaps into the new SPL token, and once more the victim’s token account is frozen.

Phase 3 - "Unlocking" Token Restrictions

When the Scammer decides the victim will not increase their investment, they pivot to "helping" recover the frozen funds acting as a classical recovery agent. The Scammer instructs the victim to move funds out of the frozen SPL token account; when that fails, they direct the victim to contact the token’s support channel. For the AZR token this appears as the Telegram account @azura_xyuz_support (hereafter "the Fake Support").

The Fake Support claims the victim’s token account is blocked by an "anti‑bot" policy and directs the victim to a verification site (For SPL Token AZR: https://azr-holders[.]io/). 

The site instructs the user to wrap a specific amount of SOL into WSOL (wrapped SOL). The required WSOL amount is customized per victim and therefore varies.

When the victim approves the transaction on the fake site, the SOL/WSOL is swaped and routed to an external WSOL account controlled by the Scammer. However, the Fake Support reassures the victim that the funds are temporarily held in a pool and will be returned to their wallet once verification completes.

Example: On 25 February 2026 the Victim_DA signed a transaction to wrap 60 SOL into WSOL. The transaction also contains instruction to add the account AZR_Scammer_Transfer as a delegate. Four minutes later the WSOL was transferred by AZR_Scammer_Transfer from the Victim_DA's account to the attacker-controlled account AZR_Scammer_LnkAcc1. The funds were subsequently converted to USDC and forwarded through intermediary accounts, ultimately consolidating in Global_Scam_LnkAcc3 and the primary aggregator account Global_Scam.

Phase 4 - "Unlocking" DEX Restrictions

Fake Support then directs the victim to a Raydium look‑alike site (for example: https://rayplatform[.]io/). The site uses a familiar tactic: the victim is prompted to sign a wallet transaction presented as swapping SOL to WSOL to "unblock" Raydium trading. In reality, the signed transaction transfers the SOL/WSOL to attacker‑controlled addresses.

Chat with the Fake Support

Example: On 01 March 2026 the Victim_DA signed a transaction to wrap 60 SOL into WSOL. The transaction also contains instruction to add the account AZR_Scammer_LnkAcc2 as a delegate. Right after that the WSOL was transferred by AZR_Scammer_LnkAcc2 from the Victim_DA's account to the attacker-controlled account AZR_Scammer_LnkAcc2. The funds were subsequently converted to USDC and forwarded the account AZR_Scammer.

Phase 5 - Escalation and full wallet compromise

Because the victim’s SPL token account remains frozen and those tokens cannot be swapped, the attacker escalate pressure and deception:

  • They arrange an incoming Telegram call and attempt to obtain the victim’s 12‑word seed phrase. With that phrase the attackers can fully compromise the wallet and drain all unfrozen funds. If the victim reveals the seed during the call, all accessible assets are transferred out immediately.
  • Later, the attacker impersonate ongoing "support" and request the victim to send additional funds to fund a new, non-compromised token account). They claim these transfers are required to enable internal recovery operations.

Technical analysis

1) Funds flow and transfer behavior for the malicious account ScamProfit

The ScamProfit is an intermediary SOL account used by the Scammer to aggregate and forward proceeds from victims’ trades to other malicious accounts, including:

  • ScamProfit_Child - 1 transacation for 15.8 SOL on 17 March 2026
  • SNT_Scammer - 1 transaction for 14 SOL on 28 November 2025
  • VLS2_Scammer - 1 transaction for 10 SOL on 09 September 2025
  • etc.

The account ScamProfit_Child itself functions as another intermediary and forwards funds onward to a further account identified as Global_Scam. Initially Global_Scam was funded by the account with address EBcfPtP3w7VKtYemb8ddCVYjXcsfiu61PPJ9vd89u4AU on 26 January 2023.

During analysis it was oberved the presense of other accounts linked to the malicious actiivty: 

  • Global_Scam_LnkAcc1 - the funds are transfered between Global_Scam and Global_Scam_LnkAcc1accounts.

As March 2026 the total value of the top linked accounts are following:

  • Global_Scam - USD 3,776,775.45
  • Global_Scam_LnkAcc1- USD 345,121.52

2) Malicious website functionality

The observed malicious websites (rayplatform[.]io, azr-holders[.]io, lyraportal[.]io) share similar functionality. Each site uses JavaScript to interact with a malicious backend API to fetch victim account details and to prepare and execute swap transactions. The sites are built with React (v14.0.4) and interface with a database that stores information about victim wallets and customized verification requirements.

Technical details are based on observed artifacts of the malicious websites and victim reports:

1. Wallet connection and precondition check (API - /api/wallet)

  • The site prompts the user to connect their wallet (Phantom or Binance Web3).
  • The site checks the connected wallet’s public address and SOL/WSOL balance to calculate a per‑victim required amount for "verification".

Example: The malicious website azr-holders[.]io returned the following API response confirming that account Victim_DA was verified on 25 February 2026 (as of 26 March 2026):

curl -X POST "https://azr-holders[.]io/api/wallet" -H "Content-Type: application/json" -d "{\"address\": \"DAafmK7Fqa4isZoPPDkXnXvBnSXB6khnvpgiMNFKJkVV\"}"
{"success":true,"wallet":{"address":"DAafmK7Fqa4isZoPPDkXnXvBnSXB6khnvpgiMNFKJkVV","status":"VERIFIED","eligible":true,"verifiedAt":"2026-02-25T18:16:30.985Z"}}

This account is also marked as "VERIFIED" in a separate API response from the malicious site rayplatform[.]io, indicating the verification record appears on multiple fraudulent websites.

curl -4 -X POST "https://rayplatform[.]io/api/wallet" -H "Content-Type: application/json" -d "{\"address\": \"DAafmK7Fqa4isZoPPDkXnXvBnSXB6khnvpgiMNFKJkVV\"}"
{"success":true,"wallet":{"address":"DAafmK7Fqa4isZoPPDkXnXvBnSXB6khnvpgiMNFKJkVV","status":"VERIFIED","isInPreset":true,"restrictions":[{"id":"cmm4zk63l0003die6cne00zk2","tokenSymbol":"AZR","tokenName":"Azura","pairSymbol":"SOL","poolAddress":null,"requiredWsol":60,"isVerified":true}],"requiredWsol":0,"allVerified":true,"verifiedAt":"2026-03-01T17:47:06.575Z"}}

Transaction analysis shows two separate transfers executed by the attacker:

  • 25 February 2026 — 60 SOL was transferred from the Victim_DA to an attacker‑controlled account.
  • 01 March 2026 — 60 SOL was transferred from the Victim_DA to an attacker‑controlled account.

2. Malicious approval/signature (API - /api/rpc)

  • The site displays instructions to "wrap" a specific SOL amount into WSOL. The amount is customized per victim and presented as required for verification. 
  • The victim is shown a wallet signature request that appears to perform a standard SPL token approval or a direct token swap.
  • The transaction presented for signature contains an SPL token approval-like action. When the victim signs, the transaction grants a program or attacker account an allowance or authority sufficient to move WSOL from the victim’s WSOL token account. In observed cases the approved instruction delegates transfer authority to a scammer-controlled account.

Note: A victim not just sign swap transaction, but also sign the instruction that added an account controlled by Scammer (e.g. for SPL AZR token - AZR_Scammer_Transfer, AZR_Scammer_Transfer2, or  AZR_Scammer_LnkAcc1) as a delegate on the victim’s WSOL token account. This delegated authority permitted the added account to move WSOL from the victim’s WSOL account to attacker‑controlled addresses  (e.g. AZR_Scammer_LnkAcc1, AZR_Scammer_LnkAcc2).

Example: On 01 March 2026 the the Victim_DA signed a transaction with Token Program Instruction to delegate AZR_Scammer_Transfer2 for the SPL Token Account WSOL:

TxHash: 2MUcshP5jr88hfSgCfxuAkAkPZEPYvp2EyCvUHmu9aGDz6h8Y1BofSe5B32g4ncRRCoexTFzSYmN8Y2wj76X8S52

The curl request below shows how the malicious site prepares a transaction for Victim_DA to sign. The API call requests a 60 Wrap SOL (WSOL) wrap operation; the response includes a base64‑encoded serialized Solana transaction plus chain metadata (blockhash and lastValidBlockHeight) ready to be presented to the Victim_DA’s wallet for signing:

curl -4 -X POST "https://rayplatform.io/api/wrap-sol" -H "Content-Type: application/json" -d "{\"action\": \"prepare\", \"address\": \"DAafmK7Fqa4isZoPPDkXnXvBnSXB6khnvpgiMNFKJkVV\", \"amount\": 60}"
{"success":true,"transaction":"AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAIEtMCKEKsH4ujmvsGZ25vyukV7EJnZyYUvNoRMiuunOkhpUlLYsMtsWU1KgHo4sVwEOx8w7Y1TGkX5kI7VfGrpsgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABt324ddloZPZy+FGzut5rBy0he1fWzeROoz1hX7/AKkAJ9OqC61Hcd88h0yiflMa9GsBd6d2Em9/xyp/OmjCDwICAgABDAIAAAAAWEf4DQAAAAMBAQER","blockhash":"1cDwHwedcVmMJXS4oSbkWehBfgycdZ6vJmSeiymG4Wz","lastValidBlockHeight":387254452}

The prepared transaction includes instructions to transfer SOL (instruction #0), create an account (instruction #1), and to assign AZR_Scammer_LnkAcc1 as a delegate (instruction #2).

4. Transfer of WSOL using approved authority

  • After approval, the attacker exercises the granted authority to move funds. The site / attacker backend initiates an on‑chain transfer using the SPL Token Program instruction transferChecked, moving WSOL from the victim’s WSOL token account to an attacker‑controlled intermediary account that the attacker created or controlled.

Example: On 01 March 2026  the AZR_Scammer_Transfer2 transfered 60 SOL from SPL Token Account WSOL of the Victim_DA to attacker-controled account.

5. Conversion and onward laundering

  • The attacker converts stolen WSOL to USDC via on‑chain markets (observed via HumidiFi WSOL–USDC pool in this campaign).
  • Converted funds are routed through one or more intermediary accounts to obscure provenance, then consolidated into a primary aggregator wallet (observed as "the Global_Scam" account) or redistributed to other scam‑related accounts (for example, AZR_Scammer or LYRA_Scammer).

Performed Actions

Website takedown

  • Cloudflare and the hosting provider were notified about malicious activity by their customer. The websites were flagged as malicious and added to several threat databases, including Google Safe Browsing, Virustotal, and Cisco Talos.
  • As April 2026, the malicious websites azr-holders[.].io and rayplatform[.] were taken down.

IOCs:

Solana SPL Token
AzR7KNPct2mit6jUdXBT3TXkHhrck8BWCo2QmFtKwNBe
The malicious Solana SPL Token Azura (AZR) used by adversaries to freeze funds for a pump-and-dump scheme.

Solana SPL Token
TYNyQwQNAUHvi5ozUaWM39mwjPbUKBxV8yto93UycDm
The malicious Solana SPL Token Tachyon (TYN) used by adversaries to freeze funds for a pump-and-dump scheme.

Solana SPL Token
sntLL7KKTK7EzLv2N2A791d3SE1sMBzrTrvAVGNFHgt
The malicious Solana SPL Token Sentium (SNT) used by adversaries to freeze funds for a pump-and-dump scheme.

Domain
https://rayplatform[.]io/
The malicious domain used by adversaries to steal funds.

Domain
https://azr-holders[.]io/
The malicious domain used by adversaries to steal funds.
 
Domain
https://lyraplatform[.]io/
The malicious domain used by adversaries to steal funds.
 
Telegram Account
@Oleg_Kapitalist
The Telegram account used by adversaries to orchestrate a fraud using the Solana SPL Tokens such as AZR, TYN, and SNT.
 
Telegram Channel
@kapitalist_crypto
The Telegram channel supported by the Telegram account @Oleg_Kapitalist which is involved in orchestration a fraud using the Solana SPL Tokens such as AZR, TYN, and SNT.
 
Telegram Account
@azura_xyuz_support
The Telegram account used to impersonate ‘Azure Support’ and the official support team for the Solana SPL Azura Token.

Annex 1. The list of SCAM Solana SPL Tokens

a) Solana SPL Token Azura (AZR)

  • SPL Token Address: AzR7KNPct2mit6jUdXBT3TXkHhrck8BWCo2QmFtKwNBe
  • Created by AZR_Scammer (F2soMan1vRiZ7hC64VAPZDaBEivX6AcbHLVvVUsHSWqz) on 09 December 2025.
  • Initial funding chain:
    • On 23 November 2025 the account AZR_Scammer_Parent (F5zPaonXz48gkmmAMrxtujvHeMk4RMrWu4e7zUGcNt1b) was funded by the account TYN_Scammer (8C3xYSscB6r3xUBjA4Uzih51mUFM4Ub2pzB2ewstDNwn).
    • The account AZR_Scammer was initially funded by the account AZR_Scammer_Parent on 09 December 2025.
    • The SPL token account (Au95XStcUEgX1Ui8E6QgCnaG7ktpztMo6gyJmbdUC2ti) was funded by the account AZR_Scammer on 09 December 2025. 
  • Holders count: 247 (as of March 2026)
  • Campaign status: ACTIVE
List of malicious web sites associated with the malicious Solana SPL Token AZR:
  • https://rayplatform[.]io/
  • https://azr-holders[.]io/

b) Solana SPL Token Tachyon (TYN) 

  • SPL Token Address: TYNyQwQNAUHvi5ozUaWM39mwjPbUKBxV8yto93UycDm
  • Created by TYN_Scammer (8C3xYSscB6r3xUBjA4Uzih51mUFM4Ub2pzB2ewstDNwn) on 22 November 2025.
  • Initial funding chain:
    • On 22 November 2025 the TYN_Scammer _Parent (HpEynXS5HPK8Cm7RjZFV1fAmfwCUddo1emxUeuiPSDqJ) was funded fromthe HTX: (Hot Wallet) (BY4StcU9Y2BpgH8quZzorg31EGE4L1rjomN8FNsCBEcx) on 13 Nov 2025, tx: HpEynXS5HPK8Cm7RjZFV1fAmfwCUddo1emxUeuiPSDqJ. The transaction was also signed by "Zerium Scammer" (38QU8LKVK1Ew5uzsqttamNTTFxvnfzgi2ACQvj3ekuom).
    • The account TYN_Scammer was funded by the account TYN_Scammer_Parent on 22 November 2025.
    • The SPL Token account (DQHLiqq5sKkuDob1H61b1DjZhpgM67j5noFU4eCWwr77) was funded by the account TYN_Scammer on 22 November  2025. 
  • Holders count: 439 (as of March 2026)
  • Campaign status: ACTIVE

c) Solana SPL Token Sentium (SNT) 

  • SPL Token Address: sntLL7KKTK7EzLv2N2A791d3SE1sMBzrTrvAVGNFHgt
  • Created by “SNT_Scammer” (wYN4hJ5XkeAKbkpCcBQ1SDJLpdV1TVeCCv6hVkdcmqE) on 23 November 2025.
  • Initial funding chain on 23 November 2025:
    • The account SNT_Scammer was initially funded by the account VLS2_Scammer.
    • The SPL Token account (HsETAik2sHV5gtc6UEDsSkpoYDpq4LRjnsGmzQm6nwFP) was funded by the account SNT_Scammer. 
  • Holders count: 529 (as of March 2026)
  • Campaign status: ACTIVE

d) Solana SPL Token Lyra (LYRA)

  • SPL Token Address: LrM9cAR7hEp8BY1H36Rxjk8eduNqaw19jKkFeLPp5UX
  • Created by the account LYRA_Scammer on 03 November 2025.
  • Initial funding chain:
    • The LYRA_Scammer account was initially funded by the account "LyFi_Scammer" (5MnMkkiQEw3nHJRntsN6tikAEXts72Db3BRPYBNitNgv) on 03 November 2025.
  • Holders count: 334 (as of March 2026)
  • Campaign status: ACTIVE
e) Solana SPL Token Velos (VLS)

Two distinct Solana SPL tokens used the same name and symbol (“Velos” / “VLS”). For clarity in this document we label them VLS1 and VLS2 and list the associated token mint addresses below:

VLS1

  • SPL Token Address: GJgLrxJCgH5hvCe71fp1CUR27uUjzAwCfA3bWC4gLJtB
  • Created by the account VLS1_Scammer (Ysh2C95b7QRecvcMjpbcaRLdWZwkupsmuzXYYRUuunG) on 2 August 2025.
  • Initial funding chain:
    • On 20 May 2025 the "VLS1_Scammer_Parent" (F5zPaonXz48gkmmAMrxtujvHeMk4RMrWu4e7zUGcNt1b) was funded by the "Magicblock_Scammer".
    • On 20 June 2025 the "VLS1_Scammer" account was funded by “VLS1 _Scammer_Parent”.
    • On 02 August 2025 the SPL token account (BEUGKrJ4RKZM1FsSwvd4S6kL7VyHZhur7UAFpDWkugwv) was funded by "VLS1_Scammer". 
  • Campaign status: Inactive (last activity on 02 January 2026)

VLS2

  • SPL Token Address: 9hB39NnEC9oSB5aa9zrUToLJHpFmTh5DJq3kQXdi1Z5R
  • Created by “VLS2_Scammer” (HKEM2gj2UFRGbkKTi4fpL71wZG1qRtcMMfb9dFH37Gue) on 15 June 2025.
  • Initial funding chain:
    • On 15 June 2025 the "VLS2_Scammer" account was funded by the “Magicblock_Scammer”.
    • On 15 June 2025 the SPL token account (E7Ks3CvDcgUT3A34baiJofK8pyo4PoMhKn7nMNRmqPrV) was funded by "VLS2_Scammer".
  • Campaign status: Inactive (last activity on 04 October 2025)
f) Solana SPL Token Magicblock (MAGIC) 
  • SPL Token Address: 7Bhshe6UH3eb9CPY9hkZ1utFaVtCkFjBuPYBcveQZMt6
  • Created by “Magicblock_Scammer” (HKSCvQ4pmtms6PuErxuJeeeCrVhVqefuqSLUGYfr1qXR) on 09 December 2025.
  • Initial funding chain:
    • On 17 May 2025:
      • The "Magicblock_Scammer_Parent" (9b6vhVozrcCqy3phoF8qrnpiuYDnDbLN4Yd2kBAXqjZT) was funded by the "Binance 2"(5tzFkiKscXHK5ZXCGbXZxdw7gTjjD1mBwuoFbhUvuAi9), tx: 4Tx3yGu9NrZhUrD12bKo98Jn2HzoWPt9rbAdt2PsjiMC4RpV3DDowy1izkFzm4ovTevP4p8GYFekrdmM5R8SvzX1
      • The "Magicblock_Scammer" account was funded by "Magicblock_Scammer_Parent".
      • The "Magicblock_Scammer" account was funded by the "Binance 2"(5tzFkiKscXHK5ZXCGbXZxdw7gTjjD1mBwuoFbhUvuAi9), tx: 55qhrjYEBWnu4PWvvmNLZcjjG17wMi7y1MpRtKdo8yCrN9Af7Utm97NEbsPzTsAxwUsfMxJU7c7qpjAXe9NGfVok
    •  On 20 May 2025 the SPL token account (F1HKnLeAq16vju9UiptJgEGhV5Dp19KJEfAG3vyNsV7g) was funded by "Magicblock_Scammer". 
  • Holders count: 21 (as of March 2026)
  • Campaign status: Inactive (last activity on 29 September 2025)
 
g) Other potential malicious Solana SPL Tokens observed:
  • SPL Token LyraFi (LYRA) (LRtvA42jAy3g4cGSHf87YD7NUwMwF4nPs24cFFeUB1u) - Inactive
  • SPL Token Atlas (ATL) (2ZSbbXF3CPT1XMtKYyVKBYpwK4gxz74pEG5kuedFE5Hs) - Inactive
  • SPL Token Volt (VOLT) (3qbsLEMjcA4h9y34gJozGeeLGPWkWjLmvMoSrwLkwMDq) - Development / Inactive
  • SPL Token Pesto (PST) (J3oS2LjE5B1SHbyKAKkdPijaayuAQs4KhXEmmTgPvFh3) - Inactive
  • an other SPL Tokens such as GEVLP, PUYYV, TVEXF

Annex 2. Malicious domain registration data

Information obtainted using the public website https://www.whois.com:
 
a) The domain "rayplatform.io"
  • Registered On: 2026-03-16
  • Expires On: 2027-03-16
  • Updated On: 2026-03-21
  • Registrar: URL Solutions, Inc. http://pananames.com
b) The domain "azr-holders.io"
  • Registered On: 2026-03-16
  • Expires On: 2027-03-16
  • Updated On: 2026-03-21
  • Registrar: URL Solutions, Inc. http://pananames.com
c) The domain "lyraplatform.io"
  • Registered On: 2025-12-23
  • Expires On: 2026-12-23
  • Updated On: 2026-01-11
  • Registrar: URL Solutions, Inc. http://pananames.com

Annex 3. List of Solana Accounts 

The list of Solana accounts mentioned in this document:
 
Victim_DA
Address: DAafmK7Fqa4isZoPPDkXnXvBnSXB6khnvpgiMNFKJkVV
Notes: Main account of one of victims obaserved during analysis
 
AZR_Scammer
Address: F2soMan1vRiZ7hC64VAPZDaBEivX6AcbHLVvVUsHSWqz
Notes: This account is the owner of SPL Token Azura (AZR)
 
AZR_Scammer_LnkAcc1
Address: EgFgRxrtE4fjT9oYkyc9tT6s9RdvWUJAR3k5jQq2yQR9
Notes: Malilciois intermediate account controlled by the attacker, used to transfer stolen crypto following malicious approvals initiated via fraudulent websites (for example, azr‑holders.io).
 
AZR_Scammer_LnkAcc2
Address: 63wL8rG7nSJ37oP2emBVuwgfUAtgASpQn3NMper9tA4a
Notes: Malilciois intermediate account controlled by the attacker, used to transfer stolen crypto following malicious approvals initiated via fraudulent websites (for example, rayplatform.io).
 
AZR_Scammer_Transfer
Address: GrPCb9ZGiJtMYj7YRazxrTZk1eWHPUQbcV4NNqct9S9a
 
AZR_Scammer_Transfer2
Address: Bpzx6z7eG1AVxyRd667TwecJ7ykuXyjKqvsk8y5X6oEr
 
Global_Scam
Address: BfP2dBiHbiqYvsmESsgHEL8wQtZt25sbDNKnwmNRB34G
 
Global_Scam_LnkAcc1
Address: DQ5JWbJyWdJeyBxZuuyu36sUBud6L6wo3aN1QC1bRmsR
 
Global_Scam_LnkAcc2
Address: 7uTT8Xi5RWXzy7h9XL244GRgEycDYDhLjr3ZyNdXi8pZ).
 
Global_Scam_LnkAcc3
Address: 9JZQ7UtamdMG5HEEgtiVAd64LmVQNEKdrVz9dPmbVkkX
 
ScamProfit
Address: HEqPoMJo7CiRDHTcsG95enrHMWmjKkXecudTBsBbbP1W
 
ScamProfit_Child
Address: DHPEpEQvHEFU8jCWbPTCkqXnJuq6rvp77RAChSHBjXAx
 
Address: SNT_Scammer
wYN4hJ5XkeAKbkpCcBQ1SDJLpdV1TVeCCv6hVkdcmqE
 
Address: VLS2_Scammer
HKEM2gj2UFRGbkKTi4fpL71wZG1qRtcMMfb9dFH37Gue
 
TYN_Scammer
Address: 8C3xYSscB6r3xUBjA4Uzih51mUFM4Ub2pzB2ewstDNwn
 
List of Solana Token accounts:
 
Nickname: Victim_DA_AZR
Address: 2JE7iGePVm3Me1YzLanzJMWVU3QAPvHXdhyQEY1jM3S3
Notes: SPL Token Account of the Victim 
 
Back to all posts