The rise of crypto-related scams shows no sign of slowing down, and the recently discovered “WhiteRock ($WHITE) Proposal” scam is a stark reminder of how cunning cybercriminals can be. Disguised as a legitimate poll for token allocation on the real WhiteRock (whiterock.fi) platform, this fraudulent operation uses a malicious voting site to trick victims into connecting their crypto wallets—leading to significant financial losses.
Overview of the Scam
Researchers uncovered a suspicious domain, voting-whiterock[.]com, posing as an extension of the WhiteRock platform. It falsely invites users to participate in a poll regarding a 1.5 billion WHITE token allocation event. However, there is no such airdrop, and this event is not associated with the legitimate WhiteRock protocol, which is a real-world asset tokenization platform allowing users to buy stocks, bonds, and property using cryptocurrency.
The goal of this fake poll? To steal users’ digital assets. When users connect their wallets to participate, they unknowingly sign a malicious smart contract. This contract gives the attackers access to siphon crypto directly from the wallet, deploying what is known as a cryptocurrency drainer.
How the Crypto Drainer Works
Once a victim connects their wallet, the drainer automatically executes unauthorized transactions. These can include asset transfers, token swaps, and approvals, all designed to extract the most valuable digital assets as efficiently and discreetly as possible. Victims often don’t realize what’s happening until their wallet balances have been completely wiped out.
And remember—cryptocurrency transactions are irreversible. Once the funds are gone, there is virtually no chance of recovery due to the anonymous and decentralized nature of blockchain transactions.
⚠ Threat Summary
Category | Details |
---|---|
Threat Name | “WhiteRock ($WHITE) Proposal” crypto drainer |
Threat Type | Phishing, Scam, Social Engineering, Cryptocurrency Drainer |
Fake Claim | Poll for 1.5 billion WHITE token reallocation |
Disguise | Mimics WhiteRock.fi (real-world asset crypto platform) |
Fake Domain(s) | voting-whiterock[.]com |
Associated Emails | None publicly disclosed |
Detection Names | CRDF (Malicious), G-Data (Phishing), Fortinet (Spam), more on VirusTotal |
Symptoms of Infection | Unauthorized wallet activity, missing tokens, unexpected smart contract approvals |
Distribution Methods | Fake websites, social media spam, pop-up ads, compromised third-party apps |
Damage | Monetary loss, exposure of wallet credentials |
Danger Level | 🔴 High – Targets valuable assets and uses sophisticated phishing techniques |
Recommended Tool | SpyHunter |
Why This Scam Is So Dangerous
Crypto drainers are a growing category of digital threats designed specifically to target DeFi users and NFT holders. With over $1 billion lost to crypto scams since 2021, according to the FTC, scams like the fake “WhiteRock ($WHITE) Proposal” show just how easily even experienced users can fall into these traps.
Because these scams mimic real platforms and use professional-looking interfaces, users often don’t realize they’ve been duped until their assets are gone. Worse still, the contracts involved are often obfuscated and complex, hiding malicious code beneath legitimate-looking transactions.
Dealign with Crypto Scams – Method 1: Manual Removal Guide
Follow these steps to manually remove crypto scams and protect your system.
Step 1: Identify the Crypto Scam Source
- Check if you’ve been contacted by a scammer through email, Telegram, Discord, WhatsApp, or social media.
- Identify any malicious software installed on your system, such as fake wallet apps or browser extensions.
- Scan your browser history and emails for phishing links.
Step 2: Report and Freeze Crypto Transactions (If Possible)
- Contact your crypto exchange immediately if you suspect fraud.
- Check if your transaction is pending (some blockchains allow canceling or replacing a transaction).
- Report the scam to authorities such as:
Step 3: Remove Malicious Software and Fake Wallet Apps
- Windows Users:
- Open Control Panel > Programs and Features
- Look for unknown apps related to crypto wallets or trading bots.
- Click Uninstall.
- Mac Users:
- Open Finder > Applications
- Locate suspicious apps and drag them to the Trash.
- On Mobile (Android & iOS):
- Go to Settings > Apps (Android) or General > iPhone Storage (iOS).
- Uninstall any unrecognized crypto wallet apps.
Step 4: Clear Browser Data and Remove Malicious Extensions
- Google Chrome:
- Go to chrome://extensions/
- Remove unfamiliar or suspicious extensions.
- Firefox, Edge, Safari:
- Open settings and remove unauthorized extensions.
- Clear Cache & Cookies:
- Open browser settings → Privacy → Clear browsing data
Step 5: Reset Passwords & Enable Two-Factor Authentication (2FA)
- Change passwords for your crypto exchanges, wallets, and emails.
- Use a strong, unique password for each account.
- Enable 2FA on all critical accounts (Google Authenticator or YubiKey recommended).
Step 6: Scan for Malware and Keyloggers
Even if you removed software manually, some malware can still lurk in your system. Use a security tool to perform a deep scan (see SpyHunter method below for an automatic removal process).
Step 7: Monitor Your Accounts & Funds
- Track your crypto wallet transactions using Etherscan or Blockchain Explorer.
- Keep an eye on email login alerts from suspicious locations.
- Use a hardware wallet (Ledger, Trezor) for better security.
Method 2: Automatic Removal Using SpyHunter
For a fast and reliable way to remove crypto scam-related malware, use SpyHunter.
Step 1: Download SpyHunter
Step 2: Install SpyHunter
- Run the SpyHunter setup file.
- Follow the on-screen installation steps.
- Open SpyHunter once installed.
Step 3: Perform a Full System Scan
- Click on “Start Scan Now” to analyze your system.
- Wait for the scan to detect crypto scam malware, spyware, keyloggers, and phishing trojans.
Step 4: Remove Threats Automatically
- Click “Fix Threats” after the scan completes.
- SpyHunter will eliminate malware, fake apps, and browser hijackers.
Step 5: Protect Your System from Future Crypto Scams
- Enable SpyHunter’s Real-Time Protection to block phishing sites and prevent future infections.
- Regularly scan your system for new threats.
Prevention Tips: How to Avoid Crypto Scams in the Future
- Always verify website URLs before logging into exchanges or wallets.
- Avoid unsolicited investment offers on Telegram, Discord, and email.
- Never share your private keys or recovery phrases with anyone.
- Use a hardware wallet instead of online wallets.
- Regularly update your antivirus and anti-malware software.
- Be skeptical of high-return crypto investment schemes.
Conclusion
The “WhiteRock ($WHITE) Proposal” scam is a textbook example of how cybercriminals exploit trust and curiosity within the crypto space. By impersonating a legitimate platform and offering fake airdrops, they lure users into connecting their wallets—then drain them dry.
If you suspect your wallet has been compromised or you’re experiencing suspicious behavior, scan your device immediately using SpyHunter, a trusted malware detection and removal tool.
Protect yourself by staying informed, using security tools like SpyHunter, and never connecting your wallet to unverified platforms or links. Always remember: If it sounds too good to be true—it probably is.