Home Scammers, Hidden Mints & Empty Wallets

Scammers, Hidden Mints & Empty Wallets

Share
Share
By Laxmikant Khanvilkar

Scammers hold many tricks under their hat to lure investors and empty their pockets! Oops! Wallets is the more appropriate word. In our latest understanding of rug pull series, we will try to understand “Hidden mints” – an effective dumping tool used by scammers.

Basically, a hidden mint, a hard rug pull technique, allows one or more externally owned accounts (EOAs) – in this context, the personal address(es) of the token’s deployers – to mint new tokens using a hidden function within the token’s contract.

After calling this function, the scammer dumps extra tokens on the market, which results in devaluing the tokens held by others. To devalue tokens, the scammers undertake a series of modifying activity to effect dumping process successfully. This process includes fake ownership renunciations to create impression of relinquished tokens, using hidden balance modifiers to modify token holders’ balances, hidden transfers to send tokes from user address to themselves, which is followed by hidden max transaction amount and hidden fee modifiers.

Fake ownership renunciations

In a fake ownership renunciation, the scammer deceptively encodes the impression that they have relinquished control of the token contract. The scammer maintains ownership, and is therefore still able to call sensitive, owner-only functions within the contract, like functions that can pause trading, mint tokens, or set fees.

Hidden balance modifiers

A hidden balance modifier allows one or more externally owned accounts (EOAs), or the token contract itself, to modify token holders’ balances. If the EOA sets holder balances to zero, this makes selling impossible, much like a honeypot.

Hidden transfers

A hidden transfer allows developers to send tokens from other users’ addresses to themselves. For e.g. Grab Chain token, which automatically adds buyer addresses to a custom-made array. Later on, the scammer calls a public function that is maliciously scripted to transfer all but one token from every buyer’s address to the token’s marketing wallet, which is controlled by the scammer.

Hidden max transaction amount modifiers

Hidden max transaction amount modifiers let developers establish maximum transaction values. The impersonation token SpaceX includes an intentionally misnamed function called burning that, when called, limits every user’s maximum transaction value to zero —except for the rug-puller.

Hidden fee modifiers

Hidden fee modifiers allow token developers to change the fee amounts collected when users buy and/or sell a token. Scammers can make this modification to trick users into unknowingly paying as much or sometimes even more than 100% of the size of their transfers in fees.

Share

Latest News

News
Franklin Templeton Brings Benji Platform To BNB Chain | 3.0 TV

Franklin Templeton Brings Benji Platform To BNB Chain

Franklin Templeton has announced the integration of its Benji Technology Platform with BNB Chain, marking another step in its push toward tokenizing...

News
Nasdaq-listed Fitell Shares Drop After $10M Solana Buy

Nasdaq-listed Fitell Shares Drop After $10M Solana Buy

Fitell, a Nasdaq-listed fitness equipment company, saw its shares plunge 21% after announcing a $10 million acquisition of Solana tokens as part...

News
Gate Launches New Layer 2 Network Alongside GT Tokenomics Update

Gate Launches New Layer 2 Network Alongside GT Tokenomics Update

Gate has officially unveiled Gate Layer, a layer 2 scaling solution aimed at supporting high-performance blockchain transactions. Built on the Optimism Stack...

News
Hyperliquid Stablecoin Goes Live After Fierce Bidding For Issuance Rights

Hyperliquid Stablecoin Goes Live After Fierce Bidding For Issuance Rights

Hyperliquid, a decentralized derivatives platform, has officially launched its native stablecoin USDH following a closely contested validator vote on September 14. The...

Latest Blogs

How to Create Your First Cryptocurrency Token: A Beginner’s Guide

Why Create Your Own Crypto Token? The increasing popularity of blockchain technology and its applications leads more people to explore token creation...

How Hackers Stole $44M from CoinDCX Without Touching User Wallets?

A Shocking Crypto Breach The crypto market experienced major instability during July and August 2025 after CoinDCX India’s leading exchange suffered a...

What are Political Memecoins? A Beginner’s Guide

The Meme Coin Evolution Digital currencies have undergone significant changes because of recent trends in online interactions. The concept of digital currencies...

How to Buy Ethereum: A Beginner’s Guide

Why Ethereum? Digital currencies continue to transform rapidly while Ethereum emerges as a major player which attracts both seasoned investors and newcomers...

Related Articles

How to Create Your First Cryptocurrency Token: A Beginner’s Guide

Why Create Your Own Crypto Token? The increasing popularity of blockchain technology...

How Hackers Stole $44M from CoinDCX Without Touching User Wallets?

A Shocking Crypto Breach The crypto market experienced major instability during July...

What are Political Memecoins? A Beginner’s Guide

The Meme Coin Evolution Digital currencies have undergone significant changes because of...

How to Buy Ethereum: A Beginner’s Guide

Why Ethereum? Digital currencies continue to transform rapidly while Ethereum emerges as...