Fraudsters are targeting the users of Basic Attention Token (BAT) in a new fraud that aims to phish for private keys of the users. in an email seen by Cryptoinfowatch titled, ” Brave – Bounty program launched The total distribution to participants will be 1,500,000$ In Tokens BAT”, the recipient was directed to a Google form which they are expected to fill to qualify for the bounty.

The content further described the features of the Brave browser and stated that to qualify for the bounty, users would need to update their Brave browser through a link that is obviously contains a code that’ll steal the private keys of anyone that downloads them.

The fraudster’s email is manager_airdrop@yahoo.com and the address of the other recipients of the scam email could be seen having been pasted in the bcc field while composing. A second email is manager_nano@yahoo.com which indicates that the fraudster targets several coins for their phishing scam. There is even a third email probably from the same fradster, this is crypto_portal@yahoo.com. Perhaps this would pop on down the line for security agencies such as FBI to nab these fraudsters.

In the email, they wrote: