Register and share your invite link to earn from video plays and referrals.

Search results for TelegramBot
TelegramBot community
One keyword maps to one global community path.
Create community
People
Not Found
Tweets including TelegramBot
DeFi alpha, delivered straight to your Telegram. LlamaAI's full functionality is now available in our Telegram bot. Step 1: Install defillama_ai_bot Step 2: Enter /start Step 3: Select 'New Session'
Show more
🫡 Check out the latest updates in #Binance# Wallet! • Quick Panel supports TP/SL strategies on BSC and SOL • Hide mnemonic-derived accounts, restorable anytime • Check token info in Telegram Bot on BSC, SOL, Base, and ETH 👉 Try it out: 💬 Share your feedback below!
Show more
$1,000,000 volume today. this number means more than it looks. when we launched V2 we started from zero. literally. the old telegram bot was stolen. the old domain was taken. we lost the distribution channels we had built and had to start over from scratch. new bot. new domain. new infrastructure. same team, same product, but rebuilding trust from nothing. and now we’re here. $1M in a single day. not because of a promo or a campaign. because the people who found us again stuck around and brought others with them. if you’ve been here since the early V2 days, thank you. you believed in the product when we had nothing to show except the product itself. we’re not stopping. more exchanges, faster execution, API access, seed mode improvements. everything we lost we already rebuilt better. $1M today. this is just the beginning.
Show more
🚨 Threat Intelligence | Analysis of a Fake TronLink Chrome Extension Phishing Campaign 🚨 SlowMist’s MistEye threat monitoring system recently detected a high-risk phishing campaign targeting #TRON# wallet users. Attackers created a fake Chrome MV3 extension impersonating @TronLinkWallet, using Unicode bidirectional control characters and Cyrillic homoglyphs to spoof the brand name. Once installed, it loads a full phishing page via remote iframe — forming a “shell-core separation” credential theft chain. 🔍 Key Findings: 🔹 The extension name uses homoglyphs for disguise. Its Chrome Web Store page inherits the real extension’s high user count and positive reviews, significantly lowering review barriers. 🔹 Local code is extremely minimal — it only loads a remote page, making static analysis almost useless for detecting malice. 🔹 The remote phishing page perfectly replicates the official TronLink Web wallet UI, stealing mnemonic phrases, private keys, Keystore files, and passwords, then exfiltrating them in real time via Telegram Bot. 🔹 Built-in anti-analysis features (disables right-click, DevTools, drag-and-drop, printing) and geo/language-based redirection for Russian users to evade detection. ⚠️ This is not a simple fake extension — it employs advanced techniques like remote dynamic loading and anti-forensics, making it extremely difficult for traditional static scanners to catch. 🛡️ Immediate Actions : • Uninstall any suspicious extension (Malicious ID: ekjidonhjmneoompmjbjofpjmhklpjdd) • Official TronLink extension ID: ibnejdfjmmkpcnlpebklmnkoeoihofec • Clear localStorage and check for abnormal traffic • If credentials were entered, create a new wallet immediately and transfer assets 📖 Full technical analysis + IOCs + self-check guide here 👇
Show more