As the Pi Network community geared up to celebrate Pi2Day on June 28, 2025, a landmark annual event featuring platform updates and product launches, cybercriminals orchestrated a sophisticated scam campaign, leveraging Facebook’s advertising platform to target unsuspecting crypto enthusiasts.
Security researchers at Bitdefender Labs, led by Ionut Baltariu, have uncovered a coordinated operation responsible for phishing attacks and malware distribution under the guise of Pi2Day promotions.
Since June 24, threat actors have deployed over 140 Facebook ad variations, all mimicking legitimate Pi2Day branding and Pi Network visuals.
Disguised as official wallet gateways or airdrop events, these ads redirect users to phishing websites that prompt them to enter sensitive 24-word wallet recovery phrases.
Victims who input their credentials unwittingly grant attackers complete access to their cryptocurrency wallets, allowing for the instant theft of funds.
A parallel attack vector involves fake “mining apps” and airdrop installers promising bonuses of 31.4 or 628 Pi tokens.
These downloadable PC applications, analyzed by Bitdefender, contain advanced malware strains, including Generic.MSIL.WMITask and Generic.JS.WMITask. Once installed, these malicious payloads can:
Bitdefender’s analysis ties these new Pi2Day scams to an ongoing, large-scale campaign that also targets users of other crypto brands, including Binance and TradingView. In all observed cases, the adversaries leverage Meta’s ad infrastructure to maximize reach with sophisticated phishing and malware attacks.
The attackers have demonstrated technical acumen, reusing infrastructure and malware strains while varying the thematic branding to match current crypto events.
Their phishing sites are near-perfect clones of legitimate Pi Wallet portals, and fake mining tools employ multi-stage infection chains to ensure persistence and stealth.
Notably, many Pi Network participants are beginners in cryptocurrency, making them especially vulnerable.
The urgency induced by exclusive airdrops and countdown timers, combined with the perceived legitimacy of verified Facebook ads, increases the scam’s effectiveness.
Bitdefender was the first cybersecurity vendor to detect and block these threat variants. It has since updated its platforms to block access to all known malicious domains associated with the scam. To protect themselves, users should:
Bitdefender continues to monitor these evolving threats, urging crypto investors to exercise heightened caution when interacting with all Facebook crypto ads, including those from verified accounts. As cybercriminals exploit every opportunity, ongoing vigilance remains the best defense.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…