Cryptscam Abuse Explorer

¡Manténgase seguro, verifique si las billeteras son una estafa!

Apóyenos con una donación

Dirección de la wallet
Números de reporte
122
Saldo de wallet
 BTC → 
Total recibido
 BTC → 
Números de transacción
Fecha
05 enero 2020 domingo. 14:33:18 UTC
Tipo
ransomware
Estafador / abusador
País
India
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: PapaFitRevamp . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
05 enero 2020 domingo. 14:21:00 UTC
Tipo
ransomware
Estafador / abusador
País
Vietnam
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: [*my list database*] . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
05 enero 2020 domingo. 09:32:30 UTC
Tipo
ransomware
Estafador / abusador
País
Russia
Descripción
INSERT INTO `WARNING` VALUES (1,'To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email wit h your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: *** . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise. ','1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD','[email protected]');
fuente de datos
bitcoinabuse
Sitio URL
Fecha
05 enero 2020 domingo. 06:18:30 UTC
Tipo
ransomware
Estafador / abusador
País
United States
Descripción
new db created 'PLEASE_READ_ME_XMG", table "WARNING": To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: [redacted] . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
05 enero 2020 domingo. 06:16:40 UTC
Tipo
ransomware
Estafador / abusador
Nikolay Fedotov
País
United States
Descripción
Script kiddie attack on vulnerable PHPMYADMIN version with CVE (4.6.6). All databases have tables replaced with "WARNING" table that has the following entry: To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: [redacted] . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise. Nikolay Fedotov was the name used by an individual who claimed the attack on one of my client's websites.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
20 diciembre 2019 viernes. 13:04:58 UTC
Tipo
ransomware
Estafador / abusador
País
Brazil
Descripción
2 Database Hack
fuente de datos
bitcoinabuse
Sitio URL
Fecha
19 diciembre 2019 jueves. 19:22:14 UTC
Tipo
ransomware
Estafador / abusador
País
Kenya
Descripción
Database hack
fuente de datos
bitcoinabuse
Sitio URL
Fecha
14 diciembre 2019 sábado. 06:19:28 UTC
Tipo
ransomware
Estafador / abusador
País
India
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: kalaageblog, space, kalaageschema, author . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
05 diciembre 2019 jueves. 06:53:07 UTC
Tipo
ransomware
Estafador / abusador
País
Australia
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
28 noviembre 2019 jueves. 11:02:20 UTC
Tipo
ransomware
Estafador / abusador
País
United Arab Emirates
Descripción
He deleted my SQL database and create a table named WARNING. In the table following statement is written: To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now. If we don't receive your payment in the next 10 days, we will make your database public or use them otherwise. | 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD | [email protected] |
fuente de datos
bitcoinabuse
Sitio URL
Fecha
26 noviembre 2019 martes. 18:13:03 UTC
Tipo
ransomware
Estafador / abusador
País
Germany
Descripción
To recover your lost Database and avoid leaking it...
fuente de datos
bitcoinabuse
Sitio URL
Fecha
26 noviembre 2019 martes. 07:20:59 UTC
Tipo
ransomware
Estafador / abusador
País
Thailand
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: ***. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
22 noviembre 2019 viernes. 16:45:59 UTC
Tipo
ransomware
Estafador / abusador
País
Senegal
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
22 noviembre 2019 viernes. 12:38:56 UTC
Tipo
ransomware
Estafador / abusador
País
Netherlands
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: essentialmode, please_read_me_vvv . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
21 noviembre 2019 jueves. 18:07:05 UTC
Tipo
ransomware
Estafador / abusador
País
France
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: minecraft, panel . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
19 noviembre 2019 martes. 14:03:53 UTC
Tipo
ransomware
Estafador / abusador
País
India
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
18 noviembre 2019 lunes. 17:28:45 UTC
Tipo
ransomware
Estafador / abusador
País
Ukraine
Descripción
To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address 1BLYhUDmnmVPVjcTWgc6gFT6DCYwbVieUD and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: *, * . If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL
Fecha
11 noviembre 2019 lunes. 18:19:16 UTC
Tipo
ransomware
Estafador / abusador
País
Latvia
Descripción
They hijacked my mysql db after I started hosting an OpenCart demo web site. I guess it was important to follow the "delete installation folder" warning after all...
fuente de datos
bitcoinabuse
Sitio URL
Fecha
07 noviembre 2019 jueves. 16:38:08 UTC
Tipo
ransomware
Estafador / abusador
País
United States
Descripción
All my mysql databases are deleted, with an entry in each one saying I need to send 0.06 BTC to them, and they will recover my databases. they used the email [email protected]
fuente de datos
bitcoinabuse
Sitio URL
Fecha
06 noviembre 2019 miércoles. 14:59:02 UTC
Tipo
ransomware
Estafador / abusador
País
Belgium
Descripción
classical MySQL brute force attack, database deletion, create a WARNINGS table with instructions on how to proceed.
fuente de datos
bitcoinabuse
Sitio URL