Cryptscam Abuse Explorer

Stai al sicuro, controlla se un wallet è scam!

Supportaci con una donazione

Ultimi report

data
01 febbraio 2024 giovedì. 13:39:37 UTC
tipo
ransomware
abusatore/scammer
@CoinBlender (YT ID: UC0eIeJkFX0d1HKsMqnQqCzg)
Stato/Paese
Unknown
testo
The fake Ethereum Mixer phishing website, "ethmixer.xyz," operates by deceiving victims into thinking their Ethereum funds will be mixed. However, in reality, the scam works by consistently displaying the same Ethereum address for the domain holder, causing all victims to unknowingly send their money directly to the scammer. This deceptive practice results in the victims being scammed without their funds ever being mixed. To further substantiate the fraudulent activities associated with "ethmixer.xyz," it is important to note that the end-order domain is static and accessible to everyone via the following link: https://ethmixer.xyz/g3fs635hdfr23b.php (Archive Backup: https://web.archive.org/web/20240201133657/https://ethmixer.xyz/g3fs635hdfr23b.php). Moreover, the Ethereum address "0x24d4E7764a6a1D24AD2c805FbA52317444001915" is prominently displayed on the website for all visitors to see. This consistent display of a single Ethereum address adds to the illusion of legitimacy maintained by the scam. In addition to its website, the scammers behind "ethmixer.xyz" operate Telegram channels where they perpetuate their fraudulent activities. These channels can be accessed through the following links: https://t.me/CoinBlenderOfficial, https://t.me/CoinBlenders. Furthermore, the scammers promote their deceitful practices on their YouTube channel: https://www.youtube.com/@CoinBlender (Channel-ID: UC0eIeJkFX0d1HKsMqnQqCzg). It is suspected that they either purchased an old YouTube account or compromised an existing one to exploit and promote their fraudulent scheme. Please consider all the provided details, including the website link, Ethereum address, Telegram channels, and YouTube channel, when taking appropriate action against "ethmixer.xyz" to protect potential victims from being scammed. Thank you for your attention to this matter.
fonte dei dati
cryptscam
Url del sito
ethmixer.xyz
data
19 gennaio 2024 venerdì. 20:31:09 UTC
tipo
scamsite
abusatore/scammer
InstantExchange.net
Stato/Paese
Unknown
testo
"InstantExchange.net" is a fraudulent website that operates as a phishing scam, deceiving users into believing they can exchange bitcoin for PayPal funds. The website displays a consistent bitcoin address, "bc1q78vmds2kyadelwvx0rql5k3havdu8amlsqvvet", which victims are manipulated into sending their bitcoin to, under the false pretense of receiving PayPal funds. The scam was advertised on a YouTube channel with the URL "https://www.youtube.com/@cryptguy" and Channel-ID: (UCzF_u9R3Rt7ns7TOucaHi-w) As of 1/19/2024, the scammers have managed to steal over $10,000 worth of bitcoin. Furthermore, they have previously used different bitcoin addresses to steal additional funds from unsuspecting victims who fell victim to this fraudulent website.
fonte dei dati
cryptscam
Url del sito
https://instantexchange.net
data
18 gennaio 2024 giovedì. 15:27:40 UTC
tipo
scamsite
abusatore/scammer
-
Stato/Paese
Russia
testo
The owner creates fake websites with a fake Collabland bot, during verification of wallets through which a hidden transaction is issued for the transfer of funds
fonte dei dati
cryptscam
Url del sito
-
data
15 gennaio 2024 lunedì. 14:14:27 UTC
tipo
bitcoin tumbler/anonymizer
abusatore/scammer
Unknown
Stato/Paese
Unknown
testo
Attention, Cryptscam and Crypto community! I have discovered a large network of fake crypto mixer websites on fraudulent crypto mixer phishing rating websites like "bestbitcointumblers.site" and "btc-mixer.org". These websites have been created with the intention to socially engineer and manipulate victims into sending their cryptocurrency to scam websites, posing a significant risk to crypto users. These fake websites have even cloned popular crypto mixer platforms such as ChipMixer and Blender, both of which are officially confirmed to be down according to Wikipedia. It is important to note that the following websites are known to be fake crypto mixer websites: 1. bestbitcointumblers.site 2. btc-mixer.org 3. bitcoinmix.online 4. bitcoinblender.online 5. blenderio.ai 6. chipmixer.best 7. smartmix.host 8. cryptomixer.cx 9. mixtum.app 10. anonymix.me These addresses belong all to this fraudster: Bitcoin: (bc1qggcec69pkt0nln72dzwxvecl9mmxcq6rauqzn9) Bitcoin: (bc1q48y4gduss82juc3ugn0dxur3ltz6cpqexys85l) Bitcoin: (bc1qpd2f2pnhqsyxtv9kg2k7e7gxagj8vls6ah4n9s) Ethereum: (0x2e63d665d0c0edff11d5276405c5b65d964b3ead) Litecoin: (ltc1qu87hp7s5g80244t2qrmvfrq7qsstmxel2l2n6v) Bitcoin: (bc1qjm70r4a9vusms5890sg78lm5xxea7mclrlcne0) Bitcoin: (bc1q6gawnyjtpjfhtlj0t3s7uz0crqyu7q3z0v7l4j) Bitcoin: (bc1q9z599cwmw7rud0xt0camerqsrntjdyfp5588ut) Bitcoin: (bc1qgx3h5yamn5lgglsn464zq24m3g5w62eg6n54ke) Bitcoin: (bc1qp2chjgvw4dmgdzkz73zq2q7ehrthwx0a6r8tm7) It is crucial for users to exercise caution and avoid engaging with these fraudulent websites. Taking appropriate measures, such as reporting them and spreading awareness about their existence, is essential to protect oneself and others from falling victim to these scams.
fonte dei dati
cryptscam
Url del sito
https://cryptomixer.cx/
data
13 gennaio 2024 sabato. 07:44:34 UTC
tipo
blackmail scam
abusatore/scammer
Hacking/Recovery
Stato/Paese
United States
testo
ARE YOU A VICTIM OF INVESTMENT OR NFT SCAM? DO YOU WANT TO INVESTIGATE A CHEATING SPOUSE? DO YOU DESIRE CREDIT REPAIR (ALL BUREAUS)? SCHEDULE A MEETING WITH AN ETHICAL HACKER TO GET STARTED. JAMES is a private investigator and funds recovery genius. Who specialize in cases regarding HACKING, CRYPTOCURRENCY RECOVERIES, FAKE INVESTMENT SCHEMES. They are also experts in CREDIT REPAIR and also analyze what’s impacting your score. All software tools needed to execute RECOVERIES from start to finish are available in stock. Be ALERT to FALSE reviews and testimonies on the internet, Contact JAMESMCKAYWIZARD & team as soon as you can via the email address below [email protected] or what'sapp +44 7826 613094 .
fonte dei dati
cryptscam
Url del sito
data
09 gennaio 2024 martedì. 09:58:53 UTC
tipo
blackmail scam
abusatore/scammer
Stato/Paese
Russia
testo
Для выхода из данной ситуации предлагаю вам следующий вариант — Вы переводите мне 60 000 рублей на мой биткойн кошелёк, а я удаляю все материалы и мы забываем друг о друге. Поверьте, это очень скромная сумма за мои труды. Платите исключительно в биткоинах! Вот номер кошелька куда отправлять монеты - bc1qm4zszcjcu3lrudxl6an6fhj9lv5elw5thlwh3y
fonte dei dati
cryptscam
Url del sito
https://mail.yandex.ru
data
07 gennaio 2024 domenica. 15:22:32 UTC
tipo
blackmail scam
abusatore/scammer
From equals to receiver - via imf08.b.hostedemail.
Stato/Paese
Italy
testo
Received: from domain.com (unknown [1.1.1.1]) by imf08.b.hostedemail.com (Postfix) with ESMTP Subject: ALLARME - Ti ho hackerato e ti ho rubato informazioni e foto Message-ID: <1346-2024-0106-135357-1246@mx-imapserv-r-9d5c66c7b-4qhb8.mx.internal> I regret to inform you that there has been a security breach involving your devices used for Internet browsing. A few months ago, I gained unauthorized access to these devices and monitored your Internet activities. Recently, I was able to successfully hack your email accounts, including your password: ________ Furthermore, I have installed a Trojan virus on all devices you use to access your email. This was possible because you clicked on links from emails in your inbox, making it relatively easy for me to infiltrate your systems. Through this software, I got access to various features of your devices, such as microphone, camera and keyboard. I also retrieved and stored your personal information, data, photos and browsing history on my servers. Furthermore, I gained access to your messengers, social networks, email correspondence, chat history and contact list. To remain undetected, my virus continually updates its signatures, making it invisible to antivirus software. During my investigation, I found that you frequently visit adult websites and indulge in explicit content. I managed to record explicit videos of you and created a montage showing your intimate moments and self-satisfaction. If you doubt the authenticity of my claims, I can easily share these videos with your friends, colleagues and relatives, or even make them publicly accessible. I believe it is in your best interest to prevent this from happening, considering the possible consequences of exposing such explicit content. Therefore, I propose a solution: Transfer $500 USD to my bitcoin wallet (details provided below), based on the exchange rate at the time of the transaction. Once the transfer is complete, I will promptly delete all compromising material. After that, we will part ways and I assure you that I will disable and remove all malicious software from your devices. You can trust me to hold up my end of the bargain. Considering the extensive information I have about you and the time I have invested in monitoring your activities, I believe this is a fair and reasonable offer. If you are unsure about how to buy and transfer bitcoin, I suggest using a search engine for guidance. Bitcoin wallet: bc1qq6qnzry0twe67tydpx7pcg6nn475qzdspcjl77 Please refrain from carrying out the following actions: Please do not reply to this email, as I created it in your inbox and generated the return address. Do not try to contact the police or other security services. Also, do not inform your friends, as it would be very easy for me to discover such actions, given my control over your systems. If so, they would immediately share the videos publicly. There is no point in trying to find me, as all cryptocurrency transactions are anonymous. Reinstalling the operating system or getting rid of your devices will not be effective, as the videos have already been stored on remote servers. There are some things you don't need to worry about: I receive your funds transfer promptly, as I constantly monitor your activities through my Trojan virus, which has remote control capabilities similar to TeamViewer. Once the funds transfer is complete, I have no intention of sharing your videos. I have no interest in complicating your life further, otherwise I would have already done so if that were my intention. You can rest assured, everything will be handled fairly. Finally, I strongly advise you to avoid similar situations in the future. It is wise to change all your passwords regularly to improve your online security.
fonte dei dati
cryptscam
Url del sito
data
21 dicembre 2023 giovedì. 17:01:55 UTC
tipo
other
abusatore/scammer
scammer
Stato/Paese
Romania
testo
Помимо этого, у меня теперь есть возможность включать/выключать камеру и микрофон, делать записи, при этом вы ни о чем не догадываетесь. Далее я посмотрел сайты, которые вы регулярно посещаете, и был шокирован увиденным!!! Могу сказать только то, что ваши фaнтaзии не имеют ничего общего с нормальным восприятием обычного человека. И у меня появились идея. Я записал видео с таких сайтов, где Вы периодически проводите время (понимаете, о чем это, да?). После этого я заснял видео как Вы удовлетворяете себя (используя камеру вашего устройства) и склеил их. Получилось потрясающе! Это впечатлит любого, тем более ваших знакомых! Уверен, что Вы не хотели бы показывать это видео своим друзьям, родственникам или коллегам. А я буквально в пару кликов могу отправить это видео всем Вашим контактам. Для выхода из данной ситуации предлагаю вам следующий вариант — Вы переводите мне 60 000 рублей на мой биткойн кошелёк, а я удаляю все материалы и мы забываем друг о друге. Поверьте, это очень скромная сумма за мои труды. Платите исключительно в биткоинах! Вот номер кошелька куда отправлять монеты - bc1q9r0zy5rxjlzlmqelqzndngnqag847s2hpwkh6f Вы не знаете как пополнить такой кошелёк? Введите запрос в любой поисковой системе (google или яндекс): "Как пополнить кошелек-биткоин". Так же можете воспользоваться обменным сервисом bestchange.com, там много вариантов обмена, любой банк либо платежная система (Qiwi, Яндекс.деньги, WebMoney и т.д.). Это очень легко На это я даю вам 72 часа с момента открытия этого письма. Учтите, как только вы откроете это письмо, сработает таймер и время пойдет. После оплаты все видео будут автоматически удалены. ЕСЛИ ВЫ НЕ ВЫПОЛНИТЕ УСЛОВИЯ, МНЕ ПРИДЁТСЯ РАЗОСЛАТЬ ЭТО ВИДЕО ВСЕМ ВАШИМ КОНТАКТАМ. Я НАДЕЮСЬ, ВЫ ПОНИМАЕТЕ СВОЮ СИТУАЦИЮ. — НЕ ПЫТАЙТЕСЬ НАЙТИ И УНИЧТОЖИТЬ УЯЗВИМОСТЬ (ВСЕ ВАШИ ДАННЫЕ, ФАЙЛЫ, ФОТО, ВИДЕО С ВАМИ УЖЕ ЗАГРУЖЕНЫ НА УДАЛЕННЫЙ СЕРВЕР). — НЕ ПЫТАЙТЕСЬ СВЯЗАТЬСЯ СО МНОЙ (ЭТО НЕВОЗМОЖНО, ТАК КАК АДРЕС ОТПРАВИТЕЛЯ ГЕНЕРИРУЕТСЯ СЛУЧАЙНЫМ ОБРАЗОМ). — РАЗЛИЧНЫЕ СЛУЖБЫ БЕЗОПАСНОСТИ ВАМ НЕ ПОМОГУТ, ФОРМАТИРОВАНИЕ ДИСКА ИЛИ УНИЧТОЖЕНИЕ ДЕВАЙСА НЕ ПОМОЖЕТ, ТАК КАК ВАШИ ДАННЫЕ УЖЕ НАХОДЯТСЯ НА УДАЛЕННОМ СЕРВЕРЕ. P.S. ВЫ НЕ ЕДИНСТВЕННЫЙ, ЗА КЕМ Я ТАК НАБЛЮДАЮ. ПОЭТОМУ ГАРАНТИРУЮ ВАМ, ЧТО ПОСЛЕ ОПЛАТЫ МЫ ЗАБУДЕМ ДРУГ О ДРУГЕ. Не держите на меня зла! Почаще обновляйте свой антивирус и не посещайте сомнительные сайты. Удачи
fonte dei dati
cryptscam
Url del sito
https://pastebin.com/RygcjjYa
data
20 dicembre 2023 mercoledì. 01:34:38 UTC
tipo
Phishing
abusatore/scammer
Russian 🇷🇺
Stato/Paese
Russia
testo
Urgent Complaint - Cybercriminal Engaged in Crypto Crimes and Fake Crypto Mixer Networks Attention CryptScam Community, I am writing to bring to your immediate attention a grave matter concerning a Russian cybercriminal involved in various cryptocurrency crimes. This individual has created a network of fake Bitcoin mixers, Ethereum mixers, and other cryptocurrency mixer websites, posing as legitimate platforms for money laundering and crypto mixing. However, these websites are designed to deceive users and ultimately steal their funds. The modus operandi of this cybercriminal involves generating his own crypto address on the final page of his fake crypto phishing websites using a script. By doing so, he succeeds in diverting the funds to his crypto address, effectively bypassing any actual mixing or laundering process. Notably, he has targeted unsuspecting victims for years and has managed to accumulate millions of dollars in stolen funds. In relation to Ethereum theft specifically, he transfers the stolen Ethereum to his Ethereum address wallet "0xe67FC443fa1D4927bD9611B8cF50745618b12a04" before ultimately cashing out on Binance. This address has been linked to his illicit activities and serves as evidence of his ongoing criminal endeavors. Further information regarding the extent of his scams and the significant losses suffered by victims can be found at the following link: https://scam-alert.io/scam/1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk As a united community committed to combating abuse and protecting the integrity of the crypto space, I implore you to take immediate action against this cybercriminal. I request that you: 1. Investigate the identified Ethereum address and gather any additional evidence that can aid in tracking and apprehending the individual responsible. 2. Share this information with relevant authorities, such as law enforcement agencies and cybersecurity organizations, to accelerate the investigation and ensure appropriate legal measures are taken. 3. Raise awareness within the cryptocurrency community about this cybercriminal's fraudulent activities to prevent further victims from falling prey to his scams. 4. Collaborate with other platforms and communities to amplify efforts in tracking and stopping this individual's malicious operations. By collectively working together, we can actively combat cryptocurrency crimes, protect innocent users from financial harm, and uphold the trust and integrity of the crypto ecosystem. I urge the CryptScamCommunity to prioritize this matter and take swift and decisive action to bring this Russian cybercriminal to justice. Let us send a clear message that crypto crimes will not go unpunished, and those perpetrating such offenses will face the full force of our united efforts. Thank you for your attention to this critical issue, and I hope for your immediate action and continued dedication to maintaining a safe and secure cryptocurrency environment. Here are some more crypto addresses and domains which belong to this individual: 0x1bac08001d761c303901d5e32273a24c07d3f3da Ethereum: 0xe67fc443fa1d4927bd9611b8cf50745618b12a04 Ethereum: 0x9c5ADF966d3e6Ca8fE859D2a71083728de7cA10e Ethereum: 0x2dC905b2b066B875De1F3030849435C01f27aFDB Bitcoin: 1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk eth-mixing-eth.com , ethereum-mixers.com , cryptomixer2.com , kryptomixer.io , cryptomixer2.net , bitcoin-laundry2.net , bitcoinlaundry.net , blendor.io , blennder.net , anonymix.io , smartmix.club , bitcoin-mix.org , cryptomixer-io.net , cryptomixers-reviews.com , and there are much more.
fonte dei dati
cryptscam
Url del sito
https://ethereum-mixers.com
data
20 dicembre 2023 mercoledì. 01:32:43 UTC
tipo
Phishing
abusatore/scammer
Russian 🇷🇺
Stato/Paese
Russia
testo
Urgent Complaint - Cybercriminal Engaged in Crypto Crimes and Fake Crypto Mixer Networks Attention CryptScam Community, I am writing to bring to your immediate attention a grave matter concerning a Russian cybercriminal involved in various cryptocurrency crimes. This individual has created a network of fake Bitcoin mixers, Ethereum mixers, and other cryptocurrency mixer websites, posing as legitimate platforms for money laundering and crypto mixing. However, these websites are designed to deceive users and ultimately steal their funds. The modus operandi of this cybercriminal involves generating his own crypto address on the final page of his fake crypto phishing websites using a script. By doing so, he succeeds in diverting the funds to his crypto address, effectively bypassing any actual mixing or laundering process. Notably, he has targeted unsuspecting victims for years and has managed to accumulate millions of dollars in stolen funds. In relation to Ethereum theft specifically, he transfers the stolen Ethereum to his Ethereum address wallet "0xe67FC443fa1D4927bD9611B8cF50745618b12a04" before ultimately cashing out on Binance. This address has been linked to his illicit activities and serves as evidence of his ongoing criminal endeavors. Further information regarding the extent of his scams and the significant losses suffered by victims can be found at the following link: https://scam-alert.io/scam/1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk As a united community committed to combating abuse and protecting the integrity of the crypto space, I implore you to take immediate action against this cybercriminal. I request that you: 1. Investigate the identified Ethereum address and gather any additional evidence that can aid in tracking and apprehending the individual responsible. 2. Share this information with relevant authorities, such as law enforcement agencies and cybersecurity organizations, to accelerate the investigation and ensure appropriate legal measures are taken. 3. Raise awareness within the cryptocurrency community about this cybercriminal's fraudulent activities to prevent further victims from falling prey to his scams. 4. Collaborate with other platforms and communities to amplify efforts in tracking and stopping this individual's malicious operations. By collectively working together, we can actively combat cryptocurrency crimes, protect innocent users from financial harm, and uphold the trust and integrity of the crypto ecosystem. I urge the CryptScamCommunity to prioritize this matter and take swift and decisive action to bring this Russian cybercriminal to justice. Let us send a clear message that crypto crimes will not go unpunished, and those perpetrating such offenses will face the full force of our united efforts. Thank you for your attention to this critical issue, and I hope for your immediate action and continued dedication to maintaining a safe and secure cryptocurrency environment. Here are some more crypto addresses and domains which belong to this individual: 0x1bac08001d761c303901d5e32273a24c07d3f3da Ethereum: 0xe67fc443fa1d4927bd9611b8cf50745618b12a04 Ethereum: 0x9c5ADF966d3e6Ca8fE859D2a71083728de7cA10e Ethereum: 0x2dC905b2b066B875De1F3030849435C01f27aFDB Bitcoin: 1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk eth-mixing-eth.com , ethereum-mixers.com , cryptomixer2.com , kryptomixer.io , cryptomixer2.net , bitcoin-laundry2.net , bitcoinlaundry.net , blendor.io , blennder.net , anonymix.io , smartmix.club , bitcoin-mix.org , cryptomixer-io.net , cryptomixers-reviews.com , and there are much more.
fonte dei dati
cryptscam
Url del sito
https://eth-mixing-eth.com
data
15 dicembre 2023 venerdì. 18:21:57 UTC
tipo
ransomware
abusatore/scammer
Scammer
Stato/Paese
Afghanistan
testo
Scam 200$
fonte dei dati
cryptscam
Url del sito
data
06 dicembre 2023 mercoledì. 08:55:56 UTC
tipo
scamsite
abusatore/scammer
cryptofbi007 - Olgareva - icryptofbi
Stato/Paese
Russia
testo
Crypto users, please be cautious and aware of the fraudulent activities carried out by an russian individual named "cryptofbi007" & "icryptofbi" (🇷🇺). This evil person has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate QR codes that only direct funds to the scammer's Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 Please note that a saved archive of the phishing website containing the fraudster's Monero address can be found here: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam involves tricking users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses. The scam operator, known by the pseudonym "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid suspension of these phishing websites. They consistently alter the websites' functionality upon receiving reports and even spam repositories to unblock their malicious domains in order to exploit innocent individuals. To protect our community, it is crucial to exercise extreme caution and avoid engaging with any QR code generator websites associated with "cryptofbi007". If you come across any instances or suspicious activities related to these scams, please report them immediately. The scam involving crypto QR code phishing works as follows: The victim enters the crypto address for which they need a QR code. Then, when they generate the QR code on one of the fraudulent crypto QR code websites, it always displays the same QR code on the final page, containing the fraudster's crypto address. Regardless of which crypto address the victim initially entered, the QR code will always belong to the fraudster, and the victim remains unaware. If someone sends cryptocurrency to the victim's "QR code", the funds will actually go to the fraudster, as the QR code belongs to them and displays their crypto address. His email accounts: The operator is known to use the following email addresses: "[email protected]" and "[email protected]". Due to this abuse, Proton Team has already banned the account "[email protected]", while the account "[email protected]" remains active. His YouTube profile: The YouTube account "https://www.youtube.com/@gabrielenesto", named Gabriel Enesto (as of 11/25/2023) with Channel-ID: "UCO5q0rVGQs4F4IKnNUbRERg" belongs to the notorious individual known as "cryptofbi007". His Trustpilot profile: Additionally, the Trustpilot account "https://www.trustpilot.com/users/63c0b6a16503ee0012e7c049" also belongs to this despicable character. He utilizes these platforms to defame legitimate companies due to the banning of some of his phishing domains and to sabotage his competitors, driven solely by his insatiable greed. Also, "Cryptofbi007" and "iCryptofbi", who is named Gabriel Enesto on Trustpilot, changed his country to France in the settings, which is why it shows FR on his clearly fake reviews; however, he is originally from Russia, using this method to manipulate both people and law enforcement agencies. His Reddit profile: The fraudster known as "cryptofbi007" went to the extent of creating a public and restricted Reddit group called "qr_code_" to bolster his deceptive crypto QR phishing scam websites in search engine rankings. This group can be seen at "https://www.reddit.com/r/qr_code_/". To further his illicit activities, the fraudster operates under the Reddit username "Itchy-Attention8905". More information about his activities and profile can be found at "https://www.reddit.com/user/Itchy-Attention8905/". His Medium Profile: The Medium profile "@cryptofbi007", which can be visited at "https://medium.com/@cryptofbi007" (banned), also belongs to the Russian cybercriminal who goes by "icryptofbi" on BitcoinTalk. His GitHub profile: Additionally, they can be found on GitHub under the account: https://github.com/cryptofbi007 (banned) , attempting to unblock their phishing domains from phishing warning systems. Here are the relevant repositories and issues: https://github.com/MetaMask/eth-phishing-detect/issues/13139 https://github.com/MetaMask/eth-phishing-detect/issues/13080 While "cryptofbi007" attempted to unblock his phishing domains, the request got declined. Additionally, he changed the titles of the requests on GitHub, making it difficult for potential victims to find the specific request related to unblocking his phishing websites. I obtained some of his social media accounts by reporting the phishing websites to domain registrars and hosting providers. The Russian individual behind these fraudulent activities went by the names "icryptofbi" or "cryptofbi007". Consequently, I received delayed messages that contained pertinent information from this fraudster. Furthermore, it is worth noting that the operator behind this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se", and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are also owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites generate the domain holder's (cryptofbi007) USDT address 0xBeE32483957f116c5830133188dca45B80b94Fe6 (https://etherscan.io/address/0xBeE32483957f116c5830133188dca45B80b94Fe6) and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further solidifying their association and intention to defraud unsuspecting victims. It is of utmost importance to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. To aid in identification, please find below a list of all known phishing crypto addresses and domains associated with "cryptofbi007": Phishing Crypto Addresses by "cryptofbi007": 1. Monero (XMR): 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 2. Bitcoin (BTC): 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W 3. Litecoin (LTC): LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ 4. Litecoin (LTC): LLRS6eiY2cvywst3Sr97HTUsu6ba2gqmgG 5. Ethereum (ETH): 0x2C46fB8Aa65Bbcb184fBfa1E485B9BCE0371D893 6. Tether (USDT): 0xBeE32483957f116c5830133188dca45B80b94Fe6 7. Dogecoin (DOGE): DSVScF3HyMWZV5V9h38S9iDM3vKPpSU7Ey 8. Dogecoin (DOGE): DQjhCr7YPj15H8PLVz5CHFmNSgyrX8WUQk 9. Bitcoin Cash (BCH): qzyzw2m3vjvpku709vjt9jg4y03ylrs6kq9c0yhea3 USDT Tether ETH Stolen by "cryptofbi007" Transferred to FixedFloat: The cybercriminal from Russia, known as "cryptofbi007", has been involved in transferring stolen USDT Tether / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. (1) Initially, he receives the stolen funds from his phishing victims in his primary USDT Tether ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 (2) These ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 (3) Lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds (over $3.000!) were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998 (Date: 10/28/2023) FixedFloat can be contacted regarding this matter here: [email protected] https://fixedfloat.com/en/support FixedFloat: To process your request for server log and order data, we kindly ask that you provide an official request from your regional police or other representative, sent from their official email address, as per our policy. Once received, our technical specialists will be more than happy to assist you with the requested information. When reporting them to the police, whether online through email or a form, or offline, please do not forget to mention their Tether address "0xBeE32483957f116c5830133188dca45B80b94Fe6" and to contact FixedFloat under their email "[email protected]" or website. This will make it easier to track down the cybercriminal. There are both older and newer reports available regarding the phishing scheme conducted by "cryptofbi007" at this address: https://www.chainabuse.com/address/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W?chain=BTC https://cryptscam.com/en/detail/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Phishing Domains by "cryptofbi007": 1. xmr-qr-code.com 2. xmr-qr-code-generator.com 3. xmrqrcode.com 4. usdt-qr.com 5. usdt-qr-code.com 6. crypto-qr-code.com 7. crypto-qr-code.ru 8. btcqrcode.ru 9. btc-qr-code.su 10. btc-qr-code.se 11. qr-btc.com 12. ltc-qr-code.com 13. ltc-qr-code.su 14. ltc-qr-code.ru 15. eth-qr-code.su 16. doge-qr-code.su In addition, please be aware that the following BitcoinTalk accounts are also associated with "cryptofbi007": 1. https://bitcointalk.org/index.php?action=profile;u=3535761 (Olgareva) 2. https://bitcointalk.org/index.php?action=profile;u=3531091 (icryptofbi) I have noticed that the users "cryptofbi007", "Olgareva", and "icryptofbi" have been involved in QR phishing scams, where they copy complaints from other people and change the domains and sites belonging to their competitors. This behavior reveals their malicious intent. Warning: Please be cautious of a fake crypto QR code generator scam conducted by users with pseudonyms "cryptofbi007", "icryptofbi", and "Olgareva". As the operator of this scam scheme resides in Russia, I recommend reporting the scammer on the following platforms, providing detailed information from this BitcoinTalk topic: Email: [email protected] - Russian Police Email: [email protected] - Russian FBI Email: [email protected] - Russian FBI Email: [email protected] Email: [email protected] IMPORTANT: If you are not Russian or do not have a Russian email address, I recommend creating a ".ru" email address on websites such as "https://rambler.ru". For example, you can send a detailed report, similar to my complaint, to them from a Russian email address. This is necessary because other email providers, such as Google, may have blocked sending emails to ".ru" addresses due to the ongoing war. IMPORTANT²: In the police complaint, please remember to include the individual "icryptofbi" or also referred to as "cryptofbi007". This person utilized the Tether USDT address "0xbee32483957f116c5830133188dca45b80b94fe6" to receive the stolen funds and defraud numerous unsuspecting victims, resulting in the loss of several thousand dollars. He then transferred the stolen funds to his second address and then to FixedFloat. Don't forget to mention the contact methods for your police complaint report, stating that one can contact FixedFloat through email at "[email protected]" or visit their website at "https://fixedfloat.com/en/support". They can provide server logs and IPs of the Russian cybercriminal who laundered the stolen cryptocurrency money there. This evidence can be presented to the police to ensure justice is served and victims are refunded. Report Cybercrime in Russia online: http://services.government.ru/en/letters/form/ Report Cybercrime in Russia online²: https://cert.gov.ru/en/abuse.html _ Other Russian government contacts are available for residents in Russia: Quote Russian Ministry of Internal Affairs: Website: http://www.mvd.ru/ Phone: 8 (800) 350-75-28 Russian Ministry of Internal Affairs Cybercrime Division (Department "K"): Website: http://www.mvd.ru/OVD/min/rukov_mvd/17/2012/258 The Ministry of Internal Affairs of the Russian Federation: Phone: 02, 112 The Ministry of Internal Affairs Public Relations Office: Phone: +7 (495) 667-72-64 Address: 11 Sadovaya-Sukharevskaya st., 120090, Moscow, Russia Website: http://government.ru/en/department/86/events/ Economic Security and Anti-Corruption Department: +7 (495) 983-62-24 The Economic Security and Anti-Corruption Department of the Ministry of Internal Affairs of the Russian Federation deals with cybercrime and economic fraud. Stay vigilant and spread awareness within the crypto community. Let us work together to protect one another and create a safer environment for crypto enthusiasts worldwide. Please avoid falling victim to these malicious schemes.
fonte dei dati
cryptscam
Url del sito
usdt-qr-code.com
data
25 novembre 2023 sabato. 14:27:22 UTC
tipo
scamsite
abusatore/scammer
Cryptofbi007 - usdt-qr.com - usdt-qr-code.com
Stato/Paese
Russia
testo
USDT Tether ETH Stolen from "cryptofbi007" Transferred to FixedFloat: The cybercriminal from Russia, known as "cryptofbi007", has been involved in transferring stolen USDT Tether / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. (1) Initially, he receives the stolen funds from his phishing victims in his primary USDT Tether ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 (2) These ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 (3) Lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds (over $3.000!) were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998 (Date: 10/28/2023) More detail about this scammer on BitcoinTalk forum here: https://bitcointalk.org/index.php?topic=5475430.0
fonte dei dati
cryptscam
Url del sito
data
25 novembre 2023 sabato. 11:46:08 UTC
tipo
Phishing
abusatore/scammer
Cryptofbi007 - Olgareva - icryptofbi
Stato/Paese
Russia
testo
Crypto users, please be cautious and aware of the fraudulent activities carried out by an individual named "cryptofbi007". This person has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate QR codes that only direct funds to the scammer's Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 Please note that a saved archive of the phishing website containing the fraudster's Monero address can be found here: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam involves tricking users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses. The scam operator, known by the pseudonym "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid suspension of these phishing websites. They consistently alter the websites' functionality upon receiving reports and even spam repositories to unblock their malicious domains in order to exploit innocent individuals. To protect our community, it is crucial to exercise extreme caution and avoid engaging with any QR code generator websites associated with "cryptofbi007". If you come across any instances or suspicious activities related to these scams, please report them immediately. The operator is known to use the following email addresses: "[email protected]" and "[email protected]". Due to this abuse, Proton Team has already banned the account "[email protected]", while the account "[email protected]" remains active. Additionally, they can be found on GitHub under the account: https://github.com/cryptofbi007 , attempting to unblock their phishing domains from phishing warning systems. Here are the relevant repositories and issues: https://github.com/MetaMask/eth-phishing-detect/issues/13139 https://github.com/MetaMask/eth-phishing-detect/issues/13080 While "cryptofbi007" attempted to unblock his phishing domains, the request got declined. Additionally, he changed the titles of the requests on GitHub, making it difficult for potential victims to find the specific request related to unblocking his phishing websites. Furthermore, it is worth noting that the operator behind this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se", and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W. The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are also owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites generate the domain holder's (cryptofbi007) USDT address 0xBeE32483957f116c5830133188dca45B80b94Fe6 (https://etherscan.io/address/0xBeE32483957f116c5830133188dca45B80b94Fe6) and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further solidifying their association and intention to defraud unsuspecting victims. It is of utmost importance to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. To aid in identification, please find below a list of all known phishing crypto addresses and domains associated with "cryptofbi007": Phishing Crypto Addresses by "cryptofbi007": Monero (XMR): 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 Bitcoin (BTC): 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Litecoin (LTC): LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ Litecoin (LTC): LLRS6eiY2cvywst3Sr97HTUsu6ba2gqmgG Ethereum (ETH): 0x2C46fB8Aa65Bbcb184fBfa1E485B9BCE0371D893 Tether (USDT): 0xBeE32483957f116c5830133188dca45B80b94Fe6 Dogecoin (DOGE): DSVScF3HyMWZV5V9h38S9iDM3vKPpSU7Ey Bitcoin Cash (BCH): qzyzw2m3vjvpku709vjt9jg4y03ylrs6kq9c0yhea3 USDT ETH Stolen from "cryptofbi007" Transferred to FixedFloat: The cybercriminal from Russia, known as "cryptofbi007", has been involved in transferring stolen USDT / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. Initially, he receives the stolen funds from his phishing victims in his primary USDT ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 These ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 Lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998 FixedFloat can be contacted regarding this matter here: [email protected] https://fixedfloat.com/en/support There are both older and newer reports available regarding the phishing scheme conducted by "cryptofbi007" at this address: https://www.chainabuse.com/address/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W?chain=BTC https://cryptscam.com/en/detail/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Phishing Domains by "cryptofbi007": xmr-qr-code.com xmr-qr-code-generator.com xmrqrcode.com usdt-qr.com usdt-qr-code.com ltc-qr-code.su crypto-qr-code.com crypto-qr-code.ru btcqrcode.ru btc-qr-code.se qr-btc.com ltc-qr-code.com In addition, please be aware that the following BitcoinTalk accounts are also associated with "cryptofbi007": https://bitcointalk.org/index.php?action=profile;u=3535761 (Olgareva) https://bitcointalk.org/index.php?action=profile;u=3531091 (icryptofbi) I have noticed that the users "cryptofbi007", "Olgareva", and "icryptofbi" have been involved in QR phishing scams, where they copy complaints from other people and change the domains and sites belonging to their competitors. This behavior reveals their malicious intent. Warning: Please be cautious of a fake crypto QR code generator scam conducted by users with pseudonyms "cryptofbi007", "icryptofbi", and "Olgareva". As the operator of this scam scheme resides in Russia, I recommend reporting the scammer on the following platforms, providing detailed information from this BitcoinTalk topic: Email: [email protected] Email: [email protected] Email: [email protected] Email: [email protected] Report Cybercrime in Russia: http://services.government.ru/en/letters/form/ Russian Ministry of Internal Affairs: Email: [email protected] Stay vigilant and spread awareness within the crypto community. Let us work together to protect one another and create a safer environment for crypto enthusiasts worldwide. Please avoid falling victim to these malicious schemes.
fonte dei dati
cryptscam
Url del sito
https://xmr-qr-code.com
data
25 novembre 2023 sabato. 08:46:05 UTC
tipo
Phishing
abusatore/scammer
cryptofbi007 - Olgareva - icryptofbi
Stato/Paese
Russia
testo
Crypto users, please be cautious and aware of the fraudulent activities carried out by an individual named "cryptofbi007". This person has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate QR codes that only direct funds to the scammer's Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6. Please note that a saved archive of the phishing website containing the fraudster's Monero address can be found here: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam involves tricking users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses. The scam operator, known by the pseudonym "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid suspension of these phishing websites. They consistently alter the websites' functionality upon receiving reports and even spam repositories to unblock their malicious domains in order to exploit innocent individuals. To protect our community, it is crucial to exercise extreme caution and avoid engaging with any QR code generator websites associated with "cryptofbi007". If you come across any instances or suspicious activities related to these scams, please report them immediately. The operator is known to use the following email addresses: "[email protected]" and "[email protected]" Additionally, they can be found on GitHub under the account: https://github.com/cryptofbi007 , attempting to unblock their phishing domains from phishing warning systems. Here are the relevant repositories and issues: https://github.com/MetaMask/eth-phishing-detect/issues/13139 https://github.com/MetaMask/eth-phishing-detect/issues/13080 While "cryptofbi007" attempted to unblock his phishing domains, the request got declined. Additionally, he changed the titles of the requests on GitHub, making it difficult for potential victims to find the specific request related to unblocking his phishing websites. Furthermore, it is worth noting that the operator behind this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se", and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W. The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are also owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites generate the domain holder's (cryptofbi007) USDT address 0xBeE32483957f116c5830133188dca45B80b94Fe6 (https://etherscan.io/address/0xBeE32483957f116c5830133188dca45B80b94Fe6) and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further solidifying their association and intention to defraud unsuspecting victims. It is of utmost importance to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. To aid in identification, please find below a list of all known phishing crypto addresses and domains associated with "cryptofbi007": Phishing Crypto Addresses by "cryptofbi007": 1. Monero (XMR): 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 2. Bitcoin (BTC): 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W 3. Litecoin (LTC): LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ 4. Litecoin (LTC): LLRS6eiY2cvywst3Sr97HTUsu6ba2gqmgG 5. Ethereum (ETH): 0x2C46fB8Aa65Bbcb184fBfa1E485B9BCE0371D893 6. Tether (USDT): 0xBeE32483957f116c5830133188dca45B80b94Fe6 7. Dogecoin (DOGE): DSVScF3HyMWZV5V9h38S9iDM3vKPpSU7Ey 9. Bitcoin Cash (BCH): qzyzw2m3vjvpku709vjt9jg4y03ylrs6kq9c0yhea3 The cybercriminal from Russia, known as "cryptofbi007," has been involved in transferring stolen USDT / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. Initially, he receives the stolen funds from his phishing victims in his primary USDT ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 , these ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 , lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998. Phishing Domains by "cryptofbi007": 1. xmr-qr-code.com 2. xmr-qr-code-generator.com 3. xmrqrcode.com 4. usdt-qr.com 5. usdt-qr-code.com 6. ltc-qr-code.su 7. crypto-qr-code.com 8. crypto-qr-code.ru 9. btcqrcode.ru 10. btc-qr-code.se 11. qr-btc.com 12. ltc-qr-code.com In addition, please be aware that the following BitcoinTalk accounts are also associated with "cryptofbi007": 1. https://bitcointalk.org/index.php?action=profile;u=3535761 (Olgareva) 2. https://bitcointalk.org/index.php?action=profile;u=3531091 (icryptofbi) I have noticed that the users "cryptofbi007", "Olgareva", and "icryptofbi" have been involved in QR phishing scams, where they copy complaints from other people and change the domains and sites belonging to their competitors. This behavior reveals their malicious intent. Warning: Please be cautious of a fake crypto QR code generator scam conducted by users with pseudonyms "cryptofbi007", "icryptofbi", and "Olgareva". Stay vigilant and spread awareness within the crypto community. Let us work together to protect one another and create a safer environment for crypto enthusiasts worldwide. Please avoid falling victim to these malicious schemes.
fonte dei dati
cryptscam
Url del sito
https://crypto-qr-code.com
data
25 novembre 2023 sabato. 06:06:46 UTC
tipo
Phishing
abusatore/scammer
Stato/Paese
Unknown
testo
phishing site, fake cryptocurrency exchanger!
fonte dei dati
cryptscam
Url del sito
https://coinchangers.net/
data
25 novembre 2023 sabato. 03:10:26 UTC
tipo
Phishing
abusatore/scammer
Scamer
Stato/Paese
Russia
testo
I want to tell a story about a scammer, a thief, and just a bad person! This person creates a huge number of cryptocurrency mixer sites, specifically BTC, ETH, LTC, XMR… The most interesting thing is that he copies other sites and then bans them! He sends complaints to the registrar, hosting, creates threads on bitcointalk, and GitHub! This person starts by stealing sites, bans these sites, and then steals cryptocurrency! He has profiles on GitHub and bitcointalk, where he simply destroys his competitors. He doesn’t ban his own sites and tries to keep them in the shadows! He advertises his sites through YouTube, his 3 accounts are @egg333, @BitXpress, @BlockBrainiac, all the links I’ll provide below, on YouTube, bitcointalk, and GitHub! He has already stolen over $100,000 from people and continues to do so! He constantly creates new sites and redirects from old domains to new ones! Here’s his email: [email protected] His profiles: https://github.com/Jackofusu80 https://bitcointalk.org/index.php?action=profile;u=3535585 https://www.youtube.com/@egg333/videos https://www.youtube.com/@BitXpress/videos https://www.youtube.com/@BlockBrainiac/videos His cryptocurrency addresses: 0xF9239D94Bf8B0173F626ebEFC1aE26C735201b78 (ETH) DSJongTtmP39kNTSbBxcz66nREDk9t1YNs (DOGE) LYwDxx6kzBKfhBDrnj6m284MVJ9sTpGqab (LTC) 137vnTG1cRLqyTAUaD9Fh3okwDZe54A6wd (BTC) 12abmoYHRr2tMzowTDp67v84QVeyYmSsNn (BTC) 1EixFm25Vpsno81g8thpiK4Dy1zz8XkitR (BTC) 14kL8f8NA2QoLNFqhUNjwWvs25U3kZSygT (BTC) 1JQcJ4bM22eTA5S2WoC2wNQUbs7ULJyMfC (BTC) 43wbRovRwu6UswYGHjQEDp9hfLzuzUiytEhH2dRx6NECSaWQ4rSQcTZ4SMXJNVizFQJodBRtLbueaNgaSNPvBnx9CYDJrTN (XMR) His current scam sites: https://cryptocurrency-qr-code.com/ https://ethereummixer.live/ https://tornado-cash.io https://btc-laundry.org https://bitmixing.top https://www.cryptomixer.ltd/ https://monero-mixer.net/ https://bitcoin-blender.top/
fonte dei dati
cryptscam
Url del sito
https://cryptocurrency-qr-code.com/
data
22 novembre 2023 mercoledì. 13:49:28 UTC
tipo
scamsite
abusatore/scammer
Exchanger24.org - Exchanger24
Stato/Paese
Russia
testo
I am writing to report a highly concerning and fraudulent website, "Exchanger24.org", which has been identified as a fake crypto exchange phishing platform. This website, operated by an individual based in Russia, has been systematically scamming unsuspecting crypto users and has already swindled over $285,000 as of November 22, 2023 and much more other cryptocurrencies. The evidence of this criminal activity can be verified through the following blockchain link: https://www.blockchain.com/explorer/addresses/btc/1BtMBFxM2diH24hFZTpD5W2aa6F2YEP2NE It is alarming to see the significant financial losses incurred by innocent victims due to the operators' deceitful actions. "Exchanger24.org" presents itself as a legitimate cryptocurrency exchange platform, preying on clueless crypto users seeking to make transactions. Once users provide their sensitive information, including their cryptocurrency holdings and personal details, they become vulnerable to identity theft and financial exploitation. The operator of this phishing platform, based on available information, is believed to be located in Russia. It is crucial to exercise caution and raise awareness about this scam to protect individuals from falling victim to their deceptive practices. It has come to our attention that the operators of the phishing website "Exchanger24.org" engage in unethical practices by flagging negative reviews on platforms like Trustpilot and Sitejabber to have them removed. These actions aim to deceive more unsuspecting individuals and increase the chances of successful scams since genuine negative reviews get removed due to the lack of evidence for orders on a completely fake website. A victim has provided a detailed report confirming these actions, which can be found at: https://neomarket.ir/exchanger24-org-is-a-scam/ Thank you for your urgent attention to this matter and don't get scammed by these kind of phishing sites.
fonte dei dati
cryptscam
Url del sito
https://exchanger24.org/
data
22 novembre 2023 mercoledì. 12:53:47 UTC
tipo
Phishing
abusatore/scammer
Cryptofbi007 - ltc-qr-code.su - xmr-qr-code.com -
Stato/Paese
Russia
testo
⚠️ Warning: Crypto users, please be aware of a fraudulent individual named "cryptofbi007" who has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate only the scammer's own QR codes, directing funds to their Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZYk9fxQFLKuKEW54r6 Saved archive of the phishing website with fraudsters Monero address: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam works by deceiving users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses in form of cryptocurrency. The operator, who poses as "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid the suspension of these phishing websites. They accomplish this by altering the functionality of the websites whenever a report is received. They even spam repositories in an attempt to unblock their malicious domains and further exploit innocent individuals. Please exercise extreme caution and refrain from engaging with any QR code generator websites associated with "cryptofbi007". To help protect our community, report any instances or suspicious activities related to these scams. The operator is known to use the following email addresses: [email protected] [email protected] And is known to use GitHub under this account: https://github.com/cryptofbi007 Furthermore, please note that the operator of this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se" and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites employ the deceptive tactic of generating the domain holder's (cryptofbi007) USDT address and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further confirming their association and intent to defraud unsuspecting victims. It is essential to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. Stay vigilant and spread awareness among the crypto community. Do not fall victim to these malicious schemes. By working together, we can protect one another and create a safer environment for crypto enthusiasts worldwide. Stay safe.
fonte dei dati
cryptscam
Url del sito
https://ltc-qr-code.su
data
22 novembre 2023 mercoledì. 12:25:00 UTC
tipo
Phishing
abusatore/scammer
xmr-qr-code.com & xmr-qr-code-gene & xmrqrcode.com
Stato/Paese
Russia
testo
Crypto users, please be aware of a fraudulent individual named "cryptofbi007" who has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate only the scammer's own QR codes, directing funds to their Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZYk9fxQFLKuKEW54r6 Saved archive of the phishing website with fraudsters Monero address: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam works by deceiving users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses in form of cryptocurrency. The operator, who poses as "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid the suspension of these phishing websites. They accomplish this by altering the functionality of the websites whenever a report is received. They even spam repositories in an attempt to unblock their malicious domains and further exploit innocent individuals. Please exercise extreme caution and refrain from engaging with any QR code generator websites associated with "cryptofbi007". To help protect our community, report any instances or suspicious activities related to these scams. The operator is known to use the following email addresses: [email protected] [email protected] And is known to use GitHub under this account: https://github.com/cryptofbi007 Furthermore, please note that the operator of this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se" and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Stay vigilant and spread awareness among the crypto community. Do not fall victim to these malicious schemes. By working together, we can protect one another and create a safer environment for crypto enthusiasts worldwide. Stay safe.
fonte dei dati
cryptscam
Url del sito
https://xmr-qr-code.com