Cryptscam Abuse Explorer

Будьте в безопасности, проверьте, если кошельки являются мошенничеством!

Поддержите нас пожертвованием

Последние отчеты

Адрес кошелька
Дата
20 декабря 2023 Среда. 01:34:38 UTC
тип
Phishing
Мошенник / обидчик
Russian 🇷🇺
страна
Russia
описание
Urgent Complaint - Cybercriminal Engaged in Crypto Crimes and Fake Crypto Mixer Networks Attention CryptScam Community, I am writing to bring to your immediate attention a grave matter concerning a Russian cybercriminal involved in various cryptocurrency crimes. This individual has created a network of fake Bitcoin mixers, Ethereum mixers, and other cryptocurrency mixer websites, posing as legitimate platforms for money laundering and crypto mixing. However, these websites are designed to deceive users and ultimately steal their funds. The modus operandi of this cybercriminal involves generating his own crypto address on the final page of his fake crypto phishing websites using a script. By doing so, he succeeds in diverting the funds to his crypto address, effectively bypassing any actual mixing or laundering process. Notably, he has targeted unsuspecting victims for years and has managed to accumulate millions of dollars in stolen funds. In relation to Ethereum theft specifically, he transfers the stolen Ethereum to his Ethereum address wallet "0xe67FC443fa1D4927bD9611B8cF50745618b12a04" before ultimately cashing out on Binance. This address has been linked to his illicit activities and serves as evidence of his ongoing criminal endeavors. Further information regarding the extent of his scams and the significant losses suffered by victims can be found at the following link: https://scam-alert.io/scam/1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk As a united community committed to combating abuse and protecting the integrity of the crypto space, I implore you to take immediate action against this cybercriminal. I request that you: 1. Investigate the identified Ethereum address and gather any additional evidence that can aid in tracking and apprehending the individual responsible. 2. Share this information with relevant authorities, such as law enforcement agencies and cybersecurity organizations, to accelerate the investigation and ensure appropriate legal measures are taken. 3. Raise awareness within the cryptocurrency community about this cybercriminal's fraudulent activities to prevent further victims from falling prey to his scams. 4. Collaborate with other platforms and communities to amplify efforts in tracking and stopping this individual's malicious operations. By collectively working together, we can actively combat cryptocurrency crimes, protect innocent users from financial harm, and uphold the trust and integrity of the crypto ecosystem. I urge the CryptScamCommunity to prioritize this matter and take swift and decisive action to bring this Russian cybercriminal to justice. Let us send a clear message that crypto crimes will not go unpunished, and those perpetrating such offenses will face the full force of our united efforts. Thank you for your attention to this critical issue, and I hope for your immediate action and continued dedication to maintaining a safe and secure cryptocurrency environment. Here are some more crypto addresses and domains which belong to this individual: 0x1bac08001d761c303901d5e32273a24c07d3f3da Ethereum: 0xe67fc443fa1d4927bd9611b8cf50745618b12a04 Ethereum: 0x9c5ADF966d3e6Ca8fE859D2a71083728de7cA10e Ethereum: 0x2dC905b2b066B875De1F3030849435C01f27aFDB Bitcoin: 1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk eth-mixing-eth.com , ethereum-mixers.com , cryptomixer2.com , kryptomixer.io , cryptomixer2.net , bitcoin-laundry2.net , bitcoinlaundry.net , blendor.io , blennder.net , anonymix.io , smartmix.club , bitcoin-mix.org , cryptomixer-io.net , cryptomixers-reviews.com , and there are much more.
source
cryptscam
Адрес сайта
https://ethereum-mixers.com
Адрес кошелька
Дата
20 декабря 2023 Среда. 01:32:43 UTC
тип
Phishing
Мошенник / обидчик
Russian 🇷🇺
страна
Russia
описание
Urgent Complaint - Cybercriminal Engaged in Crypto Crimes and Fake Crypto Mixer Networks Attention CryptScam Community, I am writing to bring to your immediate attention a grave matter concerning a Russian cybercriminal involved in various cryptocurrency crimes. This individual has created a network of fake Bitcoin mixers, Ethereum mixers, and other cryptocurrency mixer websites, posing as legitimate platforms for money laundering and crypto mixing. However, these websites are designed to deceive users and ultimately steal their funds. The modus operandi of this cybercriminal involves generating his own crypto address on the final page of his fake crypto phishing websites using a script. By doing so, he succeeds in diverting the funds to his crypto address, effectively bypassing any actual mixing or laundering process. Notably, he has targeted unsuspecting victims for years and has managed to accumulate millions of dollars in stolen funds. In relation to Ethereum theft specifically, he transfers the stolen Ethereum to his Ethereum address wallet "0xe67FC443fa1D4927bD9611B8cF50745618b12a04" before ultimately cashing out on Binance. This address has been linked to his illicit activities and serves as evidence of his ongoing criminal endeavors. Further information regarding the extent of his scams and the significant losses suffered by victims can be found at the following link: https://scam-alert.io/scam/1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk As a united community committed to combating abuse and protecting the integrity of the crypto space, I implore you to take immediate action against this cybercriminal. I request that you: 1. Investigate the identified Ethereum address and gather any additional evidence that can aid in tracking and apprehending the individual responsible. 2. Share this information with relevant authorities, such as law enforcement agencies and cybersecurity organizations, to accelerate the investigation and ensure appropriate legal measures are taken. 3. Raise awareness within the cryptocurrency community about this cybercriminal's fraudulent activities to prevent further victims from falling prey to his scams. 4. Collaborate with other platforms and communities to amplify efforts in tracking and stopping this individual's malicious operations. By collectively working together, we can actively combat cryptocurrency crimes, protect innocent users from financial harm, and uphold the trust and integrity of the crypto ecosystem. I urge the CryptScamCommunity to prioritize this matter and take swift and decisive action to bring this Russian cybercriminal to justice. Let us send a clear message that crypto crimes will not go unpunished, and those perpetrating such offenses will face the full force of our united efforts. Thank you for your attention to this critical issue, and I hope for your immediate action and continued dedication to maintaining a safe and secure cryptocurrency environment. Here are some more crypto addresses and domains which belong to this individual: 0x1bac08001d761c303901d5e32273a24c07d3f3da Ethereum: 0xe67fc443fa1d4927bd9611b8cf50745618b12a04 Ethereum: 0x9c5ADF966d3e6Ca8fE859D2a71083728de7cA10e Ethereum: 0x2dC905b2b066B875De1F3030849435C01f27aFDB Bitcoin: 1HtV8k2Pj4y5bRR1NbjF2uEq8DZjJF2pJk eth-mixing-eth.com , ethereum-mixers.com , cryptomixer2.com , kryptomixer.io , cryptomixer2.net , bitcoin-laundry2.net , bitcoinlaundry.net , blendor.io , blennder.net , anonymix.io , smartmix.club , bitcoin-mix.org , cryptomixer-io.net , cryptomixers-reviews.com , and there are much more.
source
cryptscam
Адрес сайта
https://eth-mixing-eth.com
Адрес кошелька
Дата
15 декабря 2023 Пятница. 18:21:57 UTC
тип
ransomware
Мошенник / обидчик
Scammer
страна
Afghanistan
описание
Scam 200$
source
cryptscam
Адрес сайта
Адрес кошелька
Дата
06 декабря 2023 Среда. 08:55:56 UTC
тип
scamsite
Мошенник / обидчик
cryptofbi007 - Olgareva - icryptofbi
страна
Russia
описание
Crypto users, please be cautious and aware of the fraudulent activities carried out by an russian individual named "cryptofbi007" & "icryptofbi" (🇷🇺). This evil person has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate QR codes that only direct funds to the scammer's Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 Please note that a saved archive of the phishing website containing the fraudster's Monero address can be found here: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam involves tricking users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses. The scam operator, known by the pseudonym "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid suspension of these phishing websites. They consistently alter the websites' functionality upon receiving reports and even spam repositories to unblock their malicious domains in order to exploit innocent individuals. To protect our community, it is crucial to exercise extreme caution and avoid engaging with any QR code generator websites associated with "cryptofbi007". If you come across any instances or suspicious activities related to these scams, please report them immediately. The scam involving crypto QR code phishing works as follows: The victim enters the crypto address for which they need a QR code. Then, when they generate the QR code on one of the fraudulent crypto QR code websites, it always displays the same QR code on the final page, containing the fraudster's crypto address. Regardless of which crypto address the victim initially entered, the QR code will always belong to the fraudster, and the victim remains unaware. If someone sends cryptocurrency to the victim's "QR code", the funds will actually go to the fraudster, as the QR code belongs to them and displays their crypto address. His email accounts: The operator is known to use the following email addresses: "[email protected]" and "[email protected]". Due to this abuse, Proton Team has already banned the account "[email protected]", while the account "[email protected]" remains active. His YouTube profile: The YouTube account "https://www.youtube.com/@gabrielenesto", named Gabriel Enesto (as of 11/25/2023) with Channel-ID: "UCO5q0rVGQs4F4IKnNUbRERg" belongs to the notorious individual known as "cryptofbi007". His Trustpilot profile: Additionally, the Trustpilot account "https://www.trustpilot.com/users/63c0b6a16503ee0012e7c049" also belongs to this despicable character. He utilizes these platforms to defame legitimate companies due to the banning of some of his phishing domains and to sabotage his competitors, driven solely by his insatiable greed. Also, "Cryptofbi007" and "iCryptofbi", who is named Gabriel Enesto on Trustpilot, changed his country to France in the settings, which is why it shows FR on his clearly fake reviews; however, he is originally from Russia, using this method to manipulate both people and law enforcement agencies. His Reddit profile: The fraudster known as "cryptofbi007" went to the extent of creating a public and restricted Reddit group called "qr_code_" to bolster his deceptive crypto QR phishing scam websites in search engine rankings. This group can be seen at "https://www.reddit.com/r/qr_code_/". To further his illicit activities, the fraudster operates under the Reddit username "Itchy-Attention8905". More information about his activities and profile can be found at "https://www.reddit.com/user/Itchy-Attention8905/". His Medium Profile: The Medium profile "@cryptofbi007", which can be visited at "https://medium.com/@cryptofbi007" (banned), also belongs to the Russian cybercriminal who goes by "icryptofbi" on BitcoinTalk. His GitHub profile: Additionally, they can be found on GitHub under the account: https://github.com/cryptofbi007 (banned) , attempting to unblock their phishing domains from phishing warning systems. Here are the relevant repositories and issues: https://github.com/MetaMask/eth-phishing-detect/issues/13139 https://github.com/MetaMask/eth-phishing-detect/issues/13080 While "cryptofbi007" attempted to unblock his phishing domains, the request got declined. Additionally, he changed the titles of the requests on GitHub, making it difficult for potential victims to find the specific request related to unblocking his phishing websites. I obtained some of his social media accounts by reporting the phishing websites to domain registrars and hosting providers. The Russian individual behind these fraudulent activities went by the names "icryptofbi" or "cryptofbi007". Consequently, I received delayed messages that contained pertinent information from this fraudster. Furthermore, it is worth noting that the operator behind this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se", and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are also owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites generate the domain holder's (cryptofbi007) USDT address 0xBeE32483957f116c5830133188dca45B80b94Fe6 (https://etherscan.io/address/0xBeE32483957f116c5830133188dca45B80b94Fe6) and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further solidifying their association and intention to defraud unsuspecting victims. It is of utmost importance to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. To aid in identification, please find below a list of all known phishing crypto addresses and domains associated with "cryptofbi007": Phishing Crypto Addresses by "cryptofbi007": 1. Monero (XMR): 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 2. Bitcoin (BTC): 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W 3. Litecoin (LTC): LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ 4. Litecoin (LTC): LLRS6eiY2cvywst3Sr97HTUsu6ba2gqmgG 5. Ethereum (ETH): 0x2C46fB8Aa65Bbcb184fBfa1E485B9BCE0371D893 6. Tether (USDT): 0xBeE32483957f116c5830133188dca45B80b94Fe6 7. Dogecoin (DOGE): DSVScF3HyMWZV5V9h38S9iDM3vKPpSU7Ey 8. Dogecoin (DOGE): DQjhCr7YPj15H8PLVz5CHFmNSgyrX8WUQk 9. Bitcoin Cash (BCH): qzyzw2m3vjvpku709vjt9jg4y03ylrs6kq9c0yhea3 USDT Tether ETH Stolen by "cryptofbi007" Transferred to FixedFloat: The cybercriminal from Russia, known as "cryptofbi007", has been involved in transferring stolen USDT Tether / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. (1) Initially, he receives the stolen funds from his phishing victims in his primary USDT Tether ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 (2) These ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 (3) Lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds (over $3.000!) were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998 (Date: 10/28/2023) FixedFloat can be contacted regarding this matter here: [email protected] https://fixedfloat.com/en/support FixedFloat: To process your request for server log and order data, we kindly ask that you provide an official request from your regional police or other representative, sent from their official email address, as per our policy. Once received, our technical specialists will be more than happy to assist you with the requested information. When reporting them to the police, whether online through email or a form, or offline, please do not forget to mention their Tether address "0xBeE32483957f116c5830133188dca45B80b94Fe6" and to contact FixedFloat under their email "[email protected]" or website. This will make it easier to track down the cybercriminal. There are both older and newer reports available regarding the phishing scheme conducted by "cryptofbi007" at this address: https://www.chainabuse.com/address/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W?chain=BTC https://cryptscam.com/en/detail/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Phishing Domains by "cryptofbi007": 1. xmr-qr-code.com 2. xmr-qr-code-generator.com 3. xmrqrcode.com 4. usdt-qr.com 5. usdt-qr-code.com 6. crypto-qr-code.com 7. crypto-qr-code.ru 8. btcqrcode.ru 9. btc-qr-code.su 10. btc-qr-code.se 11. qr-btc.com 12. ltc-qr-code.com 13. ltc-qr-code.su 14. ltc-qr-code.ru 15. eth-qr-code.su 16. doge-qr-code.su In addition, please be aware that the following BitcoinTalk accounts are also associated with "cryptofbi007": 1. https://bitcointalk.org/index.php?action=profile;u=3535761 (Olgareva) 2. https://bitcointalk.org/index.php?action=profile;u=3531091 (icryptofbi) I have noticed that the users "cryptofbi007", "Olgareva", and "icryptofbi" have been involved in QR phishing scams, where they copy complaints from other people and change the domains and sites belonging to their competitors. This behavior reveals their malicious intent. Warning: Please be cautious of a fake crypto QR code generator scam conducted by users with pseudonyms "cryptofbi007", "icryptofbi", and "Olgareva". As the operator of this scam scheme resides in Russia, I recommend reporting the scammer on the following platforms, providing detailed information from this BitcoinTalk topic: Email: [email protected] - Russian Police Email: [email protected] - Russian FBI Email: [email protected] - Russian FBI Email: [email protected] Email: [email protected] IMPORTANT: If you are not Russian or do not have a Russian email address, I recommend creating a ".ru" email address on websites such as "https://rambler.ru". For example, you can send a detailed report, similar to my complaint, to them from a Russian email address. This is necessary because other email providers, such as Google, may have blocked sending emails to ".ru" addresses due to the ongoing war. IMPORTANT²: In the police complaint, please remember to include the individual "icryptofbi" or also referred to as "cryptofbi007". This person utilized the Tether USDT address "0xbee32483957f116c5830133188dca45b80b94fe6" to receive the stolen funds and defraud numerous unsuspecting victims, resulting in the loss of several thousand dollars. He then transferred the stolen funds to his second address and then to FixedFloat. Don't forget to mention the contact methods for your police complaint report, stating that one can contact FixedFloat through email at "[email protected]" or visit their website at "https://fixedfloat.com/en/support". They can provide server logs and IPs of the Russian cybercriminal who laundered the stolen cryptocurrency money there. This evidence can be presented to the police to ensure justice is served and victims are refunded. Report Cybercrime in Russia online: http://services.government.ru/en/letters/form/ Report Cybercrime in Russia online²: https://cert.gov.ru/en/abuse.html _ Other Russian government contacts are available for residents in Russia: Quote Russian Ministry of Internal Affairs: Website: http://www.mvd.ru/ Phone: 8 (800) 350-75-28 Russian Ministry of Internal Affairs Cybercrime Division (Department "K"): Website: http://www.mvd.ru/OVD/min/rukov_mvd/17/2012/258 The Ministry of Internal Affairs of the Russian Federation: Phone: 02, 112 The Ministry of Internal Affairs Public Relations Office: Phone: +7 (495) 667-72-64 Address: 11 Sadovaya-Sukharevskaya st., 120090, Moscow, Russia Website: http://government.ru/en/department/86/events/ Economic Security and Anti-Corruption Department: +7 (495) 983-62-24 The Economic Security and Anti-Corruption Department of the Ministry of Internal Affairs of the Russian Federation deals with cybercrime and economic fraud. Stay vigilant and spread awareness within the crypto community. Let us work together to protect one another and create a safer environment for crypto enthusiasts worldwide. Please avoid falling victim to these malicious schemes.
source
cryptscam
Адрес сайта
usdt-qr-code.com
Адрес кошелька
Дата
25 ноября 2023 Суббота. 14:27:22 UTC
тип
scamsite
Мошенник / обидчик
Cryptofbi007 - usdt-qr.com - usdt-qr-code.com
страна
Russia
описание
USDT Tether ETH Stolen from "cryptofbi007" Transferred to FixedFloat: The cybercriminal from Russia, known as "cryptofbi007", has been involved in transferring stolen USDT Tether / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. (1) Initially, he receives the stolen funds from his phishing victims in his primary USDT Tether ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 (2) These ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 (3) Lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds (over $3.000!) were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998 (Date: 10/28/2023) More detail about this scammer on BitcoinTalk forum here: https://bitcointalk.org/index.php?topic=5475430.0
source
cryptscam
Адрес сайта
Адрес кошелька
Дата
25 ноября 2023 Суббота. 11:46:08 UTC
тип
Phishing
Мошенник / обидчик
Cryptofbi007 - Olgareva - icryptofbi
страна
Russia
описание
Crypto users, please be cautious and aware of the fraudulent activities carried out by an individual named "cryptofbi007". This person has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate QR codes that only direct funds to the scammer's Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 Please note that a saved archive of the phishing website containing the fraudster's Monero address can be found here: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam involves tricking users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses. The scam operator, known by the pseudonym "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid suspension of these phishing websites. They consistently alter the websites' functionality upon receiving reports and even spam repositories to unblock their malicious domains in order to exploit innocent individuals. To protect our community, it is crucial to exercise extreme caution and avoid engaging with any QR code generator websites associated with "cryptofbi007". If you come across any instances or suspicious activities related to these scams, please report them immediately. The operator is known to use the following email addresses: "[email protected]" and "[email protected]". Due to this abuse, Proton Team has already banned the account "[email protected]", while the account "[email protected]" remains active. Additionally, they can be found on GitHub under the account: https://github.com/cryptofbi007 , attempting to unblock their phishing domains from phishing warning systems. Here are the relevant repositories and issues: https://github.com/MetaMask/eth-phishing-detect/issues/13139 https://github.com/MetaMask/eth-phishing-detect/issues/13080 While "cryptofbi007" attempted to unblock his phishing domains, the request got declined. Additionally, he changed the titles of the requests on GitHub, making it difficult for potential victims to find the specific request related to unblocking his phishing websites. Furthermore, it is worth noting that the operator behind this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se", and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W. The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are also owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites generate the domain holder's (cryptofbi007) USDT address 0xBeE32483957f116c5830133188dca45B80b94Fe6 (https://etherscan.io/address/0xBeE32483957f116c5830133188dca45B80b94Fe6) and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further solidifying their association and intention to defraud unsuspecting victims. It is of utmost importance to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. To aid in identification, please find below a list of all known phishing crypto addresses and domains associated with "cryptofbi007": Phishing Crypto Addresses by "cryptofbi007": Monero (XMR): 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 Bitcoin (BTC): 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Litecoin (LTC): LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ Litecoin (LTC): LLRS6eiY2cvywst3Sr97HTUsu6ba2gqmgG Ethereum (ETH): 0x2C46fB8Aa65Bbcb184fBfa1E485B9BCE0371D893 Tether (USDT): 0xBeE32483957f116c5830133188dca45B80b94Fe6 Dogecoin (DOGE): DSVScF3HyMWZV5V9h38S9iDM3vKPpSU7Ey Bitcoin Cash (BCH): qzyzw2m3vjvpku709vjt9jg4y03ylrs6kq9c0yhea3 USDT ETH Stolen from "cryptofbi007" Transferred to FixedFloat: The cybercriminal from Russia, known as "cryptofbi007", has been involved in transferring stolen USDT / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. Initially, he receives the stolen funds from his phishing victims in his primary USDT ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 These ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 Lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998 FixedFloat can be contacted regarding this matter here: [email protected] https://fixedfloat.com/en/support There are both older and newer reports available regarding the phishing scheme conducted by "cryptofbi007" at this address: https://www.chainabuse.com/address/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W?chain=BTC https://cryptscam.com/en/detail/18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Phishing Domains by "cryptofbi007": xmr-qr-code.com xmr-qr-code-generator.com xmrqrcode.com usdt-qr.com usdt-qr-code.com ltc-qr-code.su crypto-qr-code.com crypto-qr-code.ru btcqrcode.ru btc-qr-code.se qr-btc.com ltc-qr-code.com In addition, please be aware that the following BitcoinTalk accounts are also associated with "cryptofbi007": https://bitcointalk.org/index.php?action=profile;u=3535761 (Olgareva) https://bitcointalk.org/index.php?action=profile;u=3531091 (icryptofbi) I have noticed that the users "cryptofbi007", "Olgareva", and "icryptofbi" have been involved in QR phishing scams, where they copy complaints from other people and change the domains and sites belonging to their competitors. This behavior reveals their malicious intent. Warning: Please be cautious of a fake crypto QR code generator scam conducted by users with pseudonyms "cryptofbi007", "icryptofbi", and "Olgareva". As the operator of this scam scheme resides in Russia, I recommend reporting the scammer on the following platforms, providing detailed information from this BitcoinTalk topic: Email: [email protected] Email: [email protected] Email: [email protected] Email: [email protected] Report Cybercrime in Russia: http://services.government.ru/en/letters/form/ Russian Ministry of Internal Affairs: Email: [email protected] Stay vigilant and spread awareness within the crypto community. Let us work together to protect one another and create a safer environment for crypto enthusiasts worldwide. Please avoid falling victim to these malicious schemes.
source
cryptscam
Адрес сайта
https://xmr-qr-code.com
Адрес кошелька
Дата
25 ноября 2023 Суббота. 08:46:05 UTC
тип
Phishing
Мошенник / обидчик
cryptofbi007 - Olgareva - icryptofbi
страна
Russia
описание
Crypto users, please be cautious and aware of the fraudulent activities carried out by an individual named "cryptofbi007". This person has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate QR codes that only direct funds to the scammer's Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6. Please note that a saved archive of the phishing website containing the fraudster's Monero address can be found here: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam involves tricking users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses. The scam operator, known by the pseudonym "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid suspension of these phishing websites. They consistently alter the websites' functionality upon receiving reports and even spam repositories to unblock their malicious domains in order to exploit innocent individuals. To protect our community, it is crucial to exercise extreme caution and avoid engaging with any QR code generator websites associated with "cryptofbi007". If you come across any instances or suspicious activities related to these scams, please report them immediately. The operator is known to use the following email addresses: "[email protected]" and "[email protected]" Additionally, they can be found on GitHub under the account: https://github.com/cryptofbi007 , attempting to unblock their phishing domains from phishing warning systems. Here are the relevant repositories and issues: https://github.com/MetaMask/eth-phishing-detect/issues/13139 https://github.com/MetaMask/eth-phishing-detect/issues/13080 While "cryptofbi007" attempted to unblock his phishing domains, the request got declined. Additionally, he changed the titles of the requests on GitHub, making it difficult for potential victims to find the specific request related to unblocking his phishing websites. Furthermore, it is worth noting that the operator behind this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se", and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W. The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are also owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites generate the domain holder's (cryptofbi007) USDT address 0xBeE32483957f116c5830133188dca45B80b94Fe6 (https://etherscan.io/address/0xBeE32483957f116c5830133188dca45B80b94Fe6) and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further solidifying their association and intention to defraud unsuspecting victims. It is of utmost importance to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. To aid in identification, please find below a list of all known phishing crypto addresses and domains associated with "cryptofbi007": Phishing Crypto Addresses by "cryptofbi007": 1. Monero (XMR): 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZY k9fxQFLKuKEW54r6 2. Bitcoin (BTC): 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W 3. Litecoin (LTC): LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ 4. Litecoin (LTC): LLRS6eiY2cvywst3Sr97HTUsu6ba2gqmgG 5. Ethereum (ETH): 0x2C46fB8Aa65Bbcb184fBfa1E485B9BCE0371D893 6. Tether (USDT): 0xBeE32483957f116c5830133188dca45B80b94Fe6 7. Dogecoin (DOGE): DSVScF3HyMWZV5V9h38S9iDM3vKPpSU7Ey 9. Bitcoin Cash (BCH): qzyzw2m3vjvpku709vjt9jg4y03ylrs6kq9c0yhea3 The cybercriminal from Russia, known as "cryptofbi007," has been involved in transferring stolen USDT / ETH from his phishing fake crypto QR code scam websites to FixedFloat cryptocurrency exchange. Initially, he receives the stolen funds from his phishing victims in his primary USDT ETH address: https://etherscan.io/address/0xbee32483957f116c5830133188dca45b80b94fe6 , these ill-gotten gains are then transferred to another address: https://etherscan.io/address/0x2709fd4c61531473b77c5794a723ea49e48bdef4 , lastly, the stolen funds are moved to FixedFloat, using this address: https://etherscan.io/address/0x2bd1ecf9545410b32ddc4f7a873811fd94963e2b You can find further details regarding the transactions in the following Transaction Hash, where the stolen funds were transferred to FixedFloat: https://etherscan.io/tx/0x19d8571add80245295b2ce870c4f26739447e6f00a836b4f309b9c8a3701a998. Phishing Domains by "cryptofbi007": 1. xmr-qr-code.com 2. xmr-qr-code-generator.com 3. xmrqrcode.com 4. usdt-qr.com 5. usdt-qr-code.com 6. ltc-qr-code.su 7. crypto-qr-code.com 8. crypto-qr-code.ru 9. btcqrcode.ru 10. btc-qr-code.se 11. qr-btc.com 12. ltc-qr-code.com In addition, please be aware that the following BitcoinTalk accounts are also associated with "cryptofbi007": 1. https://bitcointalk.org/index.php?action=profile;u=3535761 (Olgareva) 2. https://bitcointalk.org/index.php?action=profile;u=3531091 (icryptofbi) I have noticed that the users "cryptofbi007", "Olgareva", and "icryptofbi" have been involved in QR phishing scams, where they copy complaints from other people and change the domains and sites belonging to their competitors. This behavior reveals their malicious intent. Warning: Please be cautious of a fake crypto QR code generator scam conducted by users with pseudonyms "cryptofbi007", "icryptofbi", and "Olgareva". Stay vigilant and spread awareness within the crypto community. Let us work together to protect one another and create a safer environment for crypto enthusiasts worldwide. Please avoid falling victim to these malicious schemes.
source
cryptscam
Адрес сайта
https://crypto-qr-code.com
Адрес кошелька
Дата
25 ноября 2023 Суббота. 06:06:46 UTC
тип
Phishing
Мошенник / обидчик
страна
Unknown
описание
phishing site, fake cryptocurrency exchanger!
source
cryptscam
Адрес сайта
https://coinchangers.net/
Адрес кошелька
Дата
25 ноября 2023 Суббота. 03:10:26 UTC
тип
Phishing
Мошенник / обидчик
Scamer
страна
Russia
описание
I want to tell a story about a scammer, a thief, and just a bad person! This person creates a huge number of cryptocurrency mixer sites, specifically BTC, ETH, LTC, XMR… The most interesting thing is that he copies other sites and then bans them! He sends complaints to the registrar, hosting, creates threads on bitcointalk, and GitHub! This person starts by stealing sites, bans these sites, and then steals cryptocurrency! He has profiles on GitHub and bitcointalk, where he simply destroys his competitors. He doesn’t ban his own sites and tries to keep them in the shadows! He advertises his sites through YouTube, his 3 accounts are @egg333, @BitXpress, @BlockBrainiac, all the links I’ll provide below, on YouTube, bitcointalk, and GitHub! He has already stolen over $100,000 from people and continues to do so! He constantly creates new sites and redirects from old domains to new ones! Here’s his email: [email protected] His profiles: https://github.com/Jackofusu80 https://bitcointalk.org/index.php?action=profile;u=3535585 https://www.youtube.com/@egg333/videos https://www.youtube.com/@BitXpress/videos https://www.youtube.com/@BlockBrainiac/videos His cryptocurrency addresses: 0xF9239D94Bf8B0173F626ebEFC1aE26C735201b78 (ETH) DSJongTtmP39kNTSbBxcz66nREDk9t1YNs (DOGE) LYwDxx6kzBKfhBDrnj6m284MVJ9sTpGqab (LTC) 137vnTG1cRLqyTAUaD9Fh3okwDZe54A6wd (BTC) 12abmoYHRr2tMzowTDp67v84QVeyYmSsNn (BTC) 1EixFm25Vpsno81g8thpiK4Dy1zz8XkitR (BTC) 14kL8f8NA2QoLNFqhUNjwWvs25U3kZSygT (BTC) 1JQcJ4bM22eTA5S2WoC2wNQUbs7ULJyMfC (BTC) 43wbRovRwu6UswYGHjQEDp9hfLzuzUiytEhH2dRx6NECSaWQ4rSQcTZ4SMXJNVizFQJodBRtLbueaNgaSNPvBnx9CYDJrTN (XMR) His current scam sites: https://cryptocurrency-qr-code.com/ https://ethereummixer.live/ https://tornado-cash.io https://btc-laundry.org https://bitmixing.top https://www.cryptomixer.ltd/ https://monero-mixer.net/ https://bitcoin-blender.top/
source
cryptscam
Адрес сайта
https://cryptocurrency-qr-code.com/
Адрес кошелька
Дата
22 ноября 2023 Среда. 13:49:28 UTC
тип
scamsite
Мошенник / обидчик
Exchanger24.org - Exchanger24
страна
Russia
описание
I am writing to report a highly concerning and fraudulent website, "Exchanger24.org", which has been identified as a fake crypto exchange phishing platform. This website, operated by an individual based in Russia, has been systematically scamming unsuspecting crypto users and has already swindled over $285,000 as of November 22, 2023 and much more other cryptocurrencies. The evidence of this criminal activity can be verified through the following blockchain link: https://www.blockchain.com/explorer/addresses/btc/1BtMBFxM2diH24hFZTpD5W2aa6F2YEP2NE It is alarming to see the significant financial losses incurred by innocent victims due to the operators' deceitful actions. "Exchanger24.org" presents itself as a legitimate cryptocurrency exchange platform, preying on clueless crypto users seeking to make transactions. Once users provide their sensitive information, including their cryptocurrency holdings and personal details, they become vulnerable to identity theft and financial exploitation. The operator of this phishing platform, based on available information, is believed to be located in Russia. It is crucial to exercise caution and raise awareness about this scam to protect individuals from falling victim to their deceptive practices. It has come to our attention that the operators of the phishing website "Exchanger24.org" engage in unethical practices by flagging negative reviews on platforms like Trustpilot and Sitejabber to have them removed. These actions aim to deceive more unsuspecting individuals and increase the chances of successful scams since genuine negative reviews get removed due to the lack of evidence for orders on a completely fake website. A victim has provided a detailed report confirming these actions, which can be found at: https://neomarket.ir/exchanger24-org-is-a-scam/ Thank you for your urgent attention to this matter and don't get scammed by these kind of phishing sites.
source
cryptscam
Адрес сайта
https://exchanger24.org/
Адрес кошелька
Дата
22 ноября 2023 Среда. 12:53:47 UTC
тип
Phishing
Мошенник / обидчик
Cryptofbi007 - ltc-qr-code.su - xmr-qr-code.com -
страна
Russia
описание
⚠️ Warning: Crypto users, please be aware of a fraudulent individual named "cryptofbi007" who has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate only the scammer's own QR codes, directing funds to their Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZYk9fxQFLKuKEW54r6 Saved archive of the phishing website with fraudsters Monero address: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam works by deceiving users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses in form of cryptocurrency. The operator, who poses as "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid the suspension of these phishing websites. They accomplish this by altering the functionality of the websites whenever a report is received. They even spam repositories in an attempt to unblock their malicious domains and further exploit innocent individuals. Please exercise extreme caution and refrain from engaging with any QR code generator websites associated with "cryptofbi007". To help protect our community, report any instances or suspicious activities related to these scams. The operator is known to use the following email addresses: [email protected] [email protected] And is known to use GitHub under this account: https://github.com/cryptofbi007 Furthermore, please note that the operator of this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se" and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W The phishing websites "usdt-qr.com" and "ltc-qr-code.su" are owned by the same individual using the pseudonym "cryptofbi007", indicating a coordinated phishing scheme. Both websites employ the deceptive tactic of generating the domain holder's (cryptofbi007) USDT address and Litecoin address LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ (https://blockchair.com/litecoin/address/LNWTRts3HQeuWnbjjr3Ndg4NARuWQSTApZ), further confirming their association and intent to defraud unsuspecting victims. It is essential to raise awareness about these fraudulent activities to protect potential targets from falling prey to these scams. Stay vigilant and spread awareness among the crypto community. Do not fall victim to these malicious schemes. By working together, we can protect one another and create a safer environment for crypto enthusiasts worldwide. Stay safe.
source
cryptscam
Адрес сайта
https://ltc-qr-code.su
Дата
22 ноября 2023 Среда. 12:25:00 UTC
тип
Phishing
Мошенник / обидчик
xmr-qr-code.com & xmr-qr-code-gene & xmrqrcode.com
страна
Russia
описание
Crypto users, please be aware of a fraudulent individual named "cryptofbi007" who has created multiple fake crypto QR code generator websites, including "xmr-qr-code.com", "xmr-qr-code-generator.com", and "xmrqrcode.com". These websites generate only the scammer's own QR codes, directing funds to their Monero (XMR) address: 84gHdF7rArqU6e9cbmfPi9iJR2QUU7CoX1XJEvAmQWXmSUkj3C3LVLW3ioHiqNc8iwGPcxCv5Fk13ZYk9fxQFLKuKEW54r6 Saved archive of the phishing website with fraudsters Monero address: https://web.archive.org/web/20231122120748/https://xmr-qr-code.com/8.php This phishing scam works by deceiving users into sending their cryptocurrency to the scammer's wallet through a QR code, resulting in significant financial losses in form of cryptocurrency. The operator, who poses as "cryptofbi007" on websites like GitHub, manipulates and social engineers hosting and domain teams to avoid the suspension of these phishing websites. They accomplish this by altering the functionality of the websites whenever a report is received. They even spam repositories in an attempt to unblock their malicious domains and further exploit innocent individuals. Please exercise extreme caution and refrain from engaging with any QR code generator websites associated with "cryptofbi007". To help protect our community, report any instances or suspicious activities related to these scams. The operator is known to use the following email addresses: [email protected] [email protected] And is known to use GitHub under this account: https://github.com/cryptofbi007 Furthermore, please note that the operator of this phishing scam is believed to be Russian and has previously operated fake Bitcoin, Litecoin, and Ethereum QR code generator websites such as "Crypto-qr-code.com", "btc-qr-code.se" and "crypto-qr-code.su". These websites generate the scammer's Bitcoin address: 18gcvrjDju719nQNXhJxRAaw25Vj6M6i4W Stay vigilant and spread awareness among the crypto community. Do not fall victim to these malicious schemes. By working together, we can protect one another and create a safer environment for crypto enthusiasts worldwide. Stay safe.
source
cryptscam
Адрес сайта
https://xmr-qr-code.com
Адрес кошелька
Дата
22 ноября 2023 Среда. 10:59:46 UTC
тип
bitcoin tumbler/anonymizer
Мошенник / обидчик
scamer
страна
Afghanistan
описание
If you’ve been scammed I suggest you should first gather all the evidence and contact a recovery specialist. In my case, the process took 24 hours . I was able to get back a substantial amount of the money lost, may I suggest Ben Recover . They helped me recover my funds with good counselling and financial support system that can help you at this difficult time. If you have been a victim to internet related frauds do not hesitate to reach out to BENRECOVER20 ⓐ gmail COM —they’re reliable
source
cryptscam
Адрес сайта
fxgmi.nrt
Адрес кошелька
Дата
22 ноября 2023 Среда. 06:58:58 UTC
тип
scamsite
Мошенник / обидчик
Boomchange.com & Boomchange.io - (Boom Change)
страна
Armenia
описание
The bitcoin address "1Dgc3h8caaJKEBRyrLgovwQWudxmDXmKiK" has been identified as the new deposit wallet address for victims of a scam associated with the website "Boomchange.com". This wallet address is used by scammers to receive funds from unsuspecting individuals who have fallen victim to the fraudulent activities of Boomchange. Boomchange.com & Boomchange.io are known for its involvement in various scam operations related to cryptocurrency transactions. They falsely claim to provide reliable exchange services and promise lucrative returns on investments. However, numerous users have reported that Boomchange engages in deceptive practices, such as manipulating exchange rates, delaying or denying withdrawals, or even stealing funds altogether. These unethical activities have resulted in significant financial losses for individuals who have trusted Boomchange with their investments. To further understand the extent of Boomchange's fraudulent activities, it is recommended to visit the BitcoinTalk forum thread dedicated to discussing this matter in detail. The thread can be found at the following link: https://bitcointalk.org/index.php?topic=5454622.0
source
cryptscam
Адрес сайта
https://boomchange.com
Адрес кошелька
Дата
22 ноября 2023 Среда. 05:49:21 UTC
тип
blackmail scam
Мошенник / обидчик
страна
Brazil
описание
Subject: Don't miss your unsettled payment Hi there! I regret to inform you about some sad news for you. Approximately a month or two ago I have succeeded to gain a total access to all your devices utilized for browsing internet. Moving forward, I have started observing your internet activities on continuous basis. Go ahead and take a look at the sequence of events provided below for your reference: Initially I bought an exclusive access from hackers to a long list of email accounts (in today's world, that is really a common thing, which can arranged via internet). Evidently, it wasn't hard for me to proceed with logging in your email account. Within the same week, I moved on with installing a Trojan virus in Operating Systems for all devices that you use to login to email. Frankly speaking, it wasn't a challenging task for me at all (since you were kind enough to click some of the links in your inbox emails before). Yeah, geniuses are among us. Because of this Trojan I am able to gain access to entire set of controllers in devices (e.g., your video camera, keyboard, microphone and others). As result, I effortlessly downloaded all data, as well as photos, web browsing history and other types of data to my servers. Moreover, I have access to all social networks accounts that you regularly use, including emails, including chat history, messengers, contacts list etc. My unique virus is incessantly refreshing its signatures (due to control by a driver), and hence remains undetected by any type of antiviruses. Hence, I guess by now you can already see the reason why I always remained undetected until this very letter... During the process of compilation of all the materials associated with you, I also noticed that you are a huge supporter and regular user of websites hosting nasty adult content. Turns out to be, you really love visiting porn websites, as well as watching exciting videos and enduring unforgettable pleasures. As a matter of fact, I was not able to withstand the temptation, but to record certain nasty solo action with you in main role, and later produced a few videos exposing your masturbation and cumming scenes. If until now you don't believe me, all I need is one-two mouse clicks to make all those videos with everyone you know, including your friends, colleagues, relatives and others. Moreover, I am able to upload all that video content online for everyone to see. I sincerely think, you certainly would not wish such incidents to take place, in view of the lustful things demonstrated in your commonly watched videos, (you absolutely know what I mean by that) it will cause a huge adversity for you. There is still a solution to this matter, and here is what you need to do: You make a transaction of $650 to my account (an equivalent in bitcoins, which recorded depending on the exchange rate at the date of funds transfer), hence upon receiving the transfer, I will immediately get rid of all those lustful videos without delay. After that we can make it look like there was nothing happening beforehand. Additionally, I can confirm that all the Trojan software is going to be disabled and erased from all devices that you use. You have nothing to worry about, because I keep my word at all times. That is indeed a beneficial bargain that comes with a relatively reduced price, taking into consideration that your profile and traffic were under close monitoring during a long time frame. If you are still unclear regarding how to buy and perform transactions with bitcoins - everything is available online. Below is my bitcoin wallet for your further reference: 12xHi1pTom3od4CUDGMxAcABboM1W8iej1 All you have is 48 hours and the countdown begins once this email is opened (in other words 2 days). The following list includes things you should remember and avoid doing: >> There's no point to try replying my email (since this email and return address were created inside your inbox). >> There's no point in calling police or any other types of security services either. Furthermore, don't you dare sharing this info with any of your friends. If I discover that (taking into consideration my skills, it will be really simple, because I control all your systems and continuously monitor them) your nasty clip will be shared with public straight away. >> There's no point in looking for me too - it won't result in any success. Transactions with cryptocurrency are completely anonymous and untraceable. >> There's no point in reinstalling your OS on devices or trying to throw them away. That won't solve the issue, since all clips with you as main character are already uploaded on remote servers. Things that may be concerning you: >> That funds transfer won't be delivered to me. Breathe out, I can track down everything right away, so once funds transfer is finished, I will know for sure, since I interminably track down all activities done by you (my Trojan virus controls all processes remotely, just as TeamViewer). >> That your videos will be distributed, even though you have completed money transfer to my wallet. Trust me, it is worthless for me to still bother you after money transfer is successful. Moreover, if that was ever part of my plan, I would do make it happen way earlier! We are going to approach and deal with it in a clear manner! In conclusion, I'd like to recommend one more thing... after this you need to make certain you don't get involved in similar kind of unpleasant events anymore! My recommendation - ensure all your passwords are replaced with new ones on a regular basis.
source
cryptscam
Адрес сайта
Адрес кошелька
Дата
19 ноября 2023 Воскресенье. 21:23:57 UTC
тип
ransomware
Мошенник / обидчик
страна
United States
описание
I RECEIVED THE FOLLOWING EMAIL: I have to share bad news with you. Approximately few months ago I have gained access to your devices, which you use for internet browsing. After that, I have started tracking your internet activities. Some time ago I hacked you and got access to your email accounts [email protected] . Obviously, I have easily hack to log in to your email. Your password: -xxxxxxxxxxxxxxxx One week later, I have already installed Trojan virus to Operating Systems of all the devices that you use to access your email. In fact, it was not really hard at all (since you were following the links from your inbox emails). All ingenious is simple. =) This software provides me with access to all the controllers of your devices (e.g., your microphone, video camera and keyboard). I have downloaded all your information, data, photos, web browsing history to my servers. I have access to all your messengers, social networks, emails, chat history and contacts list. I have also no issue at all to make them available for public access. I guess, you really don't want that to happen, considering the specificity of the videos you like to watch, (you perfectly know what I mean) it will cause a true catastrophe for you. Let's settle it this way: You transfer $400 USD to me (in bitcoin equivalent according to the exchange rate at the moment of funds transfer), and once the transfer is received, I will delete all this dirty stuff right away. After that we will forget about each other. I also promise to deactivate and delete all the harmful software from your devices. Trust me, I keep my word. This is a fair deal and the price is quite low, considering that I have been checking out your profile and traffic for some time by now. In case, if you don't know how to purchase and transfer the bitcoins - you can use any modern search engine. Here is my bitcoin wallet: bc1qqkjevepet3y3ylpthxqxhj2alkvr99ld7ylmq3
source
cryptscam
Адрес сайта
Адрес кошелька
Дата
19 ноября 2023 Воскресенье. 05:24:55 UTC
тип
sextortion
Мошенник / обидчик
Me
страна
Afghanistan
описание
Hi! Sadly, there are some bad news that you are about to hear. About few months ago I have gained a full access to all devices used by you for internet browsing. Shortly after, I started recording all internet activities done by you. Below is the sequence of events of how that happened: Earlier I purchased from hackers a unique access to diversified email accounts (at the moment, it is really easy to do using internet). As you can see, I managed to log in to your email account without breaking a sweat: (mailto:my email ). Within one week afterwards, I installed a Trojan virus in your Operating Systems available on all devices that you utilize for logging in your email. To be frank, it was somewhat a very easy task (since you were kind enough to open some of links provided in your inbox emails). With help of that useful software, I am now able to gain access to all the controllers located in your devices (e.g., video camera, keyboard, microphone and others). As result, managed to download all your photos, personal data, history of web browsing and other info to my servers without any problems. Moreover, I now have access to all accounts in your messengers, social networks, emails, contacts list, chat history - you name it. My Trojan virus continues refreshing its signatures in a non-stop manner (because it is operated by driver), hence it remains undetected by any antivirus software installed in your PC or device. So, I guess now you finally understand the reason why I could never be caught until this very letter... During the process of your personal info compilation, I could not help but notice that you are a huge admirer and regular guest of websites with adult content. You endure a lot of pleasure while checking out porn websites, watching nasty porn movies and reaching breathtaking orgasms. Let me be frank with you, it was really hard to resist from recording some of those naughty solo scenes with you in main role and compiling them in special videos that expose your masturbation sessions, which end with you cumming. In case if you still have doubts, all I need is to click my mouse and all those nasty videos with you will be shared to friends, colleagues, and relatives of yours. Moreover, nothing stops me from uploading all that hot content online, so all public can watch it too. I sincerely hope, you would really not prefer that to happen, keeping in mind all the dirty things you like to watch, (you certainly know what I mean) it will completely ruin your reputation. However, don't worry, there is still a way to resolve this: You need to carry out a $770 transfer to my wallet (equivalent amount in bitcoins depending on exchange rate at the moment of funds transfer), hence upon receiving the transaction, I will proceed with deleting all the filthy videos with you in main role. Afterwards, we can forget about this unpleasant accident. Furthermore, I guarantee that all the malicious software will also be erased from your devices and accounts. Mark my words, I never lie. That is a great bargain with a low price, I assure you, because I have spent a lot of effort while recording and tracking down all your activities and dirty deeds during a long period of time. In case if you have no idea how to buy and transfer bitcoins - feel free to check the related info on the internet. Here is my bitcoin wallet for your reference: 12xHi1pTom3od4CUDGMxAcABboM1W8iej1 Attention please! I can specified my Bitcoin wallet with spaces, please make sure that you key-in my bitcoin address without spaces to be sure that your coins successfully reach my wallet! From now on, you have only 50 hours and countdown has started once you opened this very email (in other words, more than two days). The following list contains things you should definitely abstain from doing or even attempting: ~>> Abstain from trying to reply this email (since the email is generated inside your inbox alongside with return address). ~>> Abstain from trying to call or report to police or any other security services. In addition, it's a bad idea if you want to share it with your friends, hoping they would help. If I happen to find out (knowing my awesome skills, it can be done effortlessly, because I have all your devices and accounts under my control and unceasing observation) - kinky videos of yours will be share to public the same day. ~>> Abstain from trying to look for me - that would not lead anywhere either. Cryptocurrency transactions are absolutely anonymous and cannot be tracked. ~>> Abstain from reinstalling your OS on devices or throwing them away. That would not solve the problem as well, since all your personal videos are already uploaded and stored at remote servers. Things you may be confused about: ~>> That your funds transfer won't be delivered to me. Chill, I can track down any transactions right away, so upon funds transfer I will receive a notification as well, since I still control your devices (my trojan virus has ability of controlling all processes remotely, just like TeamViewer). ~>> That I am going to share your dirty videos after receiving money transfer from you. Here you need to trust me, because there is absolutely no point to still bother you after receiving money. Moreover, if I really wanted all those videos would be available to public long time ago! I believe we can still handle this situation on fair terms! Here is my last advice to you... in future you better ensure you stay away from this kind of situations! My advice - don't forget to regularly update your passwords to feel completely secure.
source
cryptscam
Адрес сайта
Адрес кошелька
Дата
16 ноября 2023 Четверг. 10:27:15 UTC
тип
ransomware
Мошенник / обидчик
страна
Italy
описание
Il criminale ricattatore che tenta di spillare soldi con la mail della "allegra masturbazione" indica, per non divulgare i presunti video, un numero di wallet bitcoin che riporta ZERO bitcoin, almeno da Marzo 2023. Significa che NESSUNO ha versato niente, proprio perchè non c'è nessun video e nessuno ci è cascato. Non ci sono video reali, altrimenti avrebbe allegato uno screenshot. Non ha niente da mostrare, nemmeno il suo ridicolo pistolino, il povero, patetico, coglione. Non fatevi fregare e inondategli le caselle di posta [email protected] e [email protected] di tutto lo spam possibile (nascondendo il vostro indirizzo). Questi verme merita solo di esserre seppellito sotto la sua stessa merda. The blackmail criminal who tries to extract money with the "cheerful masturbation" email indicates, in order not to disclose the alleged videos, a bitcoin wallet number that shows ZERO bitcoin, at least since March 2023. It means that NO ONE has paid anything, precisely because there is no video and no one fell for it. There are no real videos, otherwise he would have attached a screenshot. He has nothing to show for it, not even his ridiculous little gun, the poor, pathetic, asshole. Don't be fooled and flood their [email protected] and [email protected] inboxes with all the spam possible (hiding your address). This filthy worm just deserves to be buried under his own shit.
source
cryptscam
Адрес сайта
suncor.com
Адрес кошелька
Дата
03 ноября 2023 Пятница. 11:45:35 UTC
тип
coin giveaway
Мошенник / обидчик
страна
American Samoa
описание
Фишинговый обменник
source
cryptscam
Адрес сайта
Zirexbit.com
Адрес кошелька
Дата
03 ноября 2023 Пятница. 00:24:11 UTC
тип
scamsite
Мошенник / обидчик
BoomChange - "Boomchange.com" & "Boomchange.io"
страна
Armenia
описание
I am writing to complain about the phishing domain "Boomchange.com" which has been used to scam individuals of their cryptocurrencies. The website is designed to deceive victims into believing it is a legitimate cryptocurrency exchange company. However, it is a fraudulent website that was set up to gain access to victims’ wallets and steal their cryptocurrencies. The website lists no physical address and no registration number. This phishing website has stolen a significant amount of Bitcoin from unsuspecting victims. They have used the newly identified bitcoin wallet address "bc1qr0avgajde8y37qadrtjd4vt6sdvl9dgq7j6ckj" to transfer the stolen bitcoin from the Boomchange victims. More detail about the SCAM platform Boomchange: https://bitcointalk.org/index.php?topic=5454622.0
source
cryptscam
Адрес сайта
https://boomchange.com