Bitcoin Forum
May 14, 2024, 02:09:26 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Local / Altcoins (Deutsch) / SCAM - AIRCRAFT ICO - Fake profil, Identitätsdiebstahl on: September 20, 2018, 11:03:16 PM
AIRCRAFT ICO: https://bitcointalk.org/index.php?topic=4935341.0
(archive:http://archive.is/cHRtb)

Bounty Thread: https://bitcointalk.org/index.php?topic=4935352

WP https://aircraft.travel/images/Aircraft_WhitePaper_v1.pdf

Website https://aircraft.travel/#team-section-link
(archive:http://archive.is/Gc6QX)

Was genau ist passiert? Verwenden höchstwahrscheinlich Fake Profile, sind nicht in der Lage, einfache Garantien bzw. Informationen über Teammitglieder zu geben.

Jetzt kommt das interessante an der Geschichte. Und zwar wenn man sich das Amerikanische Entwicklungsteam anschaut.



Vor ca. 2-3 Wochen, waren die Fotos mit nichts verknüpft (kein Linkedin Account, Twitter, etc ...)

Die Rückkehr der Linkedin Rache

ÜBERRASCHUNG! 3 Mitglieder des Teams erscheinen plötzlich mit ihrem Linkedin-Profil








https://www.linkedin.com/in/jonas-s-299869170/

https://www.linkedin.com/in/giorgio-f-651a13170/

https://www.linkedin.com/in/lee-h-598812170/

Übrigens: Familiennamen bestehen aus einem einzigen Buchstaben (was es schwieriger macht, Identitätsdiebstahl zu erkennen)
UND in der Linkedin Profile URL, finden wir in allen 3 Fällen die gleichen endgültigen Zahlen (170 in diesem Fall) Ich weiß nicht, was ich darüber noch denken soll, es ist jedoch eine interessante Information, um gleichzeitig erstellte Profile zu erkennen...)


Doch lasst uns nun auf Jonas Steur schauen



In der Tat ist das der wahre Jonas: Jonas Skorpil, ein deutsches Model und Fotograf:





Jonas Skorpil Intagram: https://www.instagram.com/zrodyr/
Anderer Account: http://www.pictame.com/user/jonasskorpil/2922097409/1395152725981183621_2922097409

In diesem Sinne würde ich JEDEM raten, von diesem ICO Abstand zu halten!
2  Economy / Scam Accusations / SCAMMER "kendari" on: July 27, 2018, 02:28:09 PM
Guys be careful with ref links from user "kendari"

He say he will send 0,1 BTC to your btc adress if you sign up

He post ref links in all sections and if you sign up he will delete the thread
3  Alternate cryptocurrencies / Service Discussion (Altcoins) / Clipboard Hijacker + Tips to protect on: July 02, 2018, 04:28:32 PM
Hello everybody,

because I have just read it, I thought that a thread on the subject would not be a wrong idea.

A fairly new piece of malicious software called Clipboard Hijacker is targeting Clipboard manipulation on Windows computers. As soon as the user saves a Bitcoin address known to the system to the clipboard, the address is changed automatically. The cryptocurrency then lands in the wallet of cybercriminals instead of on the desired account. This new variant is part of the recently released "All-Radio 4.27 Portable" malicious software package. It automatically monitors about 2.3 million bitcoin addresses.

The Bleeping Computer team has identified a particularly sophisticated malware for Windows computers. The Clipboard Hijacker stores 2.3 million Bitcoin addresses, which are worth money to cybercriminals. Many online marketers paste Wallet's destination address via copy and paste. But as soon as one of the known 2.3 million addresses appears in the clipboard, the Trojan changes the clipboard. Instead of the desired wallet address is automatically entered the cybercriminals. The number of wallets saved is record-breaking. Previously known Clipboard hijackers had only 400,000 to 600,000 addresses of various crypto currencies (mostly Bitcoin) in the portfolio.

The malware installs quickly, silently and easily. After downloading the d3dx11_31.dll file, the virus creates an executable file named "DirectX 11" that will not be noticed by outsiders due to the name. This file becomes active as soon as the user logs on to Windows. Later, two more files are deposited on the target computer. Nothing happens after that. The malware should not interfere with normal operation and is otherwise not noticeable. The infected computer waits for the moment to insert a wallet address into the clipboard. This is then changed if necessary. The problem: If the user does not carefully check Wallet's destination address, they will not detect the fraud. If you send the coins, they end up on the account of cybercriminals and are thus lost forever.

How can I protect myself from the Clipboard Hijacker?

If you want to protect yourself from manipulating your Bitcoin transfers, you should bring your anti-virus software up to date. The antivirus software should then completely check the PC. In addition, it always makes sense to reconcile the destination address with transfers manually multiple times with the original. Even with novel malicious programs can thus be avoided despite an infection of your own computer that funds are redirected to the accounts of third parties. Clipboard hijackers were reported more than a decade ago when Mac OS X users were affected by the infection. New is the change to the clipboard to redirect crypto currencies. The former malware has immediately made itself felt, because the clipboard was no longer useful. Particularly insidious is the new variant, because it makes itself felt only when it is too late and at the same time has an extensive database of Bitcoin addresses.
4  Local / Altcoins (Deutsch) / Schadenssoftware Clipboard Hijacker + Tipps zum Schutz on: July 02, 2018, 04:24:01 PM
Hallo zusammen,

weil ich es gerade gelesen habe, dachte ich mir dass ein Thread zum Thema keine verkehrte Idee wäre.

Eine recht neuartige Schadsoftware namens Clipboard Hijacker hat es bei Windows-Computern auf die Manipulation der Zwischenablage abgesehen. Sobald der Nutzer eine dem System bekannte Bitcoin-Adresse in der Zwischenablage speichert, wird die Adresse automatisch verändert. Die Kryptowährung landet dann in der Wallet der Cyberkriminellen statt auf dem gewünschten Account. Diese neue Variante ist Teil des kürzlich aufgetauchten „All-Radio 4.27 Portable“ Schadsoftware-Pakets. Es überwacht automatisch rund 2,3 Millionen Bitcoin-Adressen.

Das Team von Bleeping Computer hat eine besonders ausgefeilte Schadsoftware für Windows-Computer ausgemacht. Im Clipboard Hijacker sind 2,3 Millionen Bitcoin-Adressen gespeichert, die für die Cyberkriminellen bares Geld wert sind. Viele Nutzer von Online-Handelsplätzen fügen die Ziel-Adresse der Wallet per Copy & Paste ein. Sobald aber in der Zwischenablage eine der bekannten 2,3 Millionen Adressen auftaucht, verändert der Trojaner die Zwischenablage. Statt der gewünschten Wallet-Adresse wird automatisch die der Cyberkriminellen eingetragen. Die Anzahl der gespeicherten Wallets ist rekordverdächtig. Bisher bekannte Clipboard Hijacker hatten lediglich 400.000 bis 600.000 Adressen verschiedener Kryptowährungen (zumeist Bitcoin) im Portfolio.

Die Schadsoftware installiert sich schnell, geräuschlos und einfach. Nach erfolgtem Download der Datei d3dx11_31.dll erstellt der Virus eine ausführbare Datei namens „DirectX 11“, die Außenstehenden aufgrund des Namens nicht weiter auffällt. Diese Datei wird aktiv, sobald sich der Nutzer bei Windows anmeldet. Später werden noch zwei weitere Dateien auf dem Zielrechner hinterlegt. Danach passiert zunächst nichts. Die Schadsoftware soll den gewöhnlichen Betrieb nicht beeinträchtigen und macht sich auch sonst nicht bemerkbar. Der infizierte Computer wartet auf den Moment, bis man eine Wallet-Adresse in das Clipboard einfügt. Diese wird dann bei Bedarf verändert. Das Problem: Wenn der Nutzer die Ziel-Adresse der Wallet nicht sorgfältig überprüft, wird er den Betrug nicht feststellen. Wenn man die Coins verschickt, landen sie auf dem Konto der Cyberkriminellen und sind somit für immer verloren.

Wie kann ich mich vor dem Clipboard Hijacker schützen?

Wer sich vor einer Manipulation seiner Bitcoin-Transfers schützen will, sollte seine Antiviren-Software auf einen aktuellen Stand bringen. Die Antiviren-Software sollte anschließend den PC komplett überprüfen. Daneben ist es stets sinnvoll, die Ziel-Adresse bei Transfers mehrfach manuell mit dem Original abzugleichen. Auch bei neuartigen Schadprogrammen kann man somit trotz einer Infektion des eigenen Computers vermeiden, dass Gelder auf die Konten Dritter umgeleitet werden. Von Clipboard Hijackern wurde schon vor mehr als zehn Jahren berichtet, damals waren auch Nutzer von Mac OS X von der Infektion betroffen. Neu ist die Veränderung der Zwischenablage, um Kryptowährungen umzuleiten. Die frühere Schadsoftware hat sich sofort bemerkbar gemacht, weil die Zwischenablage nicht mehr zu gebrauchen war. Besonders heimtückisch ist die neue Variante, weil sie sich erst dann bemerkbar macht, wenn es zu spät ist und gleichzeitig über eine umfangreiche Datenbank an Bitcoin-Adressen verfügt.

Quelle: https://www.btc-echo.de/clipboard-hijacker-schadsoftware-leert-bitcoin-wallets
5  Local / Beni / Zalando.it - 15% Sconto on: June 29, 2018, 04:00:54 PM
Salve Ragazzi,

Come già descritto sopra, offro uno sconto del 10% su Zalando.it da un ordine di minimo 100€ é 15% da un ordine di 150€

Qual è la procedura?

1. Cerca semplicemente l'articolo che desideri su Zalando.it

2. Inviami il link e la tua misura disponibile


Opzione di pagamento: (per ora)

1. Pagamento anticipato tramite BTC
Se l'articolo desiderato è disponibile, ti farò sapere il mio indirizzo bitcoin e l'importo che pagherai.
Dopo aver ricevuto il pagamento, effettuerò immediatamente l'ordine.


Buon risparmio! 😉
6  Local / Presse / Kryptowährungen: Investitionen in Initial Coin Offerings bringen enorme Renditen on: June 26, 2018, 11:40:24 AM
https://www.heise.de/amp/meldung/Kryptowaehrungen-Investitionen-in-Initial-Coin-Offerings-bringen-enorme-Renditen-4089458.html

Was ist eure Meinung dazu?

Seht ihr ICO's generell als Chance für hohe Renditen oder eher als Abzocke?
7  Local / Biete / Zalando.de - 15% - 20% Rabatt + KOSTENLOSER Versand on: June 25, 2018, 03:59:29 PM
Hallo,

Wie oben bereits beschrieben, biete ich 15% Rabatt auf Zalando.de ab einem Betrag von 100€

***** UPDATE *****
20% auf alle Parfüms von Chanel, Gucci, Boss, Jean Paul Gautier, Givenchy, Tom Ford, Joop UVM. ab 100€ MBW

Wie ist der Ablauf?

1. Suche einfach den von dir gewünschten Artikel bei Zalando.de heraus

2. Schicke mir den Link und deine verfügbare Größe hinzu



Zahlungsmöglichkeit: (vorerst)

1. Vorkasse via BTC
Wenn der von dir gewünschte Artikel verfügbar ist, teile ich dir direkt meine Bitcoin Adresse wie den zu zahlenden Betrag mit.
Nach Erhalt deiner Zahlung gebe ich unmittelbar deine Bestellung auf.

2. Paysafecard

Viel Spaß beim sparen!  Smiley
8  Economy / Invites & Accounts / [SELLING] 🔥💲FLIXIFY INVITES - 30$ 💲🔥 on: June 24, 2018, 08:39:12 PM
Hi Guys,

I‘m selling Flixify Invites (A more permium version of Netflix) for 30$.

Flixify registration is an invite only (meaning you cannot create an account unless you have received an invite).

Flixify has all the movies Netflix has and more in 720-1080p (with subtitles) with uninterrupted streaming.

The best part is there are NO ADS anywhere on the website or in the videos you watch. All your latest movies and favorite TV shows are updated on the site immediately when the show is released on the day.

The site also has cool features like 'request for a show/movie' which gives you access to any show/movie requested within 24 hours.

Flixify can be watched on all devices; smart phones, smart tv, pc's, xbox, ps4 etc.


Accepting Methods: Bitcoin
9  Economy / Auctions / Crypto e-mail on: June 17, 2018, 02:55:40 PM
Description: vergecurrency.com@gmail.com
Starting bid: 0,001BTC
Payment methods accepted: Bitcoin
Additional information: Selling this e-mail, it's official website name of Verge
10  Economy / Invites & Accounts / @ethereum.info on: May 27, 2018, 09:45:31 PM
Hey,

I'm selling a Instagram Account with High potential in crypto niche.

Make me a offer

11  Economy / Digital goods / IPV6 Proxy on: May 14, 2018, 09:08:57 PM
Hey guys,

I'm selling a private ipv6 proxy for instagram that works until 05/29/2018.

Price: 1 MIOTA
12  Local / Biete / IPv6 Proxy on: May 12, 2018, 07:13:16 PM
Hallo zusammen,

Biete eine IPv6 Proxy an.

Sie ist noch bis zum 29.05. gültig
13  Economy / Digital goods / 5$ - .EDU EMAILS FOR AMAZON PRIME, GITHUB ETC. on: May 07, 2018, 07:19:38 PM
Hi Guys,

I'm selling .edu email accounts for 5$.

Benefits of having .edu email

- Amazon Prime ususally runs for 99$/year, but with a prime membership you could get 6 months for free when you have an .edu email.

- Github Student developer pack give students free access to the best developer tools in one place so they can learn by working on these tools.


& much MORE!

Accepting Methods: Bitcoin, Ethereum.
14  Alternate cryptocurrencies / Service Discussion (Altcoins) / SCAMS IN CRYPTO & HOW TO RECOGNIZE THEM on: May 03, 2018, 09:49:54 PM
Hello everybody,

because I have read it here more often, I thought that a thread on the subject would not be a wrong idea.
Cryptocurrency scams are becoming harder to detect. Here are a few things to watch out for



Disclaimer:
The scams listed here are not exhaustive, are merely examples, and are intended to give an idea of the ways in which scammers attempt to gain value.



As cryptocurrencies such as Bitcoin and Ethereum are gaining in popularity, the number of scams and scams in this area is also increasing. However, there are also some things that you can (and should) pay attention to when dealing with the subject and where money and/or personal information is in any way at stake.

Overview:
Part 1 - Websites
Part 2 - Twitter
Part 3 - Airdrops
Part 4 - Signal Groups (Pump & Dump)
Part 5 - Scam Mails


Before you go, the most important tip is the Golden Rule: NEVER reveal your private keys, NEVER - for any reason, no matter how tempting!

In addition, greed is one of your biggest enemies. If you are greedy and take too little care of yourself, you can lose everything. So be careful!



Part 1 - Websites

Situation / Danger:
A now popular scam is the cloning of a well-known website to get the unsuspecting user to enter their data and steal it.

Usually you can tell by the presence of the green "https" in front of the URL if a website is legitimate.


https://ip.bitcointalk.org/?u=https%3A%2F%2Fi.imgur.com%2F3EKZzpt.png&t=588&c=JycNRYO5CG5NAw

If you are attentive, you can easily see that the next page is not a legitimate site or a legitimate entity because it does not have the proper certification to be trusted.

So you always have to look for a green "Safe" or "Secure" and "https" in front of the URL address of the website. This is a sign that the website and the company have received the proper Secure Sockets Layer (SSL) certificates. Obtaining an SSL certificate indicates that the company can be trusted behind the page.




Coinsmarkets.com has neither the green "Secure" nor "https" in front of its URL. Instead, it has a gray "Not Secure" and a regular "http" in front of the URL.
As a rule, scam pages are quickly detected and removed. If you are now trying coinsmarkets.com (please do not wink) you will get an error message.


However, some scam sites have found a way to display the green "secure" and "https" in the website URL, and then make an incredibly subtle change to the URL.




At first glance, URL for the popular cryptocurrency exchange Binance seems legitimate. You can clearly see the green "https" in front of the website URL and also the name seems to be correct.

In the rarest cases, it is understandable how a site received an SSL certificate that allows them to display the green "https" in front of the URL. This also applies to scammer pages. At the same time, getting an SSL certificate from a less trusted certificate issuer is pretty easy.

If you take a closer look at the second picture, you will see small dots under the letters "n" in the word "binance".

The two dots under the Binance URL show that this is not the real Binance page. Instead, it's a very well-made clone of the page, whose sole purpose is to tap user data that unsuspecting users enter there. Even an activated 2FA authentication does not protect you, since a scammer can enter this data immediately after you have entered it on the real Binance page, where it will still be valid. Thus, he has access to the account from then on.

Especially perfidious are those pages that show an error message after the first log in, saying: "The service can not be reached temporarily, please try again in 10 minutes." In this way, the user does not even suspect that he has just revealed his data and a scammer uses it to gain access to the user's account.
If the user then tries to log back in 10 minutes later, he gives the scammer a 2. 2FA code, which he may use to initiate a transaction or even disable 2FA.

Even if you are attentive, such a site can be difficult to spot because everything seems familiar at first glance.

The example shown here is called PunyCode, which is used to create certain special characters (here the dot under the letter "n")
In another example, we linked to Bittrex and used the cedilla under the "r" (looks like a comma). Cedillas are widely used in languages such as French and Portuguese.





Part 2 - Twitter

Situation / Danger:
Another popular method is to fake known accounts on Twitter and, under cover of a giveaway or airdrop, encourage people to send money or crypto.



Here you can see very well that in the red box (Scam) the Twitter name is "binance", but the handle is "@ banance_2017" and not like in the green box "@ binance_2017". Here, a giveaway of Binance is faked and the link to an ether address is given to which ETH is to be sent to participate in the giveaway. In the orange box you can see that the post office has been split and licked very often, which should give the whole thing credibility, as are the fake confirmations in the blue boxes. These were also placed by the scammers. The high number of shares & likes is most likely due to the use of bots.

Another scam are fake accounts, which get the "verified" from Twitter including the blue hook next to the name, which - if you are not hellish beware - can lead you astray very quickly. Here's an example:



It can be seen that the TRON project's real account (right) has a blue check mark next to its name. The handle is "@Tronfoundation". On the left, however, is the fake account, which also has a blue hook next to the name, but a slightly different handle "@Tronfoundationl".

The confusing thing: The fake account has the completely identical description, location and a similar follower number AND he is even older, which means that you theoretically even keep the original account for the fake account, since this is only a few months old.

So, if you look at the following tweet, there is not much to say against it that you can consider it authentic:







Tips:
- Just make it a policy to NEVER join a giveaway where you have to invest money first.
- NEVER enter your private key somewhere and do not upload it (eg JSON file).
- Followed the most important Twitter accounts you use regularly
- If you see a message that interests you, go to the Twitter feed of the account and look there to see if the message really comes from the real account.



Part 3 - Airdrops

Situation / Danger:
Airdrops are now performed in various ways. Therefore, it is also difficult to show all possible scam combinations. What most Airdrop scams have come to grips with is that they somehow try to get hold of your private keys - either on a website or in a (Google) form.

Prominent example is the Fake-OmiseGo Airdrop:



In the screenshot above it is easy to see that in each case the third field asks for your private key. The following sentences are particularly perfidious: "Note: It is safe We will never collect or store your personal information (such as your private key) This form is fully encrypted ...". In addition, this is an unnecessary complexity suggests, while the scammers have it only on your private key apart.

The links to such sites are distributed via Twitter & Facebook but also via telegram and other channels such as Slack or Discord. Often an urgency is also suggested (for example "only the first 1,000 participants), so that the alleged victims become careless.

Tips:
-NEVER give your private key! (you can not repeat it often enough)
-If you want to join in an Airdrop, first check the project! Do not use a direct link from the same source. Looking for a homepage and a bounty thread here in Bitcointalk
-If you do not find anything, it is most likely a scam
-Use your common sense, because here too in the forum there are questionable projects and practices.



Part 4 - Signal Groups (Pump & Dump)

Situation / Danger:
Undertow. Signal Groups and Pump & Dump Groups are a great danger, especially for newcomers, as they suggest quick profits and often present them credibly.



Tips:

-Avoid short term pumps & dumps, without extensive research and experience it is pure gambling and losses are almost guaranteed.
-Never spend money to get into "closed groups" or receive so-called paid signals. You usually come in the paid outer circle >> 75% loss!
-Watch out for supposed "insider tips" that are being dropped. These are almost always coins that are in the pumping phase. If you get in here, you're the one who's dumped on.



Part 5 - Scam Mails

Situation / Danger:
Phishing and Scam emails have been known for years and are actually nothing new. Due to the often prevailing intransparency in Crypto and the unawareness / insecurity of many, it is still worth mentioning. In addition, scam websites (see above) may irreversibly compromise accounts / wallets and therefore pose a particular danger. Especially in combination with Airdrops and the often difficult-to-understand coin-token distribution practices, the danger of scam / phishing emails is omnipresent.

On the left a "classic" phishing mail, on the right a scam mail that applies for a nonexistent Airdrop:



There is not much to say about scam emails. They work on the same principle as previous phishing emails and try to convince you credibly that they are authentic. This is unfortunately favored by the fact that many projects are relatively unprofessional and therefore supposedly scam mails actually come sometimes from the actual project. As a result, laypersons (and even experienced users) often find it difficult to spot the difference directly.

Tips:

-Create at least 1 new e-mail address for Crypto. Be selective on whom you give this address.
-Never respond to mails that have not requested yours. Especially not if you have not given the project / sender your e-mail address.
-Do not click on links in emails! Should you do it, use a e.g. sandbox
-If you are unsure about a mail, verify the information (not by clicking in the mail!), Eg. Search the project's Twitter, Telegram, or other social media channels.


15  Local / Italiano (Italian) / Phishing Attacco su Myetherwallet! on: April 24, 2018, 04:15:55 PM
Phishing Attacco su Myetherwallet! Myetherwallet (MEW), the web’s most popular client-side ethereum wallet, has been compromised by a DNS attack. Numerous users are reporting missing funds and Mycrypto, a sister site which spun off from MEW earlier this year, has confirmed as much. The incident highlights the dangers of relying on a centralized interface, even when the funds are held by the individual, and exposes the inherent weaknesses of the Domain Name System. Attento ragazzi!

https://news.bitcoin.com/myetherwallet-servers-are-hijacked-in-dns-attack/
16  Alternate cryptocurrencies / Service Discussion (Altcoins) / Phishing Attack on Myetherwallet! on: April 24, 2018, 04:07:10 PM
Phishing Attack on Myetherwallet! Myetherwallet (MEW), the web’s most popular client-side ethereum wallet, has been compromised by a DNS attack. Numerous users are reporting missing funds and Mycrypto, a sister site which spun off from MEW earlier this year, has confirmed as much. The incident highlights the dangers of relying on a centralized interface, even when the funds are held by the individual, and exposes the inherent weaknesses of the Domain Name System. Be careful guys!

https://news.bitcoin.com/myetherwallet-servers-are-hijacked-in-dns-attack/
17  Local / Altcoins (Deutsch) / ACHTUNG ! Phishing Angriff auf Myetherwallet on: April 24, 2018, 03:53:09 PM
Wer Kryptowährungen auf der Seite Myetherwallet lagert und eine Google-DNS verwendet, sollte die Webseite im Augenblick meiden!

Quelle: https://m.focus.de/finanzen/boerse/kryptowaehrungen/breaking-phishing-angriff-gegen-myetherwallet_id_8821934.html
18  Local / Altcoins (Deutsch) / Airdrop Token auf myetherwallet gutgeschrieben on: April 15, 2018, 11:44:29 PM
Hallo,

wenn man zum Beispiel Tokens eines Airdrop erhält die einem Wert von 0,05 ETH entsprechen, können diese Token dann in ETH umgetauscht werden oder wie wird das gehandhabt?
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!