Bitcoin Forum
November 19, 2018, 12:12:17 AM *
News: Latest Bitcoin Core release: 0.17.0 [Torrent].
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: [20BTC bounty] Bitcointalk phishing site, max para.vn , impersonation scammer  (Read 573 times)
Exploit01
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
July 11, 2018, 10:41:41 AM
 #21

Hey Exploit01, please let me know what you have found here. I don't consider the scammer to be technically skilled at all; the phishing page in itself is very primitive and reportedly the code only stores the _last_ password.

The following files are courtesy of scotaloo; who despite our history I have chose to sent him 0.25 BTC out of the bounty in order to reward him for his efforts.

Access logs: https://mega.nz/#!KxhyCK6S!cPInrNU2tIJF9LP30Upex7Z6j4CAEAyad0APxqXaFFs
Extra logs: https://mega.nz/#!T5pymarT!oKVdk3yG4V16SBBHAHzc2fGOrWCijednGa9U6FRgOD4

Dump of public_html (431MB): https://mega.nz/#!y8QDkAzD!cB_B-fG9oA0t8lBRq8LMa_tN3KOKiol6FTwGSAXIexA

I have given you the direct proof and link to the people invloved. The main guy behind spreading the link on bitcointalk is  "Ellles" don't know if the alias is right on here.
1542586337
Hero Member
*
Offline Offline

Posts: 1542586337

View Profile Personal Message (Offline)

Ignore
1542586337
Reply with quote  #2

1542586337
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
Exploit01
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
July 11, 2018, 10:53:08 AM
 #22

If you google the domain it looks like it was compromised by some guy who owns the instagram account mwr and goes by 'SLNTAR' as seen in a mirror of the website from May 18 2018. It looks like the owner of the website has regained control but it's possible the website is still under the attackers control.

Considering that the domain is still being used as a phishing site to steal login credentials, I would say whoever currently is in control of the domain is the culprit.
I wouldn't overestimate the technological ability of random Vietnamese business owners. It is highly likely that: a.) they are technologically uninclined b.) started the website for their business legitimately as they still list it on their Facebook page to this day even though it's not currently in use

They probably were using a vulnerable version of some publicly available software  which then allowed someone to upload a shell to the website. The owner then likely probably set the entire website to the current default page as a remedy to the problem. If the vulnerable software in question was something like an online store to sell their kitchen hardware, they could have deleted that but the shell could have given them SSH access to the entire system or worse. The alternative is the website could have been vulnerable to some other remote exploit due to outdated server software which would mean the attackers still got SSH access and owned the server.

By your logic, a bunch of Vietnamese kitchen hardware dealers (who own a physical building apparently???) are using their own website which was hacked at least once before to scam people. The business is registered in Vietnam and it's listed on their Facebook page and on the domain registration so I think it'd be a little dumb for them to use that as a platform if the culprit was they themselves.


The phishing pages aren't extremely sophisticated but by the looks of it they were probably created from scratch or using a program and the ICO page has an advanced mechanism that a.) only allows 1 registration per IP to prohibit bot spamming or the like and b.) requires passwords of 8 characters. The website also uses fairly good English and punctuation which it is evident the owner of the website or whoever is operating their social media does not have.

The person who executed the scam seems technologically savvy and is at least familiar with the English language which it doesn't appear the people at Maxpara are. All evidence points to the website being used by external people to run their scam to avoid getting caught. Someone who is smart enough to code their own phishing page that shows a relative familiarity with computer programming probably isn't using their own domain name with no whois protection to run a scam. It'd be funny if it actually was Vietnamese kitchen dealers but unfortunately if it's probably not

Quoting this post, 0nc3forg0tt3n had also pretended to be another CL user so they may be related, or they may be another person.

In any case, the email communications of the maxpara phisher did not demonstrate solid English. English is definitely a very second language for them; there is no reason for them to use broken english while trying to pretend to be me and communicate with a CL user.
I am not related but it goes to show how many people are hustling on this forum and how careful you have to be.

I didn't read the emails you uploaded, I was only going off what I knew from examining their website.


Interestingly enough, the website was compromised by SLNTAR on May 16th (or the 18th I can't recall what the mirror date was and I cba to look again) and on May 28th the domain was being used to scam Bitcointalk users. Again though, SLNTAR appears to be using automated methods so it's possible multiple people were able to gain a foothold into the website. SLNTAR doesn't appear to have a good grasp on the English language and (his instagram is in arabic).

There's publicly available information to contact the company who owns the domain to the website and assumingly the server. If you can contact them, theoretically you could get the logs and locate the person who uploaded the shell/compromised the server. The language barrier might be an issue but their cooperation is probably your best bet here

The best avenue besides that for you to take would be Blockchain analysis. It's a long shot but there's always a possibility of something coming up.

If the victims of the scam were able to provide additional information on the perpetrator/copies of emails (with metadata as to see what server the spoofed emails are coming from -- are they coming from a public service or a private server? It's a good question and if it's a private server then you have a good lead there. received that'd also be useful.

edit: also didn't read your response before posting but no problem lol it's kind of like a puzzle to be solved and puzzles are exciting

In response to Quickseller, it's possible that they just switched to the new website because the old one was defaced and they didn't know how to fix the vulnerability or whatever so they switched domains/hosts to alleviate the problem. I didn't check the registry but the odds are that they still own the domain and the server that hosts it as the IP of the website is the same as it was when it was mirrored on May 18th. I'll check later though


SLNTAR goes by the user "Ellles" on this forum. He is currently marketing something to do with Ico on his facebook page. You can check his facebook account. @TradeFortress knows about him already. They ignorantly and stupidly left traces everywhere.
TradeFortress 🏕
Drunk AF
VIP
Legendary
*
Offline Offline

Activity: 1050
Merit: 1023


View Profile
July 11, 2018, 04:05:01 PM
 #23

Can you give evidence SLNTAR goes by the user "Ellles" on this forum?

Exploit01
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
July 11, 2018, 05:12:15 PM
 #24

Can you give evidence SLNTAR goes by the user "Ellles" on this forum?
Sent you a message.
Exploit01
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
July 11, 2018, 05:26:05 PM
 #25

MAJOR UPDATE ON SLNTAR AFTER HOURS OF WORK.


Slight confusion UPDATE!

SLNTAR who goes by https://www.instagram.com/mwr/ does nothing apart from hacking vulnerable websites for the fun of it. He is an expert, and only asks for bounties where necessary (majorly Deep web sites). I doubt he would make such a crappy phising page, do such a shady job and pile the time to market it to bitcointalk users. And yes he is ARAB.

This is how he operates: https://www.google.com/search?client=ubuntu&channel=fs&ei=ajVGW7nFDcGoUYynlZgK&q=hacked+by+SLNTAR&oq=hacked+by+SLNTAR&gs_l=psy-ab.3...2582.4449.0.4671.0.0.0.0.0.0.0.0..0.0....0...1c.1.64.psy-ab..0.0.0....0.-jDei02kZgM

He did hack the site before, but after the compromise, as seen in a mirror of the website from May 18 2018. The "owner/developer" of the website regained control and major changes were done on it.

I believe @TradeFortress Now have enough links, contacts and leads to table to the authorities and Apprehend the culprit.



Exploit01
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
July 12, 2018, 08:09:40 PM
 #26

Still waiting on @TradeFortress to send the Bounty my way as agreed.
Exploit01
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
July 13, 2018, 05:37:51 PM
 #27

Still no word from  @TradeFortress, he seems to be ignoring my Messages yet we had an off escrow deal hope am not played lol.
ThatRandom8543
Sr. Member
****
Offline Offline

Activity: 756
Merit: 258


View Profile
July 15, 2018, 12:37:02 AM
 #28

MAJOR UPDATE ON SLNTAR AFTER HOURS OF WORK.


Slight confusion UPDATE!

SLNTAR who goes by https://www.instagram.com/mwr/ does nothing apart from hacking vulnerable websites for the fun of it. He is an expert, and only asks for bounties where necessary (majorly Deep web sites). I doubt he would make such a crappy phising page, do such a shady job and pile the time to market it to bitcointalk users. And yes he is ARAB.

This is how he operates: https://www.google.com/search?client=ubuntu&channel=fs&ei=ajVGW7nFDcGoUYynlZgK&q=hacked+by+SLNTAR&oq=hacked+by+SLNTAR&gs_l=psy-ab.3...2582.4449.0.4671.0.0.0.0.0.0.0.0..0.0....0...1c.1.64.psy-ab..0.0.0....0.-jDei02kZgM

He did hack the site before, but after the compromise, as seen in a mirror of the website from May 18 2018. The "owner/developer" of the website regained control and major changes were done on it.

I believe @TradeFortress Now have enough links, contacts and leads to table to the authorities and Apprehend the culprit.


Still waiting on @TradeFortress to send the Bounty my way as agreed.

Still no word from  @TradeFortress, he seems to be ignoring my Messages yet we had an off escrow deal hope am not played lol.

Exploit01 how do you know if this person didnt steal someone identity? Have you factor that in? Considering the fact that you mentioned someone possibly used a vpn (or maybe took advantage of someone network), you shouldve factored that in. Plus on top of that, the links doesnt exactly prove it enough or even warrant authorities to take action. If it does, it doesnt happen over night and depending on the location the authorities would have to work with other country authorities to take proper action. I extremely doubt that the information you have provided (if correct) is enough for them to take action. They may put it on the back burner.
Exploit01
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
July 15, 2018, 03:59:25 PM
 #29

MAJOR UPDATE ON SLNTAR AFTER HOURS OF WORK.


Slight confusion UPDATE!

SLNTAR who goes by https://www.instagram.com/mwr/ does nothing apart from hacking vulnerable websites for the fun of it. He is an expert, and only asks for bounties where necessary (majorly Deep web sites). I doubt he would make such a crappy phising page, do such a shady job and pile the time to market it to bitcointalk users. And yes he is ARAB.

This is how he operates: https://www.google.com/search?client=ubuntu&channel=fs&ei=ajVGW7nFDcGoUYynlZgK&q=hacked+by+SLNTAR&oq=hacked+by+SLNTAR&gs_l=psy-ab.3...2582.4449.0.4671.0.0.0.0.0.0.0.0..0.0....0...1c.1.64.psy-ab..0.0.0....0.-jDei02kZgM

He did hack the site before, but after the compromise, as seen in a mirror of the website from May 18 2018. The "owner/developer" of the website regained control and major changes were done on it.

I believe @TradeFortress Now have enough links, contacts and leads to table to the authorities and Apprehend the culprit.


Still waiting on @TradeFortress to send the Bounty my way as agreed.

Still no word from  @TradeFortress, he seems to be ignoring my Messages yet we had an off escrow deal hope am not played lol.

Exploit01 how do you know if this person didnt steal someone identity? Have you factor that in? Considering the fact that you mentioned someone possibly used a vpn (or maybe took advantage of someone network), you shouldve factored that in. Plus on top of that, the links doesnt exactly prove it enough or even warrant authorities to take action. If it does, it doesnt happen over night and depending on the location the authorities would have to work with other country authorities to take proper action. I extremely doubt that the information you have provided (if correct) is enough for them to take action. They may put it on the back burner.

I submitted every detail via Private message to TradeFortress. Included extra informations he asked for.... But he seems like a selective scammer. Actually based on 2013 reviews that he himself had pulled an impersonation scam attempt makes this thread a scam conseal attempt. He could have been involved yet claims impersonation.
croTek4
Sr. Member
****
Offline Offline

Activity: 393
Merit: 250


the Cat-a-clysm.


View Profile
July 23, 2018, 01:44:37 PM
 #30

Quote
Checking Domain Name
Domain Name: [phishing]
Top Level Domain: VN (Viet Nam)
DNS Lookup
IP Address: 125.253.112.146
Geolocation: VN (Viet Nam), 67, Tra Vinh, N/A N/A - Google Maps
Reverse DNS: mail112.e146.evlms.net

Also, this IP address is linked to this guy :
(original WHOIS query : https://www.whois.com/whois/125.253.112.146)
Quote
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '125.253.112.0 - 125.253.127.255'

% Abuse contact for '125.253.112.0 - 125.253.127.255' is 'email@vnnic.vn'

inetnum:        125.253.112.0 - 125.253.127.255
netname:        ODS-VNNIC-VN
descr:          Online data services JSC
descr:          123 Truong Dinh, dist 3, HCMC
country:        VN
admin-c:        HTV3-AP
tech-c:         HNT6-AP
status:         ALLOCATED PORTABLE
remarks:        send spam and abuse report to email@ods.vn
mnt-by:         MAINT-VN-VNNIC
mnt-lower:      MAINT-VN-VNNIC
mnt-irt:        IRT-VNNIC-AP
last-modified:  2010-12-29T01:48:01Z
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         email@vnnic.vn
abuse-mailbox:  email@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2017-11-08T09:40:06Z
source:         APNIC

person:         Hoang Ngoc Tuyen
nic-hdl:        HNT6-AP
e-mail:         email@ods.vn
address:        ODS-VN
phone:          +84-28-62888999
fax-no:         +84-28-39320299
country:        VN
mnt-by:         MAINT-VN-VNNIC
last-modified:  2018-01-04T08:44:16Z
source:         APNIC

person:         Huynh Trong Van
nic-hdl:        HTV3-AP
e-mail:         email@ods.vn
address:        ODS-VN
phone:          +84-28-62888999
fax-no:         +84-28-39320299
country:        VN
mnt-by:         MAINT-VN-VNNIC
last-modified:  2018-01-04T08:43:53Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.15-46 (WHOIS-US4)

Even though that web hosting company is vietnamese (https://www.ods.vn/default.aspx) , I guess you should be able to contact  them, since you would be engaging a law action against the scammer, and should be able to retrieve informations about the guy who bought that domain.

Even then, if this isn't the right person, and that website has actually been compromised by another person, as some persons might have stated it above, then ods.vn will be able to confirm that theory because of suspicious logs on their backend (because obviously they will have suspicious logs that aren't the ones of the owner)

Catether is an open source mineable ERC20 Token, powered by Cates.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!