Jump to content

bazenten

VIP
  • Content Count

    57
  • Joined

  • Last visited

Community Reputation

1 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. The cybercriminal group has gained access to the mobile devices of famous personalities using the method of swapping SIM cards. Europol has arrested 10 cybercriminals in the UK, Belgium and Malta on charges of hacking into the cell phones of celebrities, sports stars and musicians in order to steal personal information and millions of dollars in cryptocurrency. The cybercriminal group stole more than $ 100 million in cryptocurrency using the SIM-swapping technique. This technique involves deactivating the victim's mobile phone SIM card by deceiving the phone company or using a bribed insider so that the number can be transferred to another card under the control of criminals. After accessing the victims' phone numbers, attackers gained control of applications and accounts by requesting password reset codes sent in SMS messages. They were then able to steal cash, cryptocurrency, and personal information, including contacts. In addition, hackers controlled social media accounts, allowing them to post and send messages on behalf of victims. __________________
  2. The carding market ceased to exist, bringing its administrator billions of dollars in bitcoin. Joker's Stash, the most popular carding platform on the darknet, has ceased to exist once and for all. Last month, its administrator, known under the pseudonym JokerStash or simply Joker, announced that all operations would be phased out on February 15, 2021, and kept his word by retiring as a billionaire. At the time of its existence, Joker's Stash was the largest underground carding site. It not only allowed the sale of stolen bank card data, but also facilitated the laundering of illegally acquired cryptocurrency. Cybercriminals used stolen bank card details to buy gift certificates and other similar items and then sell them for cash. In January of this year, without explaining the reasons, the Joker's Stash administrator announced his intention to permanently close the site, turn off all servers and erase backups. According to the analytical company Elliptic, the site went to oflline a little earlier than the announced date - February 3. So, what kind of “pension” has JokerStash provided itself since the launch of the site in 2014? Elliptic estimates that $ 139 million in sales were made through Joker's Stash in 2018 alone. Revenues have plummeted recently due to improvements in payment card fraud detection technologies. However, from 2015 to 2021, more than $ 400 million passed through the site. The Joker's Stash site made money by charging fees for transferring bitcoins to the dollar balance, as well as fees for all trading in stolen cards. Although the commission rate cannot be accurately determined, Elliptic analysts based their calculations on an average of 20% - a percentage often used in carding transactions. “Assuming that the average total commission on sales was 20%, they would have received a total of at least 60,000 bitcoins with Bitcoin alone,” the analysts write. At the current exchange rate, 60k bitcoins is about $ 2.1 billion. __________________
  3. Always clear your flesh cookies. Vpn is not good for carding now as most of the ip of vpn have been blacklisted by Good shops. Always use socks5 which is live and not blacklisted. You should match the ip of same state and city. Always match the timezone of cc same state. Always try to type the details of cc as many site now have script to check copy paste of cc details as most of the time carders copy paste the details of cc. Actual owner always type all details. Get the maximum information of cc owner from background check sites there you can found DOB, MMN and sometimes SSN. Most of these sites are cardable with public cc. If you want to be a pro carder than stop using free email sites as yahoo, gmail, aol etc. Better solution is first card a domain and hosting and makea small site and then create a email of cc owner theirof the same name on cc. you can also use free domain orsub domain sites but carding your host & domain is better. While carding domain and hosting you should use Amex cc as there is less chances of chargeback. Check the cc live before using site not on checker as sometimes it kills cc. Find a most easy cardable site and make a bogus account and checkout for small amount like 2$ if it work then go to original site. Always study the site carefully which you want to card and its seller. Most of the time seller who sell refurnished Mobiles etc are in hurry to ship the item. So search them. When you card some big Items of a new account from site it is suspicious. So you can make new a new account and leave it for some months after that card small items and always give good feedback. But the better way is to buy old accounts of the site with good feedback. Always Use Skype ac with credit and call forwarding services. If you call the shop with the number of cc owner and ask customer care of site some help before filling cc details your chances of success or much higher. You should always use it if you want to card high value items. Always Use Trusted drop of same country if you are carding a international Site. Because shipping to another country is always suspicious. Always try to carding on Weekends as shops not able to contact and verify extra details from bank by calling them. You can also check closing time of bank and card after closing timing of bank. Always Send a Email instantly to seller after order complete to ship order fast as you need it urgent as there is some function in your house. Don't use a cc at Same Site from different Accounts.Use it at one account maximum 3-4 Times. One of my friend Using a new trick he calls from the mobile number of cc owner with skype to the cc issuing bank that he is going to shop some goods and they should make the approval fast. I don't know the full trick and working on it you should also find your ways. If you succeed to convince cc issuing bank that you are original cc owner than you will rock with high amount purchase. If you use the paypal in carding then buy paypal with email access and delete the order related emails from inbox and trash box of email.
  4. disclaimer! I AM NOT SELLING ANYTHING OR WANT ANYTHING FROM ANY MEMBER!!!!! And I hope I am within the posting guidelines. I WANT A PARTNER TO WORK ON LOANS TO Make $1000-$20,000 a day within 3-5hrs, yes you have heard correctly 1-22k in 3-5hrs. What is needed? ? Name: ? Dob (can’t be older than 50)? SSN? DL# (must be a real number)? Issuing state (must be accurate)? Account# (if it’s the official acc# then perfect if not FRESHLY OPENED ONES work fine *(FUNDS ARE NOT GOING IN THE ACCOUNT!!) NO CHIME, NO PREPAIDS Routing# (same rules apply for account number) FUNDS ARE NOT GOING TO DEPOSITED IN ANY ACCOUNT!!!!!!! ONCE AGAIN!!!!!! They need the account number and routing to make sure it's valid so the loan can be repaid. Loans are approved in 5min and this is quite possibly the easiest move I have ever seen or done. In comparison try to go work “dumps,” try to depositing “cheques” or go give some of these scammers money for “cashapp transfers” Telegram:@tubagetubage
  5. https://prochoicetech.com/ https://rigawalk.com/ https://www.nxtl3v3l.com/ https://cilursosa.shop/ https://sportiqe.com/ https://www.mydailyhobbies.com/ https://clutchbodyshop.com/
  6. 1. Buy a digital key from eBay can be steam, antivirus it doesn’t really matter 2. Open a dispute directly in eBay for the item you purchased 3. eBay does not allow the sale of digital items on their platform 4. You should win the dispute 100% of the time 5. Sometime ebay ask key is valid or not you need to say not work 6. use old ebay hacked or cracked account 7. Profit sell the key or redeem it for yourself!
  7. All the victims of the scammers were senior citizens with no technical knowledge. US authorities have indicted three suspects involved in a major fraudulent operation in which they impersonate technical support. FBI agents arrested one of the criminals' accomplices and turned him into an informant. Although the charges were brought in January of this year, the investigation into the group of attackers began in May 2019 when the FBI arrested an Indian citizen on fraud charges. According to court documents, the suspect agreed to cooperate with investigators and become an FBI informant. Two of the suspects owned call centers in India, while the third lived in the United States and acted as a money mule, receiving funds from victims into their US bank accounts and then transferring money to call center operators. The whistleblower explained that the first stage of the fraudulent scheme involves so-called “publishers” who create believable technical support websites showing fake error messages and pop-ups urging users to call a toll-free number. They also create advertisements on platforms like Facebook on a variety of topics, which ultimately redirect users to malicious sites. So-called “brokers” such as an informant acted as intermediaries between “publishers” and call centers. They operated telephone servers through which they sold “call traffic” to a call center operator or other “brokers”. One scam used technical support pages disguised as Microsoft security warnings. Alerts informed visitors that their system was allegedly infected with malware and they needed to call a phone number for more help from a Microsoft employee. According to the indictment, all the victims were senior citizens who lacked the technical skills to suspect deception. Employees of fraudulent call centers convince subscribers to download and install a version of the SupRemo desktop remote control software on their computers. The software allows operators to connect to the victim's computer and ostensibly solve an alleged "technical problem." At the end of the operation, victims are asked to pay for the technical assistance they received, usually via bank transfer or gift cards purchased from local stores. According to a recorded telephone conversation between an informant and one call center owner, fraudsters often asked victims to connect to their bank accounts while the operator still had access to their systems, allowing them to steal bank account credentials. __________________
  8. A Los Angeles federal court arrested Russian citizen Yegor Kryuchkov on charges of conspiring to commit cybercrime. This was reported by the press service of the US Department of Justice. "A Russian citizen was arrested on suspicion of conspiracy to introduce a malicious program into the computer network of a company from Nevada," the statement said. According to the agency, the 27-year-old Kryuchkov tried to bribe an employee of an unnamed American company based in Nevada from July 15 to August 22 this year. The statement claims that the Russian offered him $ 1 million for participating in the implementation of the fraudulent scheme. The Ministry of Justice reported that Kryuchkov allegedly planned to load malicious software (software) into the computer system of this company. This, the message says, would allow him and his associates to gain unhindered access to company data. Last week, Kryuchkov was contacted by the Federal Bureau of Investigation (FBI), after which he left the city of Reno (Nevada) and went to Los Angeles with the aim of leaving the United States. The Russian, according to the department, turned to his friend to buy him a plane ticket. Kryuchkov was detained in Los Angeles on August 22, after which he appeared before the District Court for the Central District of California. As noted by the Ministry of Justice, the Russian entered the United States on a tourist visa. The Russian Embassy in the United States reported that diplomats are aware of Kryuchkov's arrest. “In the near future we will contact the Russian to clarify the essence of the problem. We will provide him with the necessary consular and legal assistance, ”the diplomatic mission said. source: justice.gov/opa/pr/russian-national-arrested-conspiracy-introduce-malware-nevada-companys-computer-network
  9. Someone remembers how in the early 2000s Sergei Golubitsky on the pages of "Computerra" sandwiched the PayPal payment system for "the massive theft of money from customer accounts." The company was founded by Maximilian Levchin, an American millionaire, in a past life - a graduate of the Kiev special mathematical school, who traded in his youth under the hacker nickname Mad Russian (as well as Mad Max, Coffee, mumitroll, DELPH and Plumber - The Plumber). The genetic nature of business implies that the founder's personality leaves an indelible mark on the corporate culture. According to Golubitsky, who has lost $ 70 on his account, PayPal's corporate culture is saturated with disrespect for users. This does not mean Americans, but first of all Levchin's former compatriots - Russians and Ukrainians, in whom the company initially sees thieves and swindlers. There is no presumption of innocence in principle. Already in those years it was clear that PayPal should be used with great care, and it would be better to avoid it altogether. Otherwise, the office will simply block you without explaining the reasons, like thousands of other clients over the past twenty years. Unfortunately, we have seen this from our own experience. One "fine" day, our paypal account was blocked without explanation. We noticed this only after complaints from customers who could not make a payment using this method. Representatives of our financial department made several attempts to contact the support of the Russian office and only after a while we learned that the support did not know why the blockage occurred. They reported that this was a decision from the American office - and there is no further information on this. The employee seems to be happy to help, but cannot, because there is no explanation from those who directly initiated the blocking. Information appeared in our account that the cooperation is over and the funds will be withdrawn to us in 180 days. As a result, for an incomprehensible time we parted with the amount of 150 thousand rubles on the balance sheet (fortunately, funds were withdrawn regularly, the amount could be much larger). As a result, we spat on their inadequate actions and promptly replaced payment with foreign cards through Yandex.Checkout. The latter has an option - to enable payment from foreign cards, and there you can also connect Wechat payment for the Chinese, who previously made a lot of payments with us just through Paypal. PayPal doesn't trust you by default In the 2000s, the money in the accounts of PayPal users was frozen under the fictitious pretext of violating the client agreement, which did not allow CIS citizens to open accounts with PayPal. Restrictions still exist for citizens of Ukraine and Belarus. They are only allowed to use PayPal to send funds. One gets the impression that the company is gradually phasing out its activities in Russia. From August 1, 2020, she stopped internal transfers... The Russians will still be able to accept payments from abroad and make transfers abroad, but it is no longer possible to transfer money within the country. The company explained its decision by the fact that domestic transfers within Russia accounted for a small part of the total payments of Russian users. Profit from domestic operations accounted for only 4% of the total profit of the Russian division. In this way, some online stores accepted payments and collected donations. Now they have to use alternatives. For Russian users, the ability to accept payments to the account appeared in October 2011. In September 2013, it became possible to register corporate accounts and accept payments from bank cards with the withdrawal of funds received to an account with a Russian bank. But there is a possibility that Russians will soon be lowered to the humiliating status that is now assigned to Belarusians and Ukrainians. By allowing them to spend money, but prohibiting them from accepting funds, the company makes it clear that it still considers these people to be potential thieves and scammers. In other words, the system doesn't trust them by default. Russians should not flatter themselves, the attitude towards them is the same - PayPal will easily block your account and freeze money. The User Agreement User Agreement for PayPal Servicesthere is clause 1.3: "To open and maintain an account, you must provide true and up-to-date information," including identity documents (clause 1.3.b). In other words, if any information provided by you turns out to be inaccurate, inaccurate, inconsistent with the current state of affairs, or incomplete, the company has the right to refuse you to use PayPal services: Mass account blocking Sadly, little has changed since Golubitsky. PayPal continues to massively block the accounts of Russian-speaking users. To unblock, you need to send several documents to confirm the identity and address indicated in the registration data. At the same time, the requirements for documents are strict: it must be a utility bill or an agreement with a bank, where your name and surname exactly correspond to those specified during registration. On the forums they write that in the event of such a blocking, it is easier to forget and create another account. To restore the old chances are almost zero. And after blocking, you cannot immediately withdraw funds: this is possible only after the account is closed after 180 days. Remember that PayPal is not a financial institution from a legal point of view and therefore is not subject to government regulations that govern banks and financial institutions. This is just a commercial company that makes a profit in all available ways. The researchers explain that the root problem is that PayPal sees fraud not as a legal issue, but as a risk management issue . The anti-fraud system "Igor" developed by Levchin was namedin honor of one of the hackers who tricked her. The system is self-learning and actually works like a black box. Simply put, PayPal itself may not know why your account is blocked. Accordingly, the support service is unable to explain anything to you and cannot help you. The use of machine learning is really effective: thanks to Igor in 2015, PayPal's fraud rate was only 0.32% of turnover , which is significantly lower than 1.32% for all US retail. You can be happy about PayPal, but what should ordinary users do in such a situation? It is probably best not to keep significant amounts in your account and withdraw money as often as possible. We will have to accept that mass account blocking without explanation is the genetic nature of PayPal's business. __________________
  10. WISH 2020 FULL METHOD 1. First, we must clone Wish through App Cloner, activating the following options; Change Android ID, Change IMEI / IMSI, Hide SIM and carrier information, Change WI-FI MAC address. 2. We will clone and install the modified APK. 3. We proceed to create an account in the Wish app, we will use an email Gmail, Outlook, Yahoo, Hotmail, etc. 4. We look for what we want to buy, we proceed to add it to the cart. (TIP: To make it look like you are a real customer use coupons for discounts, we will use the code : CFBHVSTG) 5. Next, we put a false address, we add the live one, it is very important that the owner of the account put it. 6. We will proceed to the payment, it will give us the ruling of "We could not process your payment" if this is the case, we will simply click on the button to change payment method, we will select the same live and pay again. 7. You will give us the payment confirmation, Congratulations! Notes, Tricks and Tips; When giving the confirmation, if in the order details it is in: "It will be processed no later than the 20th day" it is a 100% ship. If it is in "Processing order" it is ban. (7) It should be noted that everything is done with data. In case we get the "EPA!" means IP ban, to solve it change IP. (6) To create the account, we can use the "." And the "+". To extract lives from the extrapolation, we will create an Amazon MX account, we will go to the "Payment methods" section from there we will add the generated CCs, from there we will try to buy Amazon Prime with the same associated cards until you test Amazon Prime, the card I give you the test with is the live card
  11. Even if you disable the activity tracking function in the web and applications in the settings, Google still monitors activity. Google captures user interactions with applications, even if they set their recommended settings, which should block this possibility. This was reported in a lawsuit filed against the company in the district court of the city of San Jose (California, USA) on Tuesday, July 14. This lawsuit is the second data privacy breach lawsuit filed against Google by law firm Boies Schiller Flexner on behalf of its customers for several months. In addition to Google, Facebook and Oracle are also indicated in the lawsuit, Reuters reports. According to the plaintiffs, by recording what a user is viewing in news, travel, and other applications, even if he has disabled the ability to track activity on the Web and in applications in his Google account settings, the company violates the U.S. federal law on wiretapping and California state law on consumer protection. According to the lawsuit, data collection is carried out through Google Firebase - a set of programs popular among developers for storing data, delivering notifications and advertising, tracking failures and counting clicks. Firebase runs inside applications seamlessly for users. “Even if the consumer follows the instructions of Google itself and disables the activity tracking function in the web and applications in the privacy settings, Google still continues to intercept information about the use of applications and the browser, as well as personal information,” the statement said. According to the plaintiffs, Google uses Firebase data to improve its products and personalize advertising and other content. In a lawsuit filed by Boies Schiller Flexner on behalf of users last month, the company is accused of secretly recording user activity in a browser even when incognito mode is turned on. Google has announced its intention to challenge the lawsuit. __________________
  12. Researchers at cybersecurity company ESET have identified malware masquerading as cryptocurrency trading applications and distributed among macOS users. twitter.com Attackers copied the interface of the Kattana trading platform. On the fake pages, they offered to download cryptocurrency trading applications that actually contained malware. “So far, it has not been possible to determine exactly how these trojanized applications are distributed. Probably, social engineering methods are applied to the victims: on the fake sites there is a download button with a link to the ZIP archive, which contains the trojanized application, ”the ESET press service said. Representatives of the platform warned of services imitating Kattana back in the spring. twitter.com The fraudulent applications worked under the brands Cointrazer, Cupatrade, Licatrade, Trezarus and contained the GMERA Trojan. At the same time, they fully supported trading functions, so it was difficult for users to recognize the fraud. After installing the applications, hackers gained access to user systems, personal data, location information, cryptocurrency wallets and take screenshots. Last year, Trend Micro researchers wrote about GMERA . Then the trojan spread under the guise of an application for investment in the stock market Stockfolio. ESET analyzed the operation of fraudulent applications using one of them, Licatrade. Apple revoked the certificate issued by Licatrade earlier, on the same day that the specialists reported the problem. Recall that in April, ESET specialists discovered a botnet for mining Monero, which infected at least 35 thousand devices. __________________
  13. As it became known, the cyber police along with investigators of the police of the Lviv region, under the procedural leadership of the local prosecutor’s office, stopped the illegal activities of the financial exchange, which illegally seized the money of depositors, the National Police said . “Organized a financial exchange in Lviv, a 28-year-old foreign citizen temporarily residing in Ukraine. To attract new investors, the man created a call center, whose employees spoke freely in Polish, English and Italian. This allowed attackers to attract not only Ukrainians, but also citizens of European countries to the financial exchange , ”law enforcement officials noted. Law enforcement officers found that the attackers suggested that people invest in financial transactions that were supposed to bring high profits. The amount of investment reached from € 300 to € 5 thousand. As a rule, only the first financial transactions were profitable. After investing large amounts of money, depositors were not returned. Law enforcement officers searched the location of the call center. Computer evidence, memory cards, hard drives, and accounting documents were seized as material evidence. Now a full circle of injured persons and the final amount of losses are being established. On this fact, criminal proceedings have been instituted under Part 3 of Article 190 of the Criminal Code of Ukraine. The sanction of the article provides for imprisonment of up to eight years. The investigation continues. cyberpolice gov ua __________________
  14. Diebold Nixdorf experts have warned of a new variation of the black box attacks on ATMs, which began to be used by attackers in Belgium. Black box attacks are a form of jackpotting attacks in which cybercriminals literally force an ATM to spit out money. Such an attack can be carried out using malware installed in an ATM, or using a black box. This term usually refers to a laptop or a device based on a single-board microcomputer, which is used to connect to the internal components of the ATM (for access to ports, wiring, etc. criminals usually disassemble the case or cut a hole in it). By connecting to the machine, the attackers simply give the ATM command to “release” cash from the cassettes in which they are stored. Diebold Nixdorf writes that so far, new attacks are being used only against ProCash 2050xe ATMs, to which cybercriminals connect via USB ports. The company explains: “During recent incidents, attackers have focused on street systems. They destroy parts of the bezel to gain physical access to the main compartment. They then disconnect the USB cable between the CMD-V4 dispenser and special electronics, or the cable between special electronics and the ATM computer. This cable connects to the black box of intruders to send cash withdrawal commands. ” But this in itself did not attract the attention of specialists. The fact is that attackers usually use malware or their own code to interact with ATM components, but now the hackers seem to have got hold of a copy of the legitimate ATM software (firmware), which they installed on the black box and used to interact with the machines. While the investigation of the incidents is still ongoing, but Diebold Nixdorf believes that hackers could connect to some ATM and find that its software was stored on an unencrypted hard drive. ZDNet Editioncites its own sources in the banking sector and reports that the warning published by the manufacturer is directly related to the investigation of a number of jackpotting attacks that occurred in Belgium in June-July 2020. These attacks (two cases of strange jackpotting) forced the Belgian bank Argenta to suspend the operation of 143 ATMs. Moreover, local media wrote that only Diebold Nixdorf devices were attacked. Telefonica's banking specialist, Manuel Pintag, told reporters that this method of hacking ATMs is not unique in general, although it had previously been encountered not in Europe but in Latin America. Source: xakep.ru __________________
  15. In some videos, the operator managed the created accounts. Security researchers from the IBM X-Force Incident Response Intelligence Services (IRIS) team during monitoring of the virtual cloud server of the Iranian cybercriminal group ITG18 (also known as APT35, Phosphorus, Charming Kitten and Ajax Security Team) found 40 GB of data, among which was stolen information hacked accounts and videos. Researchers were able to access the data due to the fact that hackers did not take care of the proper protection of their server by incorrectly configuring its settings. According to experts, some of the videos found are a training tool that the Iranian group used to train new recruits. The video was recorded using a screen recording application called BandiCam. Some videos showed how the operator managed the created accounts, while in others, he checked access and stole data from previously hacked accounts. Unsuccessful phishing attempts have also been recorded against the Iranian-American philanthropist and US Department of State officials. Specialists were able to identify and later notify some of the victims depicted in the video, including a US Navy soldier and a Greek Navy officer. In five video files with the names “AOL.avi”, “Aol Contact.avi”, “Gmail.avi”, “Yahoo.avi”, “Hotmail.avi” the operator uses the “Notepad” file containing one set of credentials for each platforms, and in each video, selects them for the respective websites. The video also demonstrates filtering various datasets associated with these platforms, including contacts, photos, and cloud storage. The operator also showed a change in the settings in the security section of each account and added them to Zimbra, a legitimate email collaboration platform that can combine multiple email accounts into one interface. With Zimbra, an operator could simultaneously monitor and manage various compromised email accounts. __________________ What is an "Automatic Guarantor Service"?
×
×
  • Create New...