@Dwmguarantor
Telegram communication!
You can also contact the guarantor in Telegram
-
Posts
475 -
Joined
-
Last visited
-
Days Won
2 -
Time Online
3д 7ч 12м 55с
Content Type
Profiles
Forums
Events
Blogs
Downloads
NFT
Videos
Everything posted by BOTNET
-
Monthly, it's necessary to pay for goods on online services through PayPal! Is there anyone on the forum who can do it? Or should I contact someone directly?
-
deepfake Deepfake Deception Decoded: The Ultimate Dark MoneyMaker Exposé
BOTNET replied to ESCROW SERVICE's topic in FARMING
While the concept of decoding deepfake deception sounds intriguing, it's essential to approach such claims with skepticism. Deepfake technology indeed poses significant challenges, particularly in the realm of misinformation and fraud.- 2 replies
-
- createdeepfake
- deepfakesweb
- (and 4 more)
-
Predicting the big bet for 2024 in the crypto market is challenging due to its volatile nature.
-
The Influence of Black Rock in the Global Economy
BOTNET replied to ESCROW SERVICE's topic in POLITIFI
BlackRock's influence in the global economy is undeniable, given its status as the world's largest asset manager. However, scrutiny is warranted regarding its power and potential impact on markets, considering its significant holdings and influence over corporate governance and policy decisions. -
Exploring Jamie Dimon's Views on Bitcoin and Cryptocurrency
BOTNET replied to ESCROW SERVICE's topic in POLITIFI
It's worth considering Jamie Dimon's skepticism toward Bitcoin and cryptocurrency. While his insights are valuable, it's crucial to approach them with a critical mindset, considering his position as a traditional finance figure. -
Understanding the World of Drain: Exploring the Music and Subculture
BOTNET replied to ESCROW SERVICE's topic in FARMING
I'm not entirely convinced about delving deep into the world of drain. Seems like a niche interest with limited appeal. -
Last Month, Crypto Scammers Pilfered $47M from 57,000 Victims
BOTNET replied to ESCROW SERVICE's topic in POLITIFI
these hackers, you can't hide from them anywhere ? -
Table of Contents Introduction The Exploitation of Increase Allowance Demonstration of a Scam Website Protecting Yourself from Wallet Trainer Scams Conclusion FAQ Introduction Welcome to my YouTube channel, where we discuss important topics related to wallet trainers and their new training method. In previous videos, we talked about the approve function and how MetaMask fixed the issue of hackers manipulating users into approving them to withdraw their money. However, hackers have now found a new way to exploit wallets using the increase allowance method, which MetaMask has not yet fixed. This method works similarly to the approve function, but instead of changing the approval amount, it allows the hacker to withdraw any amount they want. On Twitter, you may come across websites that claim to offer training services for wallets. These websites can be dangerous and drain your money regardless of the network you're on. They may even ask you to switch networks to trick you into approving their withdrawals. For example, one website called "Friends Tech" tricks users into thinking they are claiming rewards, but in reality, they are approving the hacker to withdraw their entire Ethereum balance. It's crucial to be cautious and avoid visiting unknown websites or claiming any airdrops, as they may be part of the hacker's scheme. Stay safe, and remember not to fall for these scams. Thank you for watching, and I'll see you in the next video! The Exploitation of Increase Allowance The increase allowance function, similar to the approve function, is a method that hackers are exploiting to withdraw funds from users' wallets. While MetaMask has fixed the issue with the approve function, they have yet to address the vulnerability with increase allowance. When using increase allowance, instead of changing the approval amount, the hacker is able to withdraw any desired amount from the user's wallet. This allows them to drain users' funds without their consent. One method employed by hackers is through websites found on Twitter, offering wallet training services. These websites can be highly dangerous, regardless of the network you are on. They may even trick users into switching networks to approve their withdrawals. For instance, a website called "Friends Tech" deceives users into believing they are claiming rewards. In reality, by clicking on the claim button, users unknowingly approve the hacker to withdraw their entire Ethereum balance. It is crucial to exercise caution and refrain from visiting unknown websites or falling for airdrop schemes, as they may be part of the hackers' ploy. The failure of MetaMask to address the increase allowance vulnerability poses potential risks and consequences for users. By not rectifying this issue, users' funds remain susceptible to being drained by malicious actors. Therefore, it is imperative for MetaMask to take immediate action to fix the increase allowance vulnerability and protect users from these exploitative practices. Demonstration of a Scam Website Scammers have been exploiting the increase allowance method to deceive users and drain their funds. One example of a scam website that can be found on Twitter is "Friends Tech". This website tricks users into believing that they are claiming rewards, but in reality, by clicking on the claim button, users unknowingly approve the hacker to withdraw their entire Ethereum balance. These scam websites employ deceptive tactics to trick users into falling for their schemes. One such tactic is switching networks. They may ask users to switch networks to approve their withdrawals, making it seem like a legitimate process. However, this is just a ploy to deceive users into giving the hacker access to their funds. Another deceptive aspect of these scam websites is the use of the claim rewards function. This name gives the impression that users are receiving rewards, when in fact, they are authorizing the hacker to withdraw their funds. It's important for users to be aware of these deceptive names and not fall for the illusion of receiving rewards. Visiting and interacting with these scam websites can result in significant risks and potential loss for users. By approving the hacker's withdrawal requests, users may find their entire balance drained from their wallets. It's crucial to exercise caution and refrain from visiting unknown websites or claiming any airdrops, as they may be part of these hackers' schemes. Protecting yourself from these scams is essential. Avoid clicking on suspicious links found on Twitter or any other platform. Be skeptical of any claims or rewards that require you to approve transactions or switch networks. By staying vigilant and informed, you can safeguard your funds and avoid falling victim to these scam websites. Protecting Yourself from Wallet Trainer Scams When it comes to wallet trainer scams, it is crucial to prioritize your safety and exercise caution. Here are some important tips to protect yourself from falling victim to these scams: Avoid unknown websites and suspicious links: One of the main ways scammers exploit users is through websites that claim to offer wallet training services. It is important to refrain from visiting these unknown websites and avoid clicking on any suspicious links. Beware of trending hashtags on Twitter: Scammers often use bots to promote their hacking websites and make them trend on Twitter. Be skeptical of any trending hashtags related to wallet trainers and avoid clicking on them. Stay cautious of unknown airdrops: Scammers may entice users with the promise of claiming rewards through airdrops. However, these airdrops are often part of the hacker's scheme to gain access to your funds. Do not claim any airdrops from unknown sources. Be aware of deceptive tactics: Scammers may employ deceptive tactics to trick users into approving their withdrawals. This can include switching networks or using names like "claim rewards" to make it seem legitimate. Stay vigilant and do not fall for these deceptive tactics. It is important to remember that these scams can drain your money regardless of the network you are on. By staying safe, cautious, and informed, you can protect yourself from wallet trainer scams and safeguard your funds. Do not hesitate to report any suspicious websites or activities to the appropriate authorities. Conclusion As we conclude our discussion on wallet trainer scams, it is crucial to reiterate the importance of safety and caution. Protecting yourself from these scams should be a top priority. Avoid visiting unknown websites, especially those claiming to offer wallet training services. These websites can be highly dangerous and drain your funds regardless of the network you are on. It is essential to be aware of the risks associated with wallet trainer scams, particularly the exploitation of the increase allowance method. Hackers can use this method to withdraw any desired amount from your wallet without your consent. We would like to thank you for watching and for your commitment to staying informed about these important topics. Your vigilance in protecting your funds is commendable. In our next video, we will discuss additional strategies to safeguard your wallets and avoid falling victim to scams. Stay tuned for more valuable insights and practical tips. FAQ What is increase allowance and how does it differ from the approve function? Increase allowance is a method that hackers are exploiting to withdraw funds from users' wallets. It works similarly to the approve function but allows the hacker to withdraw any desired amount from the user's wallet, whereas the approve function only changes the approval amount. How can users protect themselves from wallet trainer scams? To protect themselves from wallet trainer scams, users should avoid visiting unknown websites and clicking on suspicious links. It's important to be skeptical of trending hashtags on Twitter related to wallet trainers and to exercise caution when claiming rewards or airdrops from unknown sources. Are all websites found on Twitter dangerous? No, not all websites found on Twitter are dangerous. However, users should be cautious when visiting websites claiming to offer wallet training services. These websites can be highly dangerous and may drain your funds regardless of the network you are on. What are the consequences of claiming unknown airdrops? Claiming unknown airdrops can have serious consequences. Scammers may use airdrops as part of their scheme to gain access to your funds. By claiming these airdrops, users unknowingly approve the hacker to withdraw their funds, potentially resulting in significant financial loss. Is MetaMask aware of the increase allowance vulnerability? Yes, MetaMask is aware of the increase allowance vulnerability. However, as of now, they have not yet fixed this issue. It is important for MetaMask to take immediate action to address the vulnerability and protect users from these exploitative practices.
-
FAQs Here are some frequently asked questions about staying safe on the Salana blockchain: Is it safe to use a website after clicking on a suspicious link? Generally, it is not recommended to use a website after clicking on a suspicious link. Suspicious links can lead to scam websites that may compromise your wallet security and digital assets. It's best to exercise caution and verify the legitimacy of websites before proceeding with any transactions. How to identify potential risks in a transaction? To identify potential risks in a transaction, carefully review the transaction details, including the recipient address and the actions being performed. Look out for any unusual or suspicious activity, such as unexpected token transfers or requests for excessive permissions. Trust your instincts and be vigilant in checking transactions for potential scams or fraudulent activities. Addressing the normalcy of scams during mem coin season During mem coin season, scams are more prevalent as scammers take advantage of the hype and excitement surrounding meme coins. It's important to exercise caution and do thorough research before engaging with any meme coin projects. Be skeptical of offers that seem too good to be true and prioritize wallet security. Tips for staying safe and having fun in the decentralized space Here are some tips for staying safe and having fun in the decentralized space: Use separate wallets for different purposes to minimize the risk of exposing all your assets. Create a burner wallet with minimal funds for testing suspicious websites. Consider donating a small amount to a suspicious website before connecting a trusted wallet. Stay informed about current market trends and developments to identify potential scams. Regularly review and update your security measures to stay ahead of potential risks and vulnerabilities. Utilize reputable staking platforms and consider using hardware wallets for additional security. Check transactions for potential risks and be cautious of websites with poor branding or unusual transaction processes. By following these tips, you can navigate the decentralized space safely and protect your digital assets on the Salana blockchain.
-
Table of Contents Introduction Identifying Scam Websites Navigating Scam Websites Preventing Token Loss Best Practices for Wallet Security FAQs Introduction The Salana blockchain is a decentralized platform that allows users to securely transact and interact with various applications and tokens. As with any blockchain, it is important to prioritize wallet security to protect your assets from potential scams and fraudulent activities. Recently, there have been incidents of scams on the Salana blockchain, highlighting the need for increased vigilance and awareness. One such incident involved the breach of the Twitter account for the NFT marketplace, Sniper. Another incident affected the original Chuni website, which was temporarily restricted due to a scam link being posted. To help users identify and navigate these scams, Wallet Guard has published a post providing valuable insights and guidance. This post emphasizes the importance of verifying the legitimacy of websites and offers tips on how to identify potential scams. By understanding the overview of the Salana blockchain, prioritizing wallet security, and staying informed about recent incidents, users can better protect themselves from falling victim to scams and safeguard their digital assets. Identifying Scam Websites When it comes to staying safe on the Salana blockchain, it is crucial to be able to identify scam websites. By recognizing the warning signs, you can protect yourself and your digital assets from potential scams and fraudulent activities. Phantom Wallet's Lack of Pure Simulation as a Warning Sign One of the key indicators of a scam website is the lack of pure simulation in Phantom Wallet. Legitimate websites should display a pure simulation of the transaction, providing users with a secure and seamless experience. If a website you visit does not show this simulation, it is likely a warning sign that something is not right, and you should proceed with caution. Examples of Scam Incidents on the Salana Blockchain There have been instances of scams on the Salana blockchain, such as the recent incidents involving Sniper and Chuny. Sniper, an NFT marketplace, had its Twitter account breached, while the original Chuny website was temporarily restricted due to a scam link being posted. These incidents highlight the importance of exercising vigilance and being aware of potential scams. How Scammers Breach Social Media Accounts to Promote Scams Scammers often target social media accounts to promote their fraudulent activities. By breaching legitimate accounts, scammers gain credibility and reach a wider audience. It is essential to be cautious of suspicious links or offers shared on social media platforms, especially if they involve financial transactions or investments. The Role of Browser Extensions like NoScript Browser extensions like NoScript can play a significant role in preventing scams. NoScript prevents JavaScript from running in the browser, effectively blocking potentially malicious scripts or codes that scammers may use to exploit vulnerabilities. By installing and utilizing browser extensions like NoScript, you can add an extra layer of protection to your browsing experience. By staying informed about the warning signs of scam websites, such as the lack of pure simulation in Phantom Wallet, being aware of past scam incidents on the Salana blockchain, and understanding how scammers breach social media accounts, you can better navigate the blockchain ecosystem and protect yourself from falling victim to scams. Additionally, utilizing browser extensions like NoScript can further enhance your security measures and mitigate potential risks. Navigating Scam Websites When using the Salana blockchain, it is important to be cautious of scam websites to protect your digital assets. Here are some strategies to navigate scam websites effectively: The Importance of Using Separate Wallets for Different Purposes One way to stay safe is by using separate wallets for different purposes. By doing so, you can minimize the risk of exposing all your assets if you encounter a scam website. For example, you can have a main wallet for long-term holdings, a separate wallet for trading or participating in DeFi, and a burner wallet for testing. Creating a Burner Wallet with Minimal Funds for Testing Creating a burner wallet with minimal funds is a useful strategy when testing suspicious websites. By having a wallet with a small amount of cryptocurrency, you can minimize potential losses if the website turns out to be a scam. This way, you can test the website's functionality and verify its legitimacy before connecting a trusted wallet. Donating a Small Amount to a Suspicious Website Before Connecting a Trusted Wallet If you come across a website that appears suspicious but you're unsure of its legitimacy, consider donating a small amount of cryptocurrency before connecting a trusted wallet. By doing this, you can assess if the website is trustworthy and if your donation is processed correctly. If any issues arise, you can avoid connecting your trusted wallet and protect your funds. Demonstration of a Scam Website and Potential Risks Let's take a look at an example of a scam website and the potential risks involved. In the video, a scam website with poor branding is shown. It prompts the user to connect their wallet and attempts to initiate a transaction. However, the user encounters errors and is unable to confirm the transaction, indicating that something suspicious is happening. This example highlights the importance of staying cautious and being aware of warning signs such as poor website design, unusual transaction processes, and errors during the transaction confirmation. It's crucial to trust your instincts and avoid connecting your trusted wallet to suspicious websites. Remember, by using separate wallets, creating a burner wallet for testing, donating a small amount before connecting a trusted wallet, and being aware of potential risks, you can navigate scam websites more securely and protect your digital assets on the Salana blockchain. Preventing Token Loss When using the Salana blockchain, it is crucial to take steps to prevent token loss and protect your digital assets. By understanding the concept of delegation and its potential risks, using tools like Famous Foxes to revoke approvals and protect tokens, and educating yourself on the importance of checking transactions for potential risks, you can enhance your wallet security and mitigate the chances of falling victim to scams. Understanding the Concept of Delegation and Its Potential Risks Delegation is a common practice on blockchains like Salana, where users grant certain permissions to other addresses to perform actions on their behalf. While delegation can be useful, it also comes with risks. Scammers can exploit delegated permissions to gain unauthorized access to your tokens and carry out fraudulent transactions. It is essential to be cautious when granting delegation permissions and only delegate to trusted and verified addresses. Using Tools like Famous Foxes to Revoke Approvals and Protect Tokens To prevent token loss and protect your assets, you can rely on tools like Famous Foxes. Famous Foxes provides a revoking function that allows you to revoke any approvals you have granted to other addresses. By regularly reviewing and revoking unnecessary approvals, you can reduce the risk of unauthorized token transfers and ensure that only trusted addresses have access to your tokens. Explaining the Transaction in the Demonstration and Its Lack of Delegation In the demonstration, a scam website attempted to initiate a transaction without the user's consent. However, it is important to note that this particular transaction did not involve delegation of permissions. Instead, it relied on deceptive tactics to trick users into approving the transaction. Nevertheless, it serves as a reminder to exercise caution and verify the legitimacy of websites before engaging in any transactions. Educating Users on the Importance of Checking Transactions for Potential Risks As a user of the Salana blockchain, it is crucial to develop a habit of checking transactions for potential risks. Carefully review transaction details, including the recipient address and the actions being performed. Look out for any unusual or suspicious activity, such as unexpected token transfers or requests for excessive permissions. By being vigilant and proactive in checking transactions, you can detect and prevent potential scams or fraudulent activities. By understanding the concept of delegation and its risks, using tools like Famous Foxes to revoke approvals, explaining the transaction in the demonstration, and educating yourself on the importance of checking transactions, you can take proactive measures to prevent token loss and protect your digital assets on the Salana blockchain. Stay informed, stay cautious, and prioritize wallet security to navigate the blockchain ecosystem safely. Best Practices for Wallet Security Ensuring the security of your wallet is crucial when navigating the Salana blockchain. By following these best practices, you can protect your assets from potential scams and fraudulent activities: Stay Updated on Current Market Trends Keeping yourself informed about the latest market trends is essential for identifying potential scams. Stay up to date with news and developments in the Salana blockchain community to better understand the risks and protect yourself from fraudulent activities. Use Burner Wallets for Initial Interactions with New Websites When interacting with new websites or platforms, consider using a burner wallet for the initial transactions. A burner wallet is a separate wallet with a minimal amount of cryptocurrency that you can use for testing purposes. By using a burner wallet, you can minimize potential losses if the website turns out to be a scam. Split Assets into Different Wallets for Added Security To enhance security, consider splitting your assets into different wallets for different purposes. For example, you can have a main wallet for long-term holdings, a separate wallet for trading or participating in DeFi, and a burner wallet for testing. By separating your assets, you can minimize the risk of exposing all your assets if you encounter a scam website. Recommendations for Staking and Securing Assets on the Salana Blockchain When staking and securing your assets on the Salana blockchain, consider the following recommendations: Utilize reputable staking platforms such as Jeto, Blaze, or Marinade for staking your assets. Consider using a hardware wallet, such as a Ledger, for storing and securing your assets. Regularly review and update your security measures to stay ahead of potential risks and vulnerabilities. By following these best practices, you can enhance the security of your wallet and protect your assets on the Salana blockchain.
-
Table of Contents Introduction Recognizing the Scam Protecting Yourself Reporting Scam Websites Conclusion FAQ Introduction Scam friend requests on Discord can be a serious threat to your online safety. Understanding how these scams work is crucial in protecting yourself from falling victim to them. In this section, we will delve into the details of scam friend requests on Discord, the tactics scammers use, and the importance of internet safety. Explanation of Scam Friend Requests on Discord Scammers often send friend requests from random accounts on Discord, enticing unsuspecting users to engage with them. These accounts may seem legitimate at first glance, but they are designed to trick users into revealing their personal information or falling for a scam. How the Scam Works The scam starts when the user receives a friend request from a suspicious account. The scammer may have enticing offers, such as promising large sums of money or exclusive rewards. They may also ask the user to visit a specific website or provide their account credentials. Overview of the Transcript In the transcript, the narrator shares their experience with a scam friend request on Discord. They walk through the steps they took to investigate the scam and highlight the red flags that indicated the website was fraudulent. The transcript serves as a cautionary tale and provides valuable insights into the world of online scams. Importance of Internet Safety Internet safety should be a top priority for every user. Scammers are constantly evolving their techniques, making it crucial for individuals to stay informed and vigilant. By understanding the tactics employed by scammers and taking proactive measures to protect personal information, users can safeguard themselves against potential harm. Recognizing the Scam When it comes to scam friend requests on Discord, it's important to be able to recognize the warning signs and protect yourself from falling victim to them. Here are some key points to keep in mind: Warning signs of scam friend requests Accounts from random users that you don't recognize. Offers that seem too good to be true, such as promises of large sums of money or exclusive rewards. Requests to visit specific websites or provide personal information. How scammers try to gain access to personal information Scammers often use various tactics to trick users into revealing their personal information. These can include: Creating fake accounts that appear legitimate. Promoting websites or services that claim to offer rewards or benefits. Asking for account credentials or sensitive information. Examples of red flags in the transcript In the video transcript, the narrator shares their experience with a scam friend request and highlights several red flags that indicate the website is fraudulent. These include: The use of suspicious URLs and website names. Promotion of browser extensions and services that claim to keep users safe. Inconsistent and unprofessional content on the website. The importance of being cautious It's crucial to approach friend requests on Discord with caution and be skeptical of any offers that seem too good to be true. Here are some tips to stay safe: Limit friend requests to trusted users and turn off friend requests from unknown accounts. Avoid clicking on suspicious links or providing personal information to unknown individuals. Report scam friend requests and malicious websites to platforms like Google Safe Browsing and Microsoft Security Intelligence. Stay informed about the latest scams and tactics used by scammers. By being vigilant and taking proactive measures to protect your personal information, you can reduce the risk of falling victim to scam friend requests on Discord. Protecting Yourself When it comes to scam friend requests on Discord, it's important to take proactive measures to protect yourself and ensure your online safety. Here are some steps you can take: Adjusting Discord settings to block friend requests One of the first things you can do is adjust your Discord settings to block friend requests from unknown accounts. By limiting friend requests to trusted users, you can reduce the risk of falling victim to scams. Step-by-step guide to disabling friend requests If you're unsure how to disable friend requests on Discord, follow these simple steps: Open Discord and click on the gear icon in the bottom-left corner to access User Settings. In the User Settings menu, click on "Privacy & Safety" on the left side. Under the "Who Can Friend Request You" section, select "No one" or choose "Friends of Friends" if you still want to receive requests from mutual friends. Save your settings and exit the User Settings menu. Limiting friend requests from servers and friends of friends In addition to blocking friend requests from unknown accounts, you can also limit friend requests from servers and friends of friends. This extra layer of protection can help filter out potential scams and keep your Discord interactions safer. Ensuring safety on Discord While adjusting your settings can help protect you from scam friend requests, it's important to remain vigilant and practice online safety. Here are some additional tips: Avoid clicking on suspicious links or providing personal information to unknown individuals. If you receive a friend request from a suspicious account, report it to Discord immediately. Stay informed about the latest scams and tactics used by scammers to better protect yourself. Consider using antivirus software and keeping it up to date to prevent malware and phishing attempts. Regularly review your privacy settings and adjust them as needed to maintain your online safety. By taking these steps and staying cautious, you can significantly reduce the risk of falling victim to scam friend requests on Discord and ensure a safer online experience. Reporting Scam Websites Reporting scam websites is of utmost importance in the fight against online scams. By reporting these malicious websites, you not only protect yourself but also help prevent others from falling victim to these scams. One platform that can assist you in reporting scam websites is Fish dot Report. Introducing Fish dot Report Fish dot Report is a website that specializes in the analysis and reporting of phishing URLs. It provides a simple and efficient process for reporting malicious websites, allowing users to contribute to the eradication of scams on the internet. How to Report Malicious Websites Using Fish dot Report Reporting a scam website using Fish dot Report is straightforward. Follow these steps to report a malicious website: Copy the URL of the suspicious website. Visit Fish dot Report and paste the URL into the provided field. Click on the "Analyze" button to initiate the analysis process. Create an account on Fish dot Report (if required) to complete the reporting process. Follow the instructions provided by Fish dot Report to report the website to Microsoft Security Intelligence and Google Safe Browsing. The Impact of Reporting Scams Reporting scam websites has a significant impact on preventing others from falling victim to online scams. When you report a scam website, it helps platforms like Google Safe Browsing and Microsoft Security Intelligence identify and block these websites, protecting users from their malicious activities. By reporting scams, you contribute to the overall safety of the online community. Your actions help raise awareness about these scams, enable authorities to take legal action against scammers, and reduce the number of individuals who fall prey to fraudulent schemes. Remember, every report counts in the fight against online scams. By taking the time to report scam websites through Fish dot Report, you play a crucial role in making the internet a safer place for everyone. Conclusion Internet safety is of utmost significance in today's digital world. Scam friend requests on Discord are just one example of the potential threats that users may encounter. It is crucial to stay vigilant and protect yourself from falling victim to these scams. By understanding how these scams work and recognizing the warning signs, you can better protect yourself online. Remember to be cautious when receiving friend requests from unknown accounts and to be skeptical of offers that seem too good to be true. Falling for scams can have serious consequences, including the loss of personal information and financial assets. It's essential to realize that scammers are constantly evolving their techniques and finding new ways to deceive users. Your safety is important, and taking proactive measures to protect yourself is crucial. By following the tips mentioned in this blog, such as adjusting your Discord settings, limiting friend requests, and staying informed about the latest scams, you can minimize the risk of falling victim to scam friend requests on Discord. Remember, your online safety is our priority. Stay vigilant, be cautious, and always report any suspicious friend requests or malicious websites. Together, we can create a safer online environment for everyone. FAQ Here are some frequently asked questions about scam friend requests on Discord: What are scam friend requests on Discord? Scam friend requests on Discord are when scammers send random friend requests, often from fake or suspicious accounts, in an attempt to deceive users into revealing personal information or falling for a scam. How can I recognize a scam friend request? There are several warning signs that can help you recognize a scam friend request on Discord. These include receiving a request from an unknown user, offers that seem too good to be true, and requests to visit specific websites or provide personal information. What steps should I take to protect myself? To protect yourself from scam friend requests on Discord, you can take several proactive measures. Limit friend requests to trusted users, avoid clicking on suspicious links or providing personal information to unknown individuals, and report scam friend requests and malicious websites to platforms like Google Safe Browsing and Microsoft Security Intelligence. Why is reporting scam websites important? Reporting scam websites is crucial in the fight against online scams. By reporting these malicious websites, you not only protect yourself but also help prevent others from falling victim to these scams. Platforms like Fish dot Report specialize in the analysis and reporting of phishing URLs, providing a simple and efficient process for reporting these websites.
-
earn money Earn money by communicating and advertising on the forum
BOTNET replied to ESCROW SERVICE's topic in DISCUSSIUNS
Is there anything else I can do? -
Hacked Telegram and transferred access to the accounts through the app. Happy with everything. I recommend this seller.
-
Sure, bro, message me privately. It won't be cheap
-
Hey bro, it's best to either buy or create a bot on Eve, if you need help, hit me up.
-
The botnet is always taken on a serious note. It's never worth setting up a botnet if you don't know why you need it. Of course, you might argue that you'll figure it out eventually, because there will be bank accounts, payment details, cards, and much more, which can always be used. But the truth is that a botnet requires daily financial injections (we'll talk about them below), and every day of inactivity results in financial losses and eventually the collapse of the entire botnet. So, before starting to organize a botnet, save money and buy accounts with logs. It may be a bit more expensive, but it will save you a lot of time and money. Let's say it's PayPal + VNC. You found someone who can pour money into your account, bought some accounts, successfully drained them, and decided to set up a botnet with the money you earned, so you wouldn't have to rely on the seller anymore. But don't rush, find 3-5 sellers and buy these accounts from them, check their effectiveness, calculate what data you need for successful pouring. Perhaps it's worth attaching some kind of inject to increase the success rate of the pours. Structure all this information, it will come in handy later. And only when you're sure that these accounts bring you the desired income - then you can think about setting up a botnet. Finances As I mentioned above, a botnet eats up money every day, so calculate everything, multiply it by 2, and you can start organizing it. But besides money, a botnet consumes a lot of time, and even if you're willing to dedicate 16 hours a day to it, it won't be enough. Because a botnet is a whole system, you depend on many people (crypters, trafficers, hosters, coders, etc.), they all have different schedules, and it's not always possible to catch up with everyone in one day, so often in one day you'll only accomplish 20-30% of what you planned. In connection with this, calculate in advance how much money you need for a normal life per month, you need to set aside this amount in advance, because in the first month you will only suffer and work on the botnet, so you probably won't have time to do other work, but you still need to live on something. Here's an approximate list of expenses that await you: Trojan - buying a trojan, always look for several options, despite even the praising reviews, always keep several options. Crypt - here it's better to find 3-4 people right away, with different time zones, who will ultimately be online for you 24/7. Don't rush to subscribe, because you won't need it for the first couple of months - there won't be stable work. Stability will appear in 2-4 months of owning the botnet. Trafficers - here it's also better to have 2-3-5 people, because traffic streams are often occupied, and downtime means loss of money and time. Exploits - now (at the time of writing the article) it's very difficult with this, but it's still better to find a couple of people. For the first time, it's always better to rent daily, because you won't be able to buy up stable traffic streams, and unnecessary spending won't do you any good. Servers (hoster) - it all depends on the trojan itself, what it needs, and on reliability. It's not worth looking for the cheapest one, it's worth looking for those who have been in the business the longest and are the most stable. It's better to overpay a couple of hundred, than to be surprised later why the server is down, and you're losing money. These are the main parameters and items of expenditure that await you. Now I'll try to give you some advice that you should consider before buying everything. Firstly, since you bought accounts with logs, and if you followed my advice and bought accounts from several sellers, start with those sellers. Find out where they are hosted, where they get traffic from, what kind of trojans they use, and so on. Any information is useful. Start compiling lists, reading reviews on forums, and monitoring the market. On average, it takes about a week or so until you gather everything into one decent list. Don't rush to buy everything, just study for now, ask around, and inquire about things. For example, from traffic sellers - inquire about traffic streams, traffic origin, minimum volumes, and so on. Here's a little life hack while you're gathering everything: keep an eye on your Contact List to see when the people you've added are online. Of course, you can just ask the person directly, but they might say one thing while in reality, they might be dealing with personal issues like a sick relative, etc., so they might not be online as promised. By just observing, you can draw conclusions. Secondly, when you've gathered everything, you're eager to start. But don't rush. As a second step, when you've collected contacts of all the mentioned above, found several trojans, etc., you should think about additional monetization. Ideally, find a partner in the same country you operate in. For example, find someone who can handle banking accounts. Discuss what data they need, etc. Always have a backup plan in case your main theme fails. If you have multiple partners, even better. Thirdly, so now you've found everything and are ready to buy, but again, don't rush. Now you face the most tedious stage that everyone forgets about. Remember I wrote earlier that you need to multiply all expenses by 2? Here's why: Before buying, start testing trojans. For example, you've chosen a list of 3 trojans, now you need to decide which one suits you best. What to test? Here's a brief list from me: Operation on all OS. Test how the trojan behaves and operates on XP, Win2003, Win7, Win8, Win10. Check its behavior on x32 and x64 systems. If the trojan doesn't work on virtual machines - buy dedicated servers. If it doesn't work on dedicated servers (yes, such cases exist) - buy a laptop and test it there. Browser operation. Again, test how it behaves on all browsers on all OS. Yes, it's a hassle, but it's better to do everything 'on the shore' than to invest money and then be disappointed. And don't rely on reviews and assurances from the author, you need to test it yourself. Testing all modules. If there's VNC, test it, also on all OS. If there's data grabber from some software, install that software and check. Testing will take approximately a week per trojan (and I told you to set aside money for a month of life, as these tests consume a lot of time). If you have a partner, let them test too, but not instead of you, but parallelly. Two heads are better than one. They might notice some bugs that you missed. It wouldn't hurt to contact the customers of the 'creature' you're testing and talk to them about any bugs they noticed, any nuances. After you've tested everything, move on to the second stage of testing. Second stage: If the 'creature' works confidently and meets all the stated points - it's definitely worth putting it through real traffic and real crypto. So pay for a bundle for a day, buy crypto .exe (after buying crypto, be sure to test if the trojan reports back, and then install it for loading). This will test both crypters and traffic sellers. What do we test? Reporting back! Many buyers of a trojan think that if a bundle has a 10% hit rate, then if they push 100k of traffic to it, they'll get 10k downloads The reality, however, is that on average, a trojan reports back only in 35-50% of cases. So, with 100k traffic and a 10% hit rate, you'll get a maximum of 5k bots, which is actually a very good number. By checking the reporting back in advance, you can forecast what awaits you in the future and estimate the number of bots you can expect. Also, test for the longevity; don't rush to spend money on the trojan until you see how many bots are still reporting back after 72 hours. This is important because even with good reporting back, the longevity of bots can turn out to be unreliable. So, you'll have to test each 'creature', and since you'll often have to pay not only for traffic but also for crypters, and most importantly - for the server where the test version of the 'creature' will reside - the money will be spent rapidly. But after a month of testing, you'll have an idea of what to expect. Some advice/tips: If the author of the 'creature' refuses tests and refers to reviews, send them away. Reviews mean nothing until you've tested it yourself. The average reporting back rate today is 35-40%; anything above this is a genuinely good result. Don't rush to buy a 'mega-private' product for mega-money, even if it's recommended by a reputable person. All products that would suit 90% of your needs are sold on forums. If you need something specific, it can be developed from scratch. Always test after crypting, even if the person has crypted for you 10-20-30 times already. One mistake from them, and you lose a lot of money. Ready Botnet So, tests are done, the right trojan is found, servers are paid for, loads are trickling in, but it's still not that fantastic. Now, I'll tell you about a few more nuances you'll encounter. Fresh logs. When you buy accounts from a seller, of course, you ask for inactive accounts so that the holder hasn't had a chance to notice anything. In the case of your botnet, all accounts will be active since they've just arrived in the logs. Definitely consider this, and if inactive accounts are important to you, it's better to continue buying them separately rather than relying on the botnet. Injects. I've encountered cases where newcomers want to buy a bunch of injects for literally everything right away. Is there an inject for eBay? Great, let's use it! And who cares if eBay is not needed at all. Remember that apart from the fact that each inject needs to be tested many times before putting it into the botnet, you also need to keep an eye on them. Incorrect inject behavior can kill many bots. So, only use the injects you really need. And always (at least once a week) test them on virtual machines/dedicated servers to ensure they always work as intended. Selling accounts from the botnet. It's not uncommon for two partners to build a botnet, and one of them, out of boredom or needing money 'for beer', starts selling accounts with logs on forums. They might think, 'We have plenty of logs anyway, and 80% of the accounts we don't use, so why not sell them and use the money for traffic.' While this logic has its place, consider that you might sell a Wells Fargo account from logs, while on the same bot, there could be a fat PayPal account that you're using. If the buyer starts messing around with the Wells account, the holder might realize it's compromised, change passwords everywhere, or change the system altogether, and then it's all gone! The bot dies! You earned $5 from selling the account, but you lost an account from which you could have earned $500. So, if you decide to sell accounts from logs in the future, do it only with old bots that you no longer need. Ideally, after a botnet has been operational for 3-6 months, logs are all used, you've moved to another server, and started working on a clean slate, then you can sell whatever you want from the old logs. No matter how stable your botnet is, always look for new products. Of course, don't do this immediately after purchase, but after six months of operation, consider another product and start looking for options. Nothing lasts forever, and the author of your 'creature' might disappear (arrested, scam, or drunk). Ideally, allocate funds for developing your product so that it's exclusively yours. On average, developing a product takes 4-5 months with the efforts of 3-5 coders. The average salary for a coder is $1-2k if we're talking about CIS coders. So, it's not such a bad investment. This article is created solely for informational purposes and does not advocate for any actions
Subscribe to our channel
Don't miss important news
Subscribed
3504
TOR LINK
dstor3guxi7zqmmwgds5itdt5c4u3btq4aravrgajewmhlyr5xazkpyd.onion
To enter the onion domain of the site, you need to install the TOR browser. After that you can go to our mirror
Clearnet mirrors
Resources in Telegram
The user regularly conducts transactions through the service guarantor and has positive trading statistics on the site. Most likely he can be trusted and work directly. With the rules of work through the guarantor you can familiarize yourself here. CLICK
The user has not conducted a single transaction through the guarantor. You can read about the rules of working through a guarantor here. CLICK
The user has made a security deposit on the forum. He is a verified seller and guaranteed to conduct all transactions through the guarantee service. You can read more about the deposit system here. CLICK
The user has no security deposit on the forum, when working with him do not send prepayments and always involve the guarantor in transactions. You can read more about the deposit system here. CLICK
The user's status is "UNVERIFIED" indicating that he has not verified his account on the Darknet. You can pass verification by providing positive reviews and recommendations about yourself. You can read more about how to check patency. CLICK.
The user status "VERIFIED" indicates that the seller has been verified by the Forum Administration. You can read more about how to pass the verification here. CLICK.
×
- Create New...