Jack Fake-Killer

45.1K posts

Jack Fake-Killer banner
Jack Fake-Killer

Jack Fake-Killer

@Phish_Destroy

⚔Stop #fraud and #phishing in #cryptocommunity 🐟Send link to TG Bot PhishDestroy_bot ❗You find scam or phishing? - Send to bot #fake #malware #Scam

Taiwan Katılım Aralık 2021
450 Takip Edilen23.4K Takipçiler
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
Steam’s legal compass is a joke: they only bow to Washington and "any court in Russia." Still ZERO apologies for the Raivo Plavnieks (RastalandTV) disaster. The platform is a literal safe haven for drainer devs. Valve just takes their cut of the dirty money and looks away. 🗑️💸 #Steam #Scam
Jack Fake-Killer tweet media
English
1
32
146
16.4K
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
Because no response or action has been provided, and due to what appears to be deliberately false statements made to protect a fraud operator, we have forwarded the full investigation materials to @ICANN Contractual Compliance, relevant regulatory authorities, and law enforcement in the state where @NameSilo is registered. Concealment of and assistance in criminal activity is not something that should be ignored or covered up.
English
0
0
0
4.5K
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
Let's be direct. @NameSilo is lying. They claimed xmrwallet[.]com was "compromised" — hacked by a third party. The operator's own emails to us, written BEFORE NameSilo got involved, prove the "hack" story was fabricated. We have the receipts. #xmrwallet #NameSilo #MoneroScam #PhishDestroy
English
2
4
18
8.5K
Jack Fake-Killer retweetledi
Scam Sniffer | Web3 Anti-Scam
Scam Sniffer | Web3 Anti-Scam@realScamSniffer·
🚨 Someone lost ~$1.77M USDC after signing a phishing permit (gasless approval) signature on Ethereum. 🎣⚠️
Scam Sniffer | Web3 Anti-Scam tweet media
English
12
26
117
38.3K
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
@al_f4lc0n @immunefi Should have just exploited it through the SEAL wallet — they have a whitehat protection program, so it probably would have been a fairer deal. Just kidding... unless? 👀
English
0
0
0
355
f4lc0n
f4lc0n@al_f4lc0n·
I Saved Injective's $500M. They Pay Me $50K. I like hunting bugs on @immunefi . I'm decent at it. - #1 — Attackathon | Stacks - #2 — Attackathon | Stacks II - #1 — Attackathon | XRPL Lending Protocol - 1 Critical and 1 High from bug bounties (not counting this one) Life was good. Then I found a Critical vulnerability in @injective . This vulnerability allowed any user to directly drain any account on the chain. No special permissions needed. Over $500M in on-chain assets were at risk. I reported it through Immunefi. The next day, a mainnet upgrade to fix the bug went to governance vote. The Injective team clearly understood the severity. Then — silence. For 3 months. No follow up. No technical discussion. Nothing. A few days ago, they notified me of their decision: $50K. The maximum payout for a Critical vulnerability in their bug bounty program is $500K. I disputed it. Silence again. No explanation for the reduced payout. No explanation for the 3 month ghost. No conversation at all. To be clear: the $50K has not been paid either. I've seen others share bad experiences with bug bounty payouts recently. I never thought it would happen to me. I can't force them to do the right thing. But I won't let this be forgotten. I will dedicate 10% of all my future bug bounty earnings to making sure this story stays visible — until Injective pays what I deserve. Full Technical Report: github.com/injective-wall…
English
517
524
4.5K
1.8M
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
We've now proven that @NameSilo's abuse team intentionally lied in their public response. The operator's own emails — written before NameSilo got involved — contradict every claim they made. NameSilo is covering for this operator. The reason is theirs to explain. Our job was the evidence. It's done. It's permanent. It's public. What happens next is between NameSilo, the operator, and the victims they both created. Good luck to both of them. @Phish_Destroy | phishdestroy.io
English
0
8
34
9.9K
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
Honest question for @NameSilo: Who is this operator to you? Employee? Contractor? Friend of support staff? Relative? Because he told us "subpoena the registrar" like a man who already had your answer. 3 registrars suspended him. You wrote him a defense. Who pays for the stolen $2M+ — you or him? Victims can reach you at abuse@namesilo.com and support@namesilo.com. They will. #xmrwallet #NameSilo #MoneroScam #PhishDestroy
English
1
5
27
7.9K
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
🚨 THREAD: @NameSilo is acting as press secretary for a $2M+ Monero theft operation. xmrwallet[.]com steals private keys since 2016. 6 security vendors flag it. 3 registrars suspended it. NameSilo called the scammer "the victim" and is helping him remove @virustotal warnings. Our investigation 👇
Jack Fake-Killer tweet media
English
1
16
14
5.3K
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
CryptOpus@ImCryptOpus

⚠️ JUST IN: has been taken down XMRWallet was reportedly shut down after allegedly operating for more than a decade as a fraudulent #Monero wallet, with estimates suggesting over $10M in user funds were stolen. Until the takedown, the suspected (a Russian operator) was still collecting six figures in deposits from users. Shortly after the site was removed, a new domain surfaced, only to be taken down again soon after. #CryptoTrading $XMR

English
0
0
1
58
Jack Fake-Killer
Jack Fake-Killer@Phish_Destroy·
@namesilo @virustotal @Fortinet @Trustpilot Is helping a scammer clear their VT record a new registrar service? We proved this wallet was created to steal funds from day one. The owner is actively wiping reviews and trying to take down entire GitHub accounts. Like client, like registrar.
English
2
0
29
2.2K
CryptOpus
CryptOpus@ImCryptOpus·
⚠️ JUST IN: has been taken down XMRWallet was reportedly shut down after allegedly operating for more than a decade as a fraudulent #Monero wallet, with estimates suggesting over $10M in user funds were stolen. Until the takedown, the suspected (a Russian operator) was still collecting six figures in deposits from users. Shortly after the site was removed, a new domain surfaced, only to be taken down again soon after. #CryptoTrading $XMR
CryptOpus tweet media
English
2
0
0
211