Separate names with a comma.
Discussion in 'Steroid Underground' started by SymBiotics, Aug 14, 2019.
Yep they scammed me just yesterday that same email tntline@protonmail. Hacked my protonmail
Can you give us anymore information? Did you click on any links? Were you emailing a source? Anything that can help.
I just got hacked myself this morning because I'm a dumbass! Dude sure as hell got me though. That shit was wild.
Because you are the hacker posing as this profile?
You’re profile was made 3 days ago!? Wtf
How? Does this guy just randomly email you, Claiming to be a source? That’s not suspicious to you
I don't know if this helps, but I know on SST for awhile, people were getting their btc stolen because a scammer would use a sources email address but the .com part was something like .corn (.coRn) and people weren't paying attention.
Also, I've seen scammers send emails through protonmail or tutanota asking for you to verify your account. If you aren't paying attention and you click the link, they get your information and can intercept your emails between you and the source and get you to send funds to the wrong wallet.
Nah, I fucked up using a shitty password for both my Meso account and protonmail account. I have so many passwords I use for everything, I guess I didn't think about it.
Yep, I'd gotten lazy when it comes to make sure my security is right online and it came back to bite me in the ass.
This is it right here. Millard banned my account when I got hacked. I made another account a little bit later and he reached out to me and assisted me in getting back into it and fixing it.
Ahh I see
This account is good.
Hey guys...I'm new to this board, but not to the game. Symbiotic a has been nothing but first class in answering questions with complete candor. Yes...I have ordered from him. But I'll let my post count build up before I give my experience. And that's just out of respect for the board and you guys that have been around for a while. The info on Meso is a highwater mark that is hard to surpass!
ProtonMail wouldn’t give a flying fuck about something as dumb as this. Nor would they waste their time contacting US law enforcement over it..
Yes but I’m very watery so weighing myself is pointless, and the mirror is a major lie most of the time haha.
Nope, just wanted to get leaner! I think two weeks of hell is easier than 4-6 weeks of dieting haha.
Question for you. There is a "locked lock" icon next to the sender in proton mail. Was this ICON next to the sender when tntline would send emails? Or was it an open lock?
I Would set up a signature on protonmail first and foremost having them change their passwords and setup 2FA. These scams work because the CUSTOMERS email is compromised. Everyone should immediately change their passwords, and enable 2fa. As well as go to SETTINGS>Security>Session management (right corner) and make sure there are no malicious log ins, and if so revoke them.
Next remind people to verify the email address they are communicating with, as well as things like any other red flags. ie changing btc addresses, unlocked lock icon, etc, etc.
For the last 2 months my signature has been as follows in an attempt to wan people of this stuff. I started to notice a sharp increase in compromised emails, as well as the pattern of people re-using forum passwords, on their emails.
These scammers/hackings really make a strong case for using PGP for all communication. This kind of scam can't work if both parties are encrypting their own messages.
How exactly did you get scammed though ? In my 12 yrs of doing this not once did a source initiate a discussion. It just doesn’t work that way.
That wasn’t a red flag?
The scammer email looks nothing like the real email. I’m completely baffled how this scam is working.
Not the same brand. But one that has exactly the same ingredients. It’s called Blood Pressure Support. They all have the exact same ingredients. I read the labels.
I would like to hear more from the victim above, BUT, normally it works like this.
The victims email is already compromised by the scammer.
The scammer sits and watches the conversations, the victim is having. They wait until they are about to close a deal in most cases.
Then say Symbiotics sends the victim an email with a BTC address, the scammer steps in, and 1. deletes it before the victim sees it, and sends another email with their btc address, typically from a SPOOFED email that appears just like the sources(firstname.lastname@example.org for example) or 2. sends an email to the effect of "hey use this BTC address instead" and trys to change it at the last min.
In this case it appears they just changed their DISPLAY name, to look like Symbiotics, which is pretty lazy, and means the victim wasn't paying much attention and only looked at the name on their main INBOX screen, and not verify the email address once in the email chain.
That is typically how it works.