create account

This week they tried to Scam me twice by thorkellnft

View this thread on: hive.blogpeakd.comecency.com
· @thorkellnft ·
$9.93
This week they tried to Scam me twice
 https://i.imgur.com/LSoghBJ.jpg 

<center><sub><em>Image generated with <a href="https://playground.com/">Playground</a> and edited by me in Photoshop</em></sub></center>

<div align="justify">

Hello friends how are you? As you saw in the title, this week they have tried to scam me twice, the truth is that in very creative ways, both times I have had suspicions since they contacted me and I have proceeded with caution to find out what it was about, I have kept in touch with individuals with the sole interest of knowing what they were up to and how they planned to scam me. As many of you know, I am very passionate about cybersecurity and I am always researching these topics to be as up-to-date as possible in this world that is becoming more and more difficult to know where the next attack may come from and when, so I try to be as possible alert.

In a year in which <a href='https://leofinance.io/@leoglossary/leoglossary-artificial-intelligence'>artificial intelligence (AI)</a> almost allows you to do anything and we are close to a possible rise in the <a href='https://leofinance.io/@leoglossary/cryptocurrency'>cryptocurrency</a> <a href='https://leofinance.io/@leoglossary/leoglossary-market'>market</a>, scammers are hunting for possible victims to fill their pockets at the expense of our work.

The attacks are becoming more sophisticated and the strategies they use to try to deceive us and keep our <a href='https://leofinance.io/@leoglossary/leoglossary-money'>money</a> are becoming more credible. AI has made this work easier, since creating a false <a href='https://leofinance.io/@leoglossary/leoglossary-digital-identity'>digital identity</a> is very easy and cloning a <a href='https://leofinance.io/@leoglossary/leoglossary-website'>web page</a> is just a couple of clicks away. These digital scammers are always on the lookout and looking for possible victims, if you are a little careless they will catch you in their trap and when you realize it it is too late.

But okay, enough of the talk and I'm going to tell you in as much detail as possible how they have tried to deceive me twice this week.

<center><h2>First attempt</h2></center>

<div align="justify">I'm in *Revolico*<sup>*1*</sup> looking for a series of things that I was interested in <a href='https://leofinance.io/@leoglossary/leoglossary-buy'>buying</a> and I came across an ad that offered a remote job translating documents from English to Spanish. Normally I don't look at these types of ads but that one caught my attention and I wanted to see what it was about. It was about, within the ad I had a contact through Messenger which already seemed suspicious to me (what company or individual uses Messenger as a contact), I wrote to him and then he sent me another contact through Telegram (at this point I already knew what I was up to i was involved), I contacted the supposed company that was looking for translators, I greeted them and asked what the job was about and the first thing they did was ask me for information such as name, surname, email, age, nationality(they didn't ask for a portfolio or proof that I knew how to do the job.), of course I sent them false information, Then they explained to me that they had a job to translate 4 books with different plans in which they paid $30 for each page translated and a bonus for finishing early. I don't know how much a translator will charge but I think $30 for a page is too much.

I chose the smallest book and then they explained the rules to me, I had to send it within 24 hours, I had to translate it manually without the help of <a href='https://leofinance.io/@leoglossary/leoglossary-software'>software</a> or AI, and they gave me the choice between Payeer, <a href='https://leofinance.io/@leoglossary/leoglossary-paypal'>Paypal</a>, <a href='https://leofinance.io/@leoglossary/leoglossary-bitcoin'>Bitcoin</a>, <a href='https://leofinance.io/@crypto-guides/what-is-ethereum-eth'>Ethereum</a> and <a href='https://leofinance.io/@leoglossary/leoglossary-bank'>bank</a> transfer to receive the juicy <a href='https://leofinance.io/@leoglossary/leoglossary-payment'>payment</a> once the job was finished.

After reviewing the document with *VirusTotal*<sup>*2*</sup>, I downloaded and translated the book using Google Translate with the option to translate documents and contacted the “company” again, I sent them the document and they told me that they were going to review it to check that everything was well and then they paid me. After 5 minutes they write to me congratulating me that they had approved my work and that I should send my payment method to receive my money. Here I am going to make a stop to explain that it is impossible for them to have been able to review the book because I sent it protected by a password, so they did not even look at it. I sent them a Payeer account I created minutes earlier with one of these 5-minute emails. It didn't take long for them to write to me and explain that the $1,300 they were going to pay me had already been sent, but since they had recently changed servers, I had to send them $80 to activate the payment link and they would refund it to me.

You already know the rest, there they tried by all possible means to convince me to send them the money so they could pay me, and once the whole setup was unmasked I proceeded to block and report all the <a href='https://leofinance.io/@leoglossary/leoglossary-account'>accounts</a> they used to contact me.

<center><h2>Second try</h2></center>

 <div align="justify">As if it wasn't enough for them to try to fool me once, someone decides to try their luck with me the day after the previous one. This other one was on of course already knowing where the shots were coming from).

He told me a story that he was working for an <a href='https://leofinance.io/@leoglossary/leoglossary-non-fungible-token-nft'>NFT</a> game project and that they were looking for people to promote their game on X and that they would pay very well for it. I told him that I was interested in him sending me the information so I could do my research and tell him my answer (here I was intrigued because I didn't know how they were planning to deceive me) and before finishing the conversation I asked him if I had to send him money first to receive my payment(to see if it was a scam like the previous one) . and he said no.

He sends me a link to the project's website and its "<a href='https://leofinance.io/@leoglossary/leoglossary-white-paper'>white paper</a>", I checked the links before clicking on them with VirusTotal and once reviewed I entered them, the page looks like a legitimate project, it has a user interface (UI) very presentable, I got ready to see the white paper and the first thing I read is that the project is in <a href='https://leofinance.io/@leoglossary/leoglossary-beta'>beta</a> phase and that it is running on the Solana <a href='https://leofinance.io/@leoglossary/blockchain'>blockchain</a>, until then everything is fine, until I see its roadmap and instead of Solana the game It was on <a href='https://leofinance.io/@crypto-guides/what-is-polygon-matic-crypto'>Polygon</a>.

To not make the story too long, I contacted the user again and told him that I was willing to make the tweets, what the job would be like and how much I would earn and where they would pay me, for each tweet I made they would pay me $10 and for each like and rt that they had those tweets I would get a bonus and for a tweet posted on my profile for a month the payment would be $100 plus the aforementioned bonuses. The payment would be in Ethereum (look at how many blockchains we are using) so far everything seems legitimate, right, because now is when the “magic trick” that they wanted to use on me comes.

He tells me that I had to write the tweets by hand so that they would be more credible that I downloaded the game launcher and installed it, that once installed it would enter the "DEBUG" section and that from there it would obtain my ID and it would be I would send her to give me authorization on the platform. You already saw the trap, right? Once you install the software on your PC and send your ID, you will be giving remote access to your PC and the attacker will take the opportunity to obtain your <a href='https://leofinance.io/@leoglossary/leoglossary-data'>data</a>, install malicious software, use your machine to attack other people (zombie), <a href='https://leofinance.io/@leoglossary/leoglossary-miners'>mine</a> cryptocurrencies without your consent and another long list of things that I will not mention here and that you surely already know.

That's where the adventure ended because I already knew how he intended to attack me and I had already discovered what he wanted, as with the previous one, I proceeded to block and report all the accounts he used to contact me.



Moral of this, walk very carefully on the <a href='https://leofinance.io/@leoglossary/leoglossary-internet'>internet</a>, distrust everyone and even more so if they offer things that are too good to be true. As I always tell you, study hard and be aware of the latest news about   and attacks to be alert and not be caught off guard.



I hope that what I have told you helps you prevent either of these two forms of scams. That they raise awareness that the Internet is a dangerous place and even more so for us users who own cryptocurrencies. Tell me in the comments if you have ever been scammed in one of these ways or another, share so that it reaches more people and I'll see you next time.



<hr><sup>1-</sup> *Revolico is a classified ads page in Cuba where products and services are sold and offered in the Cuban informal market.*

<sup>2-</sup> *VirusTotal is a website where you can check files, urls, web pages, emails for free to see if they have viruses. The website has various antivirus engines with which it simultaneously checks what you send it for review.*


<hr>


<img src="https://files.peakd.com/file/peakd-hive/thorkellnft/23uFehoaeCpeAx3REjjTHAB3snp9ToX6H4jfuaqt4h9GYARm7eEkUNgdYxWrBeJnov5MS.gif">




<center><font color="red" size="5">Original text created in Spanish and translated and formatted with <a href="https://hivetranslator.com">Hive Translator</a> by <a href="https://peakd.com/@noakmilo/">@noakmilo</a>.
 
<strong>Hardware used</strong>    
💻 Dell Vostro-3500  




<strong>Social Media</strong>     
<a href="https://twitter.com/drachir_gc">twitter</a> | 	<a href="https://t.me/drachir_gc">telegram</a> | <a href="https://peakd.com/@thorkellnft">hive</a>
</center>


<img src="https://files.peakd.com/file/peakd-hive/thorkellnft/23uFehoaeCpeAx3REjjTHAB3snp9ToX6H4jfuaqt4h9GYARm7eEkUNgdYxWrBeJnov5MS.gif">


</div>

Posted Using [InLeo Alpha](https://inleo.io/@thorkellnft/this-week-they-tried-to-scam-me-twice)
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 141 others
properties (23)
authorthorkellnft
permlinkthis-week-they-tried-to-scam-me-twice
categoryhive-167922
json_metadata{"app":"leothreads/0.3","format":"markdown","tags":["hive-167922","money","blockchain","ctp","neoxian","vyb","proofofbrain","palnet","leofinance"],"canonical_url":"https://inleo.io/@thorkellnft/this-week-they-tried-to-scam-me-twice","links":["https://playground.com/\">Playground</a>","https://leofinance.io/@leoglossary/leoglossary-artificial-intelligence'>artificial","https://leofinance.io/@leoglossary/cryptocurrency'>cryptocurrency</a>","https://leofinance.io/@leoglossary/leoglossary-market'>market</a>,","https://leofinance.io/@leoglossary/leoglossary-money'>money</a>","https://leofinance.io/@leoglossary/leoglossary-digital-identity'>digital","https://leofinance.io/@leoglossary/leoglossary-website'>web","https://leofinance.io/@leoglossary/leoglossary-buy'>buying</a>","https://leofinance.io/@leoglossary/leoglossary-software'>software</a>","https://leofinance.io/@leoglossary/leoglossary-paypal'>Paypal</a>,","https://leofinance.io/@leoglossary/leoglossary-bitcoin'>Bitcoin</a>,","https://leofinance.io/@crypto-guides/what-is-ethereum-eth'>Ethereum</a>","https://leofinance.io/@leoglossary/leoglossary-bank'>bank</a>","https://leofinance.io/@leoglossary/leoglossary-payment'>payment</a>","https://leofinance.io/@leoglossary/leoglossary-account'>accounts</a>","https://leofinance.io/@leoglossary/leoglossary-non-fungible-token-nft'>NFT</a>","https://leofinance.io/@leoglossary/leoglossary-white-paper'>white","https://leofinance.io/@leoglossary/leoglossary-beta'>beta</a>","https://leofinance.io/@leoglossary/blockchain'>blockchain</a>,","https://leofinance.io/@crypto-guides/what-is-polygon-matic-crypto'>Polygon</a>.","https://leofinance.io/@leoglossary/leoglossary-data'>data</a>,","https://leofinance.io/@leoglossary/leoglossary-miners'>mine</a>","https://leofinance.io/@leoglossary/leoglossary-internet'>internet</a>,","https://files.peakd.com/file/peakd-hive/thorkellnft/23uFehoaeCpeAx3REjjTHAB3snp9ToX6H4jfuaqt4h9GYARm7eEkUNgdYxWrBeJnov5MS.gif\">","https://hivetranslator.com\">Hive","https://peakd.com/@noakmilo/\">@noakmilo</a>.","https://twitter.com/drachir_gc\">twitter</a>","https://t.me/drachir_gc\">telegram</a>","https://peakd.com/@thorkellnft\">hive</a>","https://files.peakd.com/file/peakd-hive/thorkellnft/23uFehoaeCpeAx3REjjTHAB3snp9ToX6H4jfuaqt4h9GYARm7eEkUNgdYxWrBeJnov5MS.gif\">","https://inleo.io/@thorkellnft/this-week-they-tried-to-scam-me-twice)"],"images":["https://i.imgur.com/LSoghBJ.jpg"],"dimensions":{"https://i.imgur.com/kAjqU3f.jpg":{"width":1280,"height":853},"https://i.imgur.com/LSoghBJ.jpg":{"width":1280,"height":853}}}
created2023-12-21 19:37:12
last_update2023-12-21 19:37:12
depth0
children0
last_payout2023-12-28 19:37:12
cashout_time1969-12-31 23:59:59
total_payout_value4.854 HBD
curator_payout_value5.074 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length10,824
author_reputation79,376,256,700,589
root_title"This week they tried to Scam me twice"
beneficiaries
0.
accountleofinance
weight500
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id129,868,960
net_rshares21,028,166,384,606
author_curate_reward""
vote details (205)