OP 23 September, 2023 - 05:47 PM
(This post was last modified: 24 September, 2023 - 10:47 AM by COD0. Edited 2 times in total.)
Scammer's Profile:
https://cracked.io/Loyal
Sales Thread:
https://cracked.io/Thread-ROYALNFA-The-%...%85-5K-CPM
Amount or Item(s) Scammed:
The exact amount is unknown but significant.
Screenshots of Communication:
https://imgur.com/a/YLv2D4l
Incident Description:
1. User @Loyal, or his alternate account, DM'ed my friend asking for my checker files which were previously threaded here on cracked.io. After my friend, with my permission, supplied the files to see what would happen, I observed strange logs in my authentication indicating attempts to crack it. Screenshot evidence is included.
2. A friend who is a reverser somehow had their files and reversed them to find out that tool is coded in Python, not Golang as claimed; only their loader is in Golang. They use a solver for hCaptcha, not reCaptcha, and it's not an exploit but a straightforward requests solver.
3. @Loyal is the owner of Apollo OTP and is also known as @donkey on telegram previously. He is infamous for Exit Scamming and has amassed over 220 reports. Proof of this is also included in the screenshots. He is explicitly indicated as @donkey in them.
Crypto Address for a Refund:
null
https://cracked.io/Loyal
Sales Thread:
https://cracked.io/Thread-ROYALNFA-The-%...%85-5K-CPM
Amount or Item(s) Scammed:
The exact amount is unknown but significant.
Screenshots of Communication:
https://imgur.com/a/YLv2D4l
Incident Description:
1. User @
2. A friend who is a reverser somehow had their files and reversed them to find out that tool is coded in Python, not Golang as claimed; only their loader is in Golang. They use a solver for hCaptcha, not reCaptcha, and it's not an exploit but a straightforward requests solver.
3. @
Crypto Address for a Refund:
null