Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 1591

The "G2A Timezone Glitch" Scam that made $265,196.24

by Rayven - 20 June, 2021 - 08:38 PM
This post is by a banned member (Rayven) - Unhide
Rayven  
Infinity
20
Posts
2
Threads
4 Years of service
#1
(This post was last modified: 20 June, 2021 - 08:53 PM by Rayven.)
On YouTube and on this forum there are people talking about a specific Tampermonkey script that supposedly gets them everything for free by abusing a bug in the G2A Payment system.

Well this is most likely all not true.
Their "Tampermonkey script" replaces the Bitcoin address to send the payment to their own address.
Turns out they made quite the fortune out of it. ($265,196.24)


Proofs:
QRCode with the bitcoin address changed: https://ibb.co/SRY1QLz
The address behind all of this: https://www.blockchain.com/btc/address/1...5twi6jeRjE
This leak has been rated as infected 1 times this month. (1 times in total)
This post is by a banned member (ZeroP) - Unhide
ZeroP  
Supreme
600
Posts
112
Threads
3 Years of service
#2
lmaoo i heared about that
[Image: sig.gif]




[Image: sig.gif]
This post is by a banned member (cocacolavanilla) - Unhide
117
Posts
8
Threads
6 Years of service
#3
(This post was last modified: 05 July, 2021 - 05:16 AM by cocacolavanilla.)
i heard about it long time ago but holy fuck 7 bitcoins?
This post is by a banned member (dross) - Unhide
This post is by a banned member (almugtravel) - Unhide
2
Posts
0
Threads
4 Years of service
#5
what is the site to decode the script to check the btc address i just got fucked with  114 usd btc today  with the tutorial
This post is by a banned member (Devipra1) - Unhide
Devipra1  
Registered
106
Posts
0
Threads
#6
Ggggggggg

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)