CarderPlanet
Professional
- Messages
- 2,552
- Reaction score
- 710
- Points
- 83
Scam project: organization, ways to screw you up and more
So, the material from this article was supposed to be part of a full-fledged, large-scale scam training. But due to certain circumstances, I did not begin to develop the topic further, therefore I will integrate the prepared information into today's article.
Brew some seagulls and fly!
Scam project: full analysis.
What is a scam anyway?
For those who are not in the subject, I will explain. Scam - scam for money, fraud. It affects almost all niches: from antiquities to crypts.
Basic safety regulations
How strong an anonymous chain needs to be built is entirely determined by the amounts that are pulled out of the mammoths. It is of paramount importance to understand that the comrades from the authorities will simply either not accept the application or will not give it a go if the damage is less than 2,500 rubles, because at the moment the minimum amount for initiating a criminal case is 5,000 rubles.
What does it give us?
Basically, as long as we stick to this established framework and don't beat up some women in the same department who might collectively apply, we don't need to go underground in pursuit of absolute anonymity. And in order to work for amounts over 5k for a mammoth, experience is needed, which is impossible to get without practice.
Preparing the PC
First of all, I will say that here we will build on your financial capabilities at the moment. I will provide the minimum and optimum security requirements to be adhered to.
Required minimum:
RDP / Virtual + vpn
So, in order.
Dedik (from the English word "dedicated server" or RDP) is a dedicated server that has quite powerful network interfaces and is not a very weak hardware configuration. In other words, this is a PC that is located at a distance from you and works 24/7, which allows you to access it at any time.
Roughly speaking, renting a Dedicated Man will cost you a pretty penny:
Of course, there is always an option to buy a hacked (hacked) one on shady sites, but before purchasing it is worth considering the following factors: reputation of the forum, reputation of the seller, reputation of the guarantor, customer reviews. It will be necessary to access the compiled Dedicated servers exclusively through VPN, after work, clean up the logs after work, close all programs and windows.
VM is software that allows you to create a separate operating system inside a computer. The program works in such a way that the created virtual computer gets full functionality.
There are a lot of virtual machines, but we will opt for Oracle Virtualbox (https://www.virtualbox.org). There are plenty of guides for installation and configuration in the public domain.
VPN is a technology that provides an encrypted connection over your internet connection.
You should immediately forget about free ones, because they are only suitable for bypassing locks, no more. When choosing, an important criterion for us will be the location of the anonymizer, based on the fact that we cannot say unambiguously whether it stores logs or not (most of them do). The priority countries for us will be countries whose legislation does not mandate the maintenance of logs.
Alternatively, NordVPN, based in Panama. On the same shadow sites, you can find topics with the sale of the accounts of this anonymizer (the price for them is in the region of 350-400 rubles).
After purchasing the VPN, we install it on the virtual machine and we can get to work, since we have achieved the minimum level.
Optimal:
To begin with, we need a "left" laptop, which will be used exclusively for work and will not store any personal data. To do this, go to Avito, find the best offer according to the price-quality criterion and purchase (for special paranoids, we turn the deal through a drop).
The next item is the purchase of a "left" modem and a "left" SIM card. The acquisition scheme is exactly the same as with a laptop.
I think it is obvious that you should not connect a working laptop to your home Wi-Fi network, and all further connections are made exclusively via a 3g / 4g connection.
On the "left" laptop, we perform a similar configuration of the virtual machine, connect the VPN.
Preparing the wallet
We will use the Qiwi wallet to receive funds. There are several ways:
1. Create on the "left" SIM card yourself, purchase documents for verification and get the "Standard" level.
2. Purchase a ready-made one on deer.io.
I will dwell on the latter in detail, since, in my opinion, it is the least hemorrhagic. We go to deer.io → "Search for goods", in the product catalog write "Qiwi", it will give you all the addresses of online instant shops that sell Qiwi wallets. We are interested in medium (priority) or maximum identification.
A small digression to explain why not minimal and why medium is a priority. Qiwi adheres to a very strict policy due to frequent cases of fraudulent use of their wallets, so the only complaint can send the wallet to the ban, regardless of its level of identification. Of course, the average and maximum identifications have high loyalty. The probability of going to the block is about the same for them, but the difference in price is noticeable:
Hence the priority over wallets with "Standard" identification.
So, let's go further. After you have decided on the store (pay attention to the registration date, the earlier, the less likely you are to be thrown) and bought a wallet, you should take into account some nuances: SMS confirmation of transactions is disabled by default, you need to go to the "Settings" column, item "Security" and turn off all the checkboxes that you can (you cannot remove "access from the terminal"). This is necessary so that the seller does not subsequently withdraw money through the application (such cases are not uncommon).
We log in and perform all operations with the wallet exclusively on the previously configured and prepared system. I highly do not recommend entering from the main car.
This concludes the preparatory work on configuring security. If you have the desire and relevant knowledge, you can improve the chain by rolling out Kali Linux or Whonix as the main OS.
Conclusion
In this part, we analyzed the introductory points, partially closed some knowledge gaps. In the next post, I will clearly, step by step, describe the process of creating a copy of the site, which will form the basis of our divorce.
So, the material from this article was supposed to be part of a full-fledged, large-scale scam training. But due to certain circumstances, I did not begin to develop the topic further, therefore I will integrate the prepared information into today's article.
Brew some seagulls and fly!
Scam project: full analysis.
What is a scam anyway?
For those who are not in the subject, I will explain. Scam - scam for money, fraud. It affects almost all niches: from antiquities to crypts.
Basic safety regulations
How strong an anonymous chain needs to be built is entirely determined by the amounts that are pulled out of the mammoths. It is of paramount importance to understand that the comrades from the authorities will simply either not accept the application or will not give it a go if the damage is less than 2,500 rubles, because at the moment the minimum amount for initiating a criminal case is 5,000 rubles.
What does it give us?
Basically, as long as we stick to this established framework and don't beat up some women in the same department who might collectively apply, we don't need to go underground in pursuit of absolute anonymity. And in order to work for amounts over 5k for a mammoth, experience is needed, which is impossible to get without practice.
All of the above does not mean at all that we will be brave and heroic, putting a bolt on safety. I just clarified the situation, got rid of excessive paranoia and defined a certain framework.
Preparing the PC
First of all, I will say that here we will build on your financial capabilities at the moment. I will provide the minimum and optimum security requirements to be adhered to.
Required minimum:
RDP / Virtual + vpn
So, in order.
Dedik (from the English word "dedicated server" or RDP) is a dedicated server that has quite powerful network interfaces and is not a very weak hardware configuration. In other words, this is a PC that is located at a distance from you and works 24/7, which allows you to access it at any time.
Roughly speaking, renting a Dedicated Man will cost you a pretty penny:

Of course, there is always an option to buy a hacked (hacked) one on shady sites, but before purchasing it is worth considering the following factors: reputation of the forum, reputation of the seller, reputation of the guarantor, customer reviews. It will be necessary to access the compiled Dedicated servers exclusively through VPN, after work, clean up the logs after work, close all programs and windows.
VM is software that allows you to create a separate operating system inside a computer. The program works in such a way that the created virtual computer gets full functionality.
There are a lot of virtual machines, but we will opt for Oracle Virtualbox (https://www.virtualbox.org). There are plenty of guides for installation and configuration in the public domain.
VPN is a technology that provides an encrypted connection over your internet connection.
You should immediately forget about free ones, because they are only suitable for bypassing locks, no more. When choosing, an important criterion for us will be the location of the anonymizer, based on the fact that we cannot say unambiguously whether it stores logs or not (most of them do). The priority countries for us will be countries whose legislation does not mandate the maintenance of logs.
Alternatively, NordVPN, based in Panama. On the same shadow sites, you can find topics with the sale of the accounts of this anonymizer (the price for them is in the region of 350-400 rubles).
After purchasing the VPN, we install it on the virtual machine and we can get to work, since we have achieved the minimum level.
Optimal:
To begin with, we need a "left" laptop, which will be used exclusively for work and will not store any personal data. To do this, go to Avito, find the best offer according to the price-quality criterion and purchase (for special paranoids, we turn the deal through a drop).
The next item is the purchase of a "left" modem and a "left" SIM card. The acquisition scheme is exactly the same as with a laptop.
I think it is obvious that you should not connect a working laptop to your home Wi-Fi network, and all further connections are made exclusively via a 3g / 4g connection.
On the "left" laptop, we perform a similar configuration of the virtual machine, connect the VPN.
Preparing the wallet
We will use the Qiwi wallet to receive funds. There are several ways:
1. Create on the "left" SIM card yourself, purchase documents for verification and get the "Standard" level.
2. Purchase a ready-made one on deer.io.
I will dwell on the latter in detail, since, in my opinion, it is the least hemorrhagic. We go to deer.io → "Search for goods", in the product catalog write "Qiwi", it will give you all the addresses of online instant shops that sell Qiwi wallets. We are interested in medium (priority) or maximum identification.
A small digression to explain why not minimal and why medium is a priority. Qiwi adheres to a very strict policy due to frequent cases of fraudulent use of their wallets, so the only complaint can send the wallet to the ban, regardless of its level of identification. Of course, the average and maximum identifications have high loyalty. The probability of going to the block is about the same for them, but the difference in price is noticeable:

Hence the priority over wallets with "Standard" identification.
So, let's go further. After you have decided on the store (pay attention to the registration date, the earlier, the less likely you are to be thrown) and bought a wallet, you should take into account some nuances: SMS confirmation of transactions is disabled by default, you need to go to the "Settings" column, item "Security" and turn off all the checkboxes that you can (you cannot remove "access from the terminal"). This is necessary so that the seller does not subsequently withdraw money through the application (such cases are not uncommon).
We log in and perform all operations with the wallet exclusively on the previously configured and prepared system. I highly do not recommend entering from the main car.
This concludes the preparatory work on configuring security. If you have the desire and relevant knowledge, you can improve the chain by rolling out Kali Linux or Whonix as the main OS.
Conclusion
In this part, we analyzed the introductory points, partially closed some knowledge gaps. In the next post, I will clearly, step by step, describe the process of creating a copy of the site, which will form the basis of our divorce.