Professor
Professional
- Messages
- 213
- Reaction score
- 22
- Points
- 18
What is the essence of the scheme:
Carrying out a DDoS attack on the phones of a victim whose business is entirely related to accepting orders by phone. With subsequent cancellation of the attack for a ransom. That is, you block the victim's phones, he suffers losses, you write to him that to restore the connection you need to transfer $300 to you, he transfers the money, you stop the attack.
What materials are needed:
1. SIM cards issued to a stranger (not acquaintances, not relatives!). 3-5 for a start is enough, any mobile operator in Russia
2. A phone, the cheapest, new, used, it does not matter, only from a stranger
3. A used laptop is not powerful, for accessing the Internet, (Windows 7, 2 GB RAM, built-in video card) no more than $100, it is desirable that the hard drive is very easy to remove. The laptop must be purchased from a stranger, in no case should you connect it to the Internet, Wi-Fi network or USB modem registered to yourself or relatives, and it is best to delete the Wi-Fi driver
4. USB modem with a SIM card registered to a stranger
5. USB flash drive 1 GB
6. Visa or Mastercard card (naturally to a stranger).
The most important thing!! Anonymity.
1. Go online from this laptop, download the TOR browser, launch TOR and register foreign mail Gmail.com, Yahoo.com, Hotmail.com, etc.
2. Prepare high-quality VPN, Socks. That is, in the end, SocksClient and Proxifier should be installed on the computer. To work, launch VPN, Proxifier.
3. Download Mozilla, Disable saving history, passwords, cookies, sending statistics, etc. in
TrueCrypt settings, make a secure flash drive, save everything on the flash drive, soft, passwords.
Preparation is complete!
Analysis and collection of data on the victim:
You need to look for a victim, accepting orders, which directly depends on the phone.
I will tell you only about those organizations that I worked with myself. Your earnings will depend on the city in which the potential victim is located, the larger the city, the higher the profit, I chose Moscow, St. Petersburg, Kazan, Yekaterinburg, Ufa:
1. Taxi services
In the evening, around 9-10 p.m., go to Google and type the following:
Order a taxi in big city. We are looking for an organization that is neither large nor small. We go to the site and see what interests us:
1) Visitor counter, how many people visited the site per day
2) How many cars are in the park.
3) Average cost of one trip
4) How big is the taxi, are there branches in other cities
5) We look in the search, whether this Taxi serves.
6) Write down all the phone numbers posted on the website.
Analyze all the information and make an approximate calculation of the daily revenue of this organization. Write it down!
Pizzas/sushi/tow trucks/luxury car rental. Write down the data
Elite prostitutes who charge from $500 per night. You must first call and find out if she works this or next week, more expenses
DDoS attack on the victim's phone.
Select a victim, order a DDoS attack (Telephone flood) on the victim's phones
How a DDoS attack occurs:
A call comes to the phone of the subscriber being attacked.
As soon as the subscriber accepts the call, there is an immediate automatic drop and redial. If the called subscriber drops the call or the line is busy, then a redial also follows. If the subscriber turns off the phone, the system will still continue to try to call him. And as soon as the phone is turned on again, calls immediately start coming again.
In summary:
A phone processed in this way becomes a completely useless and noisy piece of plastic for the entire duration of the attack. Organizations whose successful activity directly depends on the ability of clients to contact them can suffer very significant damage, both financially and in terms of their reputation.
Look for the contacts of the DDoSers yourself.
To begin with, I recommend ordering a DDoS attack on regular phone numbers (cell and landline). And as soon as you earn your first money, you can also use the PBX.
When ordering blocking, we indicate all the numbers for receiving orders of the organization we have chosen. The duration of the blocking is within 24 hours, only on prostitutes we have to flood for up to 7 days. We set the start time of the blocking from 10 am to 10 am local time in the region where the victim is located.
As a result of blocking, the organization suffers a daily financial turnover, loses new and old clients. In case of working with taxis and tow trucks, plus the above, there is a downtime of cars. Accordingly, no one will change phone numbers, since they are present in all types of advertising.
During the blocking process, contacting authorities or telephone operators will not lead to anything - I checked this during my work.
After the attack is completed, create a new email and write the following text to the email:
(Example)
Hello. To avoid further communication problems, please transfer $300 to your VISA card within 3 hours. Phones will work after the money is transferred from the card. Otherwise, your phones will be blocked for seven days. We will not waste your and our time.
Duplicate this same message and send it through the feedback form.
Then send the message:
(Example)
To avoid further communication problems, please read the letter in your email.
Specify the amount based on 10-30% of the daily cash turnover of the organization. For example: Based on your approximate calculation when choosing an organization. The daily turnover is $1500, specify $300-400. You shouldn't be impudent either. Is it possible to make money on prostitutes?
Then we wait... After 3 hours, we go to the Internet bank and look at the amount on the card balance.
According to statistics, 3 out of 5 victims immediately transfer money, the 4-5th send after the continuation of the attack the next day, in which case we increase the amount by $50-200, the 5th may not send. We usually forget about the 5th.
Cashing out money.
Put on a cap, glasses, a cap, a mustache, a beard (who is good at what) and in the evening, we withdraw honestly earned money.
Phone, SIM cards, laptop hard drive, card, everything is broken and thrown away!
MANDATORY! No need to skimp, the most important thing is YOUR SAFETY!
But cashing out with a card is the most dangerous way to withdraw money, but not a pain in the ass.
In general, as an option, make a Yandex card or Qiwi, when replenishing the account, immediately transfer the money to bitcoins and there you can do whatever you want.
Carrying out a DDoS attack on the phones of a victim whose business is entirely related to accepting orders by phone. With subsequent cancellation of the attack for a ransom. That is, you block the victim's phones, he suffers losses, you write to him that to restore the connection you need to transfer $300 to you, he transfers the money, you stop the attack.
What materials are needed:
1. SIM cards issued to a stranger (not acquaintances, not relatives!). 3-5 for a start is enough, any mobile operator in Russia
2. A phone, the cheapest, new, used, it does not matter, only from a stranger
3. A used laptop is not powerful, for accessing the Internet, (Windows 7, 2 GB RAM, built-in video card) no more than $100, it is desirable that the hard drive is very easy to remove. The laptop must be purchased from a stranger, in no case should you connect it to the Internet, Wi-Fi network or USB modem registered to yourself or relatives, and it is best to delete the Wi-Fi driver
4. USB modem with a SIM card registered to a stranger
5. USB flash drive 1 GB
6. Visa or Mastercard card (naturally to a stranger).
The most important thing!! Anonymity.
1. Go online from this laptop, download the TOR browser, launch TOR and register foreign mail Gmail.com, Yahoo.com, Hotmail.com, etc.
2. Prepare high-quality VPN, Socks. That is, in the end, SocksClient and Proxifier should be installed on the computer. To work, launch VPN, Proxifier.
3. Download Mozilla, Disable saving history, passwords, cookies, sending statistics, etc. in
TrueCrypt settings, make a secure flash drive, save everything on the flash drive, soft, passwords.
Preparation is complete!
Analysis and collection of data on the victim:
You need to look for a victim, accepting orders, which directly depends on the phone.
I will tell you only about those organizations that I worked with myself. Your earnings will depend on the city in which the potential victim is located, the larger the city, the higher the profit, I chose Moscow, St. Petersburg, Kazan, Yekaterinburg, Ufa:
1. Taxi services
In the evening, around 9-10 p.m., go to Google and type the following:
Order a taxi in big city. We are looking for an organization that is neither large nor small. We go to the site and see what interests us:
1) Visitor counter, how many people visited the site per day
2) How many cars are in the park.
3) Average cost of one trip
4) How big is the taxi, are there branches in other cities
5) We look in the search, whether this Taxi serves.
6) Write down all the phone numbers posted on the website.
Analyze all the information and make an approximate calculation of the daily revenue of this organization. Write it down!
Pizzas/sushi/tow trucks/luxury car rental. Write down the data
Elite prostitutes who charge from $500 per night. You must first call and find out if she works this or next week, more expenses
DDoS attack on the victim's phone.
Select a victim, order a DDoS attack (Telephone flood) on the victim's phones
How a DDoS attack occurs:
A call comes to the phone of the subscriber being attacked.
As soon as the subscriber accepts the call, there is an immediate automatic drop and redial. If the called subscriber drops the call or the line is busy, then a redial also follows. If the subscriber turns off the phone, the system will still continue to try to call him. And as soon as the phone is turned on again, calls immediately start coming again.
In summary:
A phone processed in this way becomes a completely useless and noisy piece of plastic for the entire duration of the attack. Organizations whose successful activity directly depends on the ability of clients to contact them can suffer very significant damage, both financially and in terms of their reputation.
Look for the contacts of the DDoSers yourself.
To begin with, I recommend ordering a DDoS attack on regular phone numbers (cell and landline). And as soon as you earn your first money, you can also use the PBX.
When ordering blocking, we indicate all the numbers for receiving orders of the organization we have chosen. The duration of the blocking is within 24 hours, only on prostitutes we have to flood for up to 7 days. We set the start time of the blocking from 10 am to 10 am local time in the region where the victim is located.
As a result of blocking, the organization suffers a daily financial turnover, loses new and old clients. In case of working with taxis and tow trucks, plus the above, there is a downtime of cars. Accordingly, no one will change phone numbers, since they are present in all types of advertising.
During the blocking process, contacting authorities or telephone operators will not lead to anything - I checked this during my work.
After the attack is completed, create a new email and write the following text to the email:
(Example)
Hello. To avoid further communication problems, please transfer $300 to your VISA card within 3 hours. Phones will work after the money is transferred from the card. Otherwise, your phones will be blocked for seven days. We will not waste your and our time.
Duplicate this same message and send it through the feedback form.
Then send the message:
(Example)
To avoid further communication problems, please read the letter in your email.
Specify the amount based on 10-30% of the daily cash turnover of the organization. For example: Based on your approximate calculation when choosing an organization. The daily turnover is $1500, specify $300-400. You shouldn't be impudent either. Is it possible to make money on prostitutes?
Then we wait... After 3 hours, we go to the Internet bank and look at the amount on the card balance.
According to statistics, 3 out of 5 victims immediately transfer money, the 4-5th send after the continuation of the attack the next day, in which case we increase the amount by $50-200, the 5th may not send. We usually forget about the 5th.
Cashing out money.
Put on a cap, glasses, a cap, a mustache, a beard (who is good at what) and in the evening, we withdraw honestly earned money.
Phone, SIM cards, laptop hard drive, card, everything is broken and thrown away!
MANDATORY! No need to skimp, the most important thing is YOUR SAFETY!
But cashing out with a card is the most dangerous way to withdraw money, but not a pain in the ass.
In general, as an option, make a Yandex card or Qiwi, when replenishing the account, immediately transfer the money to bitcoins and there you can do whatever you want.