{"id":21360,"date":"2023-02-28T05:20:55","date_gmt":"2023-02-28T13:20:55","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/02\/28\/news-15091\/"},"modified":"2023-02-28T05:20:55","modified_gmt":"2023-02-28T13:20:55","slug":"news-15091","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/02\/28\/news-15091\/","title":{"rendered":"Sour Grapes: stomping on a Cambodia-based \u201cpig butchering\u201d scam"},"content":{"rendered":"<p><strong>Credit to Author: gallagherseanm| Date: Tue, 28 Feb 2023 11:00:10 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>The success of \u201cpig butchering\u201d (sha zhu pan, \u6740\u732a\u76d8) scams has driven the expansion of their hunt for new victims, both by well-established and well-organized scam rings and by smaller and less professional copycats. In the fake gold trading scam I discussed in <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/02\/13\/fools-gold-dissecting-a-fake-gold-market-pig-butchering-scam\/\">my last report<\/a>, for example, initial contact of victims was made through Twitter. Others we\u2019ve seen have used Facebook Messenger for their initial approach, or other social media and messaging apps. And several others I\u2019ve encountered\u2014including the one detailed in this report\u2014have reached out with a lure message over Apple\u2019s iMessage or other digital channels for Short Message Service (SMS) texts.<\/p>\n<p>These texts, which are usually designed to look like accidental mis-texts, are really designed to allow the scammers to spam large numbers of potential victims and then selectively engage those who text back. From there, they attempt to engage in casual conversation, and then suggest that the digital meet-cute is a sign that they are \u201cfated to be friends.\u201d From there, the scam follows a familiar pattern\u2014moving the target to another messaging platform for easier engagement while freeing up the text account to approach additional victims or be shut down while another number is set up.<\/p>\n<p>As I discussed in our previous report, I received a deliberately mis-addressed text message on one of my phones that led me into an engagement with the scam ring (which I have designated as \u201cSour Grapes\u201d for reasons that will soon become apparent), with a young Malaysian woman acting as the face of the scam and occasionally directly interacting with me.<\/p>\n<p>From the data I was able to gather during the interaction, I determined that the ring she was working for had gathered over $3 million US in cryptocurrency over a 5-month period\u2014and that it was one of hundreds of nearly identical scam operations using similar lures and nearly identical websites and apps. While we were unable to gather full wallet data associated with these other fake trading and liquidity mining apps, we assume the overall take of this ring is much larger.<\/p>\n<p>As we were preparing this report, my colleague Jagadeesh Chandaraiah got a message from an individual in the US who had received an almost identical set of communications\u2014only in his case, the woman was Vietnamese, and the scam was focused on \u201ccontract mining\u201d\u2014another name <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/05\/17\/liquidity-mining-scams-add-another-layer-to-cryptocurrency-crime\/\">for liquidity mining.<\/a>\u00a0 We uncovered a number of fake decentralized finance apps purporting to be for liquidity mining among the other sites using similar domains and infrastructure to the Sour Grapes scam.<\/p>\n<p>This type of lure is particularly popular with Chinese organized crime operations working out of countries in Southeast Asia. Several of these operations have been identified by previous reporting as being based in Special Economic Zones (SEZs) in Cambodia (where this scam\u2019s human operations were based), Myanmar, \u00a0Laos, and other countries.<\/p>\n<figure id=\"attachment_90018\" aria-describedby=\"caption-attachment-90018\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-90018 size-large\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png?w=640\" alt=\"Diagram of a sha zhu pan scam organization\" width=\"640\" height=\"360\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png 2322w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png?resize=300,169 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png?resize=768,432 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png?resize=1024,576 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png?resize=1536,865 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-1-cambodia.png?resize=2048,1153 2048w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-90018\" class=\"wp-caption-text\">Fig 1: A representation of the organizational structure of the \u201cSour Grapes\u201d &#8220;pig butchering&#8221; scam ring, based on collected data and previous research.<\/figcaption><\/figure>\n<p>The teams running these scams include a young man or woman acting as the face of the scam, keyboarders who keep the victim engaged, and a team generating and repurposing media content to help fill the message exchanges with targets with fabricated proof of their backstory. They may also abuse mapping services to make it appear their persona is where and who they claim to be.<\/p>\n<p>It is the long duration and complexity of the communications these scam rings engage in that makes them particularly convincing to even some more skeptical targets. In this case, the scammers made first contact with me on October 31, and messaged me multiple times a day all the way through December to get me to enroll in their fraudulent cryptocurrency trading scheme. During that period, I was able to identify much of their infrastructure, including wallet addresses and web resources used by the scheme and fake applications for both iOS and Android, and share them with other organizations; twice, the scammers were forced to change wallet addresses, and they had to change domains for their websites while still trying to convince me of their legitimacy.<\/p>\n<p>Several things stood out about this group. First, it was clear that the group had taken pains to build a somewhat credible backstory for their persona, on the level we have seen from Facebook-based scams. The woman who was the face of the scam was actively involved in it, and made several video calls to ensure that I was going to take the bait. And while not as sophisticated as some of the other groups we\u2019ve encountered from a technical perspective, the scammers were able to quickly respond to takedowns of their infrastructure.<\/p>\n<p>But it was also clear that multiple people were involved in maintaining contact with me, and had limited knowledge of operational security techniques or even the culture of the country they were claiming to live in. \u00a0If these organizations start learning how to create more consistent, locale-specific technology footprints\u2014and do more thorough coaching of their front-line texting operatives\u2014then these scams could become much more convincing and catch even more victims with their lures.\u00a0 Education on the scope of these scams remains the best defense against them.<\/p>\n<h3>All trick, no treat<\/h3>\n<p>On October 31, I received a random text message on one of my phones: \u201cHi Jane are you still in Boston?\u201d<\/p>\n<figure id=\"attachment_90020\" aria-describedby=\"caption-attachment-90020\" style=\"width: 1230px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure2.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-90020 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure2.jpg\" alt=\"screen shot of text messsages: &quot;Hey Jane are you still in Boston? I'm Really sorry ! I saved the wrong number and it was so embarrassing&quot;\" width=\"1230\" height=\"1944\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure2.jpg 1230w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure2.jpg?resize=190,300 190w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure2.jpg?resize=768,1214 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure2.jpg?resize=648,1024 648w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure2.jpg?resize=972,1536 972w\" sizes=\"auto, (max-width: 1230px) 100vw, 1230px\" \/><\/a><figcaption id=\"caption-attachment-90020\" class=\"wp-caption-text\">Figure 2: A screen shot of my initial conversation with \u201cHarley\u201d.\u00a0 My Chinese reply,\u201d ni hao ma?\u201d (how are you) is ignored.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>That was the first message I received from \u201cHarley,\u201d the persona associated with this scam attempt. The message came from a number associated with Sinch Voice, a Sweden-based VoIP provider, linked to a Louisiana phone number. \u00a0\u201cHarley\u201d claimed be in Vancouver, British Columbia.<\/p>\n<p>As with the previous &#8220;pig butchering&#8221; scam I detailed, I was honest about my line of work: I told Harley that I worked in cybersecurity. This did not seem to matter as much as my age and whether I was alone. I provided the answers the scammers wanted to hear (over 50, living alone), and Harley eagerly continued the conversation, sending a photo of herself standing next to an elaborate bar. As I would learn from later video interaction, the person in the photo was an active member of the scam team as well as its face.<\/p>\n<figure id=\"attachment_90021\" aria-describedby=\"caption-attachment-90021\" style=\"width: 620px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-3_pig_butchering_lure.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90021\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-3_pig_butchering_lure.jpg\" alt=\"\" width=\"620\" height=\"826\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-3_pig_butchering_lure.jpg 620w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-3_pig_butchering_lure.jpg?resize=225,300 225w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><figcaption id=\"caption-attachment-90021\" class=\"wp-caption-text\">Figure 3. The photo sent by \u201cHarley\u201d via text message.<\/figcaption><\/figure>\n<p>Later photoanalysis and research revealed that this was a photo from a <a href=\"https:\/\/www.premiumbusinesstravel.com\/rosewood-phnom-penh\/\">hotel bar in Phnom Penh<\/a>.<\/p>\n<p>The written English in the texts was clumsy in places, and probably run through computer translation in places \u2013 as in when the person behind the texts asked, \u201cdo you sing telegram?\u201d when they were trying to move the conversation over to that messaging service. The Telegram account used by \u201cHarley\u201d was associated with a number from a UK mobile carrier (EE Ltd.).<\/p>\n<p>While this detail was shared with the previous scam I researched, there was a significant difference in the interactions once we got to Telegram. Harley came with a very rich backstory: she claimed to run a wine business in Vancouver (giving the name of a specific British Columbia winery), and said that her family was originally from Malaysia. \u00a0She also set up an emotional appeal, telling of how her husband, who used her father\u2019s help to start his own \u201cwine factory,\u201d cheated on her and left her while she was pregnant with their child. This included a story of how she got a hotel employee to give her a key to the room he was meeting his mistress in:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-4-backstory.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90022\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-4-backstory.jpg\" alt=\"Figure 4: Part of Harley\u2019s backstory.\" width=\"640\" height=\"337\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-4-backstory.jpg 777w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-4-backstory.jpg?resize=300,158 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-4-backstory.jpg?resize=768,404 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a>Figure 4: Part of Harley\u2019s backstory.<\/p>\n<p>Harley added that the business had struggled because of COVID-19. And of course, she was able to rescue her wine business with the help of her aunt, who taught her how to make money trading cryptocurrency.<\/p>\n<p>Harley (or the keyboarders operating on her behalf) also sent additional photos of cases of wine, videos of bottling operations, and other content intended to establish Harley as being in the \u201cgrape factory\u201d business. The photos, when analyzed carefully, told a different story, of course; the cases of wine she claimed were from her vineyard and the bottles on the line in her \u201cgrape factory\u201d were marked with the name of a French winery, and not the name of the winery she claimed to be connected to.<\/p>\n<figure id=\"attachment_90048\" aria-describedby=\"caption-attachment-90048\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-5-wine-shop-pb-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-90048 size-large\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-5-wine-shop-pb-1-e1677249388682.png?w=640\" alt=\"Telegram screenshot showing pictures of wine storage and sales displays.\" width=\"640\" height=\"971\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-5-wine-shop-pb-1-e1677249388682.png 879w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-5-wine-shop-pb-1-e1677249388682.png?resize=198,300 198w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-5-wine-shop-pb-1-e1677249388682.png?resize=768,1166 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-5-wine-shop-pb-1-e1677249388682.png?resize=675,1024 675w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-90048\" class=\"wp-caption-text\">Figure 5: the alleged Vancouver wine store that Harley claimed to own. The boxes tie it to a winery in France.<\/figcaption><\/figure>\n<p>There was some effort made to give this story a modicum of credibility. She gave the name of an actual British Columbia-based winery as her business, and a search for the store location she had given me resulted in a hit on Apple Maps\u2014a user-contributed location which, when checked with Google Street View, turned out to be a local office for the VoIP provider Telus. The location is marked by Apple as \u201cpermanently closed\u201d now.<\/p>\n<figure id=\"attachment_90030\" aria-describedby=\"caption-attachment-90030\" style=\"width: 350px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-6.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90030\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-6.png\" alt=\"Screen shot of Apple Maps address description.\" width=\"350\" height=\"429\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-6.png 350w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-6.png?resize=245,300 245w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><figcaption id=\"caption-attachment-90030\" class=\"wp-caption-text\">Figure 6: A screenshot of the Apple Maps location returned by a web search; the address is a Telus office.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Harley claimed to have two of these shops in Vancouver and said she was planning to open one in New York, \u201cbut my business is costing me a lot of money because of COVID-19, About $1 million, but I recovered a lot by investing in cryptocurrencies and early real estate.\u201d<\/p>\n<p>And thus crypto began to work its way into the conversation.<\/p>\n<p>The next day, the person behind Harley\u2019s keyboard told me she was headed out to pay employees at \u201cthe grape factory.\u201d \u00a0A video of Harley on a treadmill holding up her phone for a selfie and saying \u201cI\u2019m working out\u201d was supplied to validate her claim of hitting the gym.<\/p>\n<figure id=\"attachment_90049\" aria-describedby=\"caption-attachment-90049\" style=\"width: 564px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-7-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-90049 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-7-1.png\" alt=\"A Telegram screenshot showing a video of a woman on a treadmill and text saying &quot;I went to the gym in the morning and now I'm going to have breakfastr. I went to the Royal Bank of Canada to withdraw some funds and go back to the grape factory, because the employees are about to be paid.&quot;\" width=\"564\" height=\"774\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-7-1.png 564w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-7-1.png?resize=219,300 219w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><\/a><figcaption id=\"caption-attachment-90049\" class=\"wp-caption-text\">Figure 7: Heading to the grape factory.<\/figcaption><\/figure>\n<p>I asked her to send pictures, hoping for exterior shots of her claimed winery (or \u201cgrape factory\u201d), but instead she sent a video taken from a French winery\u2019s website of a bottling line in operation, the labels of the bottles plainly visible. Then she added a photo from inside her \u201cworkshop,\u201d showing her in front of a glass storage case filled with bottles with Chinese labels.<\/p>\n<figure id=\"attachment_90050\" aria-describedby=\"caption-attachment-90050\" style=\"width: 525px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-8-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-90050 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-8-1.png\" alt=\"A Telegram screenshot showing a video of a wine bottling line and a photo of a woman in front of an alchohol display case.\" width=\"525\" height=\"720\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-8-1.png 525w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-8-1.png?resize=219,300 219w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/a><figcaption id=\"caption-attachment-90050\" class=\"wp-caption-text\">Figure 8: the bottling line video and another photo purported to be from the \u201cgrape factory\u201d, which then became \u201cwine production workshop.\u201d The video is from a French bottling operation.<\/figcaption><\/figure>\n<p>There were also frequent hints at how well she was doing now: photos of her shopping hauls, of food she was preparing or had purchased, and of the cars she claimed to own (including a Ferrari).<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_90044\" aria-describedby=\"caption-attachment-90044\" style=\"width: 486px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-9.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90044\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-9.png\" alt=\"Telegram screenshot\" width=\"486\" height=\"600\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-9.png 486w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-9.png?resize=243,300 243w\" sizes=\"auto, (max-width: 486px) 100vw, 486px\" \/><\/a><figcaption id=\"caption-attachment-90044\" class=\"wp-caption-text\">Figure 9: Harley in a Ferrari in a basement garage. The Ferrari is just one of several luxury vehicles featured in photos sent by the scammers.<\/figcaption><\/figure>\n<p>\u00ad\u00ad\u00adThe Ferrari and other cars, along with photos of food and expensive consumer products, would be a major portion of the conversation over the next month. Harley also expounded on other personal matters, including how fragile she was emotionally because of her recent abandonment by her husband, and how her child with her ex-husband was being raised by her parents.<\/p>\n<figure id=\"attachment_90051\" aria-describedby=\"caption-attachment-90051\" style=\"width: 395px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-10-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-90051 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-10-1.png\" alt=\"Telegram chat screenshots with images of a woman behind the wheel of a Ferrari and laying in bed in pajamas.\" width=\"395\" height=\"669\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-10-1.png 395w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-10-1.png?resize=177,300 177w\" sizes=\"auto, (max-width: 395px) 100vw, 395px\" \/><\/a><figcaption id=\"caption-attachment-90051\" class=\"wp-caption-text\">Figure 10: The pitch for crypto trading is worked into a continuing stream of selfies. Despite being allegedly in Canada, Harley translated her \u201clocal\u201d weather to Fahrenheit for me.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>By two weeks in, Harley was going deep into her fictional backstory of betrayal, retreat from the world, and eventual redemption through crypto trading under the guidance of her aunt. She also told me how I (her target) was her only male friend and confidante.\u00a0 \u201cSo I hope that every day in the future we can cherish everything and cherish each other! keep our friendship alive,\u201d she typed.<\/p>\n<p>&nbsp;<\/p>\n<p>An invitation to visit came, as well as an invitation to spend time with her at her \u201cvilla\u201d in Miami.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_90046\" aria-describedby=\"caption-attachment-90046\" style=\"width: 624px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-11.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90046\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-11.png\" alt=\"Telegram screenshot\" width=\"624\" height=\"752\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-11.png 624w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-11.png?resize=249,300 249w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><figcaption id=\"caption-attachment-90046\" class=\"wp-caption-text\">Figure 11: Harley\u2019s \u201cMiami villa\u201d<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>But there were never any pictures of Harley outside. Other than the videos and photos sent showing her exercising, shopping, or getting into the Ferrari, all the photos of Harley were in the same room with paneling and acoustic tiles with no other features visible, or at a desk in what appeared to be a hotel business center or conference room. The gym photos appeared to be from a hotel workout room.<\/p>\n<p>The long chatting period was punctuated, of course, with comments about how she was making huge profits on short-term crypto trades.<\/p>\n<h3>Trying to close the deal<\/h3>\n<p>&nbsp;<\/p>\n<p>After nearly a month of this, I decided to accelerate the process, and mentioned to Harley that I was curious about how she was making so much money. Harley said her aunt had taught her to do this, and that she could share the same market intelligence her aunt apparently gave her.<\/p>\n<figure id=\"attachment_90052\" aria-describedby=\"caption-attachment-90052\" style=\"width: 550px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-12-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-90052 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-12-1.png\" alt=\"\" width=\"550\" height=\"436\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-12-1.png 550w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-12-1.png?resize=300,238 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/a><figcaption id=\"caption-attachment-90052\" class=\"wp-caption-text\">Figure 12: I finally take the bait.<\/figcaption><\/figure>\n<p>First, she said, I needed to buy some cryptocurrency with a Crypto.com wallet. This scam specifically targeted Crypto.com, with Coinbase as a backup; they explicitly avoided the market giant Binance.<\/p>\n<figure id=\"attachment_90053\" aria-describedby=\"caption-attachment-90053\" style=\"width: 554px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-13.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90053\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-13.png\" alt=\"Telegram chat screenshot in which the scammer says to use crypto.com.\" width=\"554\" height=\"150\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-13.png 554w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-13.png?resize=300,81 300w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/a><figcaption id=\"caption-attachment-90053\" class=\"wp-caption-text\">Figure 13: Crypto.com is the target of choice.<\/figcaption><\/figure>\n<p>To get started, Harley told me I needed at least $2000 USD:<\/p>\n<figure id=\"attachment_90054\" aria-describedby=\"caption-attachment-90054\" style=\"width: 624px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-14.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90054\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-14.png\" alt=\"Telegram screenshot of conversation in which scammer says to invest $2000 to start.\" width=\"624\" height=\"688\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-14.png 624w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-14.png?resize=272,300 272w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><figcaption id=\"caption-attachment-90054\" class=\"wp-caption-text\">Figure 14: There\u2019s a $2,000 floor for this scam.<\/figcaption><\/figure>\n<p>I balked at this, and held off furthering the \u201clesson\u201d until after Thanksgiving. However, I asked her if there were any other apps I needed, and she directed me to a download link to install apps\u2014either an Android application or a \u201cWebclip\u201d for iOS with a provisioning profile. Both used the logo and name of TradingView, the market charting app provider.<\/p>\n<p>From the web clip provisioning profile, I harvested the website being used to front the iOS version of the fake app. From the US, it resolved to an Amazon Web Services Cloudfront host. Passive DNS records also resolved the domain to a host in Hong Kong.<\/p>\n<p>To make sure I was actually going to pony up the $2000 worth of Tether cryptocurrency (USTD, a \u201cstablecoin\u201d closely pegged to the US dollar) that Harley suggested I needed for \u201clearning,\u201d she wanted to walk me through screenshots of the purchase. She also made a video call to me to make sure I was going to do it. I fabricated a screenshot of a Crypto.com wallet with 2,200 USDT in it to provide (from one with a balance of $2), and sent it along.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_90055\" aria-describedby=\"caption-attachment-90055\" style=\"width: 612px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-15.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90055\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-15.png\" alt=\"A screenshot of a Telegram chat showing a Crypto.com wallet with a balance of 2,200 USDT.\" width=\"612\" height=\"490\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-15.png 612w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-15.png?resize=300,240 300w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><\/a><figcaption id=\"caption-attachment-90055\" class=\"wp-caption-text\">Figure 15: I sent a forged Crypto.com wallet balance screen shot.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h3>The app<\/h3>\n<p>Harley gave me a link to download an app for the next step (hxxps:\/\/www[.]tdvies[.]com\/download) . She followed up with instructions on how to deposit funds. \u00a0Since it was the Thanksgiving holiday, I applied the brakes a bit again on moving forward\u2014and began to do some technical analysis.<\/p>\n<p>The download site, purporting to be for an app from the trade charting software provider TradingView, had two buttons. The first was for an Android .APK file hosted on another site (hxxp:\/\/app[.]tdviewdn[.]vip). The second, for iOS, downloaded a mobile profile file for installing a \u201cweb clip\u201d application pointing to yet another site (hxxps:\/\/www[.]ksjbfs[.]vip).<\/p>\n<p>&nbsp;<\/p>\n<p>Figure 16. The mobile profile downloaded by iOS to install the scammer\u2019s web clip.<\/p>\n<p>Figure 17 The URL serving up the web clip.<\/p>\n<p>The Android app and the web clip both functioned identically; they were tied to the same backend, so a username and password set on one worked on the other. The Android app made web calls to another site (hxxps:\/\/www[.]gefwts[.]vip), which provided a set of web service hooks.<\/p>\n<div id='gallery-1' class='gallery galleryid-90014 gallery-columns-3 gallery-size-large'>\n<figure class='gallery-item'>\n<div class='gallery-icon portrait'> \t\t\t\t<a href='https:\/\/news.sophos.com\/en-us\/2023\/02\/28\/sour-grapes-stomping-on-a-cambodia-based-pig-butchering-scam\/figure-19-2\/'><img width=\"578\" height=\"1024\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-19.png?w=578\" class=\"attachment-large size-large\" alt=\"The Android app interface is identical to the web interface.\" decoding=\"async\" loading=\"lazy\" aria-describedby=\"gallery-1-90056\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-19.png 776w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-19.png?resize=169,300 169w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-19.png?resize=768,1361 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-19.png?resize=578,1024 578w\" sizes=\"auto, (max-width: 578px) 100vw, 578px\" \/><\/a> \t\t\t<\/div><figcaption class='wp-caption-text gallery-caption' id='gallery-1-90056'> \t\t\t\tFigure 19: The Android app interface is identical to the web interface. \t\t\t\t<\/figcaption><\/figure>\n<figure class='gallery-item'>\n<div class='gallery-icon portrait'> \t\t\t\t<a href='https:\/\/news.sophos.com\/en-us\/2023\/02\/28\/sour-grapes-stomping-on-a-cambodia-based-pig-butchering-scam\/figure-20-2\/'><img width=\"577\" height=\"1024\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-20.png?w=577\" class=\"attachment-large size-large\" alt=\"The Android app interface is identical to the web interface.\" decoding=\"async\" loading=\"lazy\" aria-describedby=\"gallery-1-90057\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-20.png 782w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-20.png?resize=169,300 169w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-20.png?resize=768,1362 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-20.png?resize=577,1024 577w\" sizes=\"auto, (max-width: 577px) 100vw, 577px\" \/><\/a> \t\t\t<\/div><figcaption class='wp-caption-text gallery-caption' id='gallery-1-90057'> \t\t\t\tFigure 20: Brand-jacking TradingView; other identical apps used other crypto-related brands. \t\t\t\t<\/figcaption><\/figure>\n<figure class='gallery-item'>\n<div class='gallery-icon portrait'> \t\t\t\t<a href='https:\/\/news.sophos.com\/en-us\/2023\/02\/28\/sour-grapes-stomping-on-a-cambodia-based-pig-butchering-scam\/figure-21\/'><img width=\"579\" height=\"1024\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-21.png?w=579\" class=\"attachment-large size-large\" alt=\"The Android app interface is identical to the web interface.\" decoding=\"async\" loading=\"lazy\" aria-describedby=\"gallery-1-90058\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-21.png 782w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-21.png?resize=170,300 170w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-21.png?resize=768,1359 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-21.png?resize=579,1024 579w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/a> \t\t\t<\/div><figcaption class='wp-caption-text gallery-caption' id='gallery-1-90058'> \t\t\t\tFigure 21: To &#8220;deposit&#8221; funds, a wallet address was provided for each type of crypto accepted. \t\t\t\t<\/figcaption><\/figure>\n<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>From the app, I was able to get the wallets used for \u201cdeposit\u201d of assets (both USDT and BTC wallets were listed). I was also able to pivot off the web sites themselves to identify similar web and Android apps on the same and other hosts. Other apps I found guarded against non-targeted individuals from gaining access to wallet data by requiring an invitation code to register.<\/p>\n<p>So far, I\u2019ve found more than 500 additional domains associated with the same basic kit. The fake exchange (and in some cases, fake decentralized finance staking) sites hijacked a variety of crypto-trading brand names:<\/p>\n<p class=\"jetpack-slideshow-noscript robots-nocontent\">This slideshow requires JavaScript.<\/p>\n<div id=\"gallery-90014-1-slideshow\" class=\"jetpack-slideshow-window jetpack-slideshow jetpack-slideshow-black\" data-trans=\"fade\" data-autostart=\"1\" data-gallery=\"[{&quot;src&quot;:&quot;https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-22.png?w=640&quot;,&quot;id&quot;:&quot;90062&quot;,&quot;title&quot;:&quot;figure-22&quot;,&quot;alt&quot;:&quot;screenshot of fake app store&quot;,&quot;caption&quot;:&quot;Fig. 22: Additional scam app downloads and web apps identical to the ones used by the Sour Grapes ring.&quot;,&quot;itemprop&quot;:&quot;image&quot;},{&quot;src&quot;:&quot;https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-23.png?w=629&quot;,&quot;id&quot;:&quot;90063&quot;,&quot;title&quot;:&quot;figure-23&quot;,&quot;alt&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Fig. 23: Additional scam app downloads and web apps identical to the ones used by the Sour Grapes ring.&quot;,&quot;itemprop&quot;:&quot;image&quot;},{&quot;src&quot;:&quot;https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-24.png?w=577&quot;,&quot;id&quot;:&quot;90064&quot;,&quot;title&quot;:&quot;figureu0026#8211;24&quot;,&quot;alt&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Fig 24: Additional scam app downloads and web apps identical to the ones used by the Sour Grapes ring.&quot;,&quot;itemprop&quot;:&quot;image&quot;},{&quot;src&quot;:&quot;https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-25.png?w=626&quot;,&quot;id&quot;:&quot;90065&quot;,&quot;title&quot;:&quot;figure-25&quot;,&quot;alt&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Fig 25: All the apps had the same interface as the Sour Grapes ringu0026#8217;s.&quot;,&quot;itemprop&quot;:&quot;image&quot;}]\" itemscope itemtype=\"https:\/\/schema.org\/ImageGallery\"><\/div>\n<p>&nbsp;<\/p>\n<p>A list of these domains, as well as the wallets associated with some of the apps, is provided as part of the <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/ShaZhuPanfakeapps.csv\">indicators of compromise file posted to our GitHub page.<\/a><\/p>\n<p>A majority of these sites were hosted through Amazon Web Services\u2019 CloudFront service provided through a reseller; others were hosted through Cloudflare, and many also resolved to a Hong Kong-based hosting service. Almost all of the domains were registered through Namecheap.<\/p>\n<p>A full list is in the indicators of compromise file posted to the SophosLabs GitHub. We have shared the domain list with AWS and Cloudflare, and are continuing to gather additional domains linked to the software kits used by these scam operations.<\/p>\n<p>All of the apps and websites were coded by Chinese-speaking programmers. The Android apps use a push update library written by a Hunan-based developer who goes by the moniker \u201c<a href=\"https:\/\/yoouu.cn\/about\/\">SunSeeker X,\u201d<\/a> and other artifacts and the backing infrastructure indicate these websites and apps are maintained by a China-based IT team.<\/p>\n<p>I shared the first set of wallets I had found with the crypto tracking company Chainalysis and with crypto exchange threat researchers, and the domains associated with the app with AWS.\u00a0 Shortly afterward, they went dead. I asked Harley what was going on, as the app did not work; I was given new links to the apps, which had new wallets. I repeated this process.<\/p>\n<p>The first set of wallets had taken in $102,839 worth of Tether and $247,251 worth of Bitcoin; these wallets were active until January, when they were cashed out. A second USDT wallet, also cashed out and inactive since January, took in $118,871. The most recent USDT wallet has received $1,892,610.31 as of February 15; the most recent Bitcoin wallet address has received $608,213 worth of BTC.<\/p>\n<p>That is over $3 million over a five-month period from a single scam operation. In the case of the largest wallet, we identified inbound Tether transactions from 57 wallet addresses; of these, the majority came from Crypto.com wallets or from private wallets that had been filled from Crypto.com (as they had in the other, less active wallets).<\/p>\n<p>According to analysis by Jacquiline Koven of Chainalysis, the scammers moved crypto deposited in the wallets to the Tokenlon exchange, which has recently been used to launder a large volume of &#8220;pig butchering&#8221; scam funds.<\/p>\n<h3>Where\u2019s Harley?<\/h3>\n<p>As I continued to drag my feet on pulling the trigger on \u201cinvesting.\u201d I received a video call over Telegram from Harley. She was standing in front of a beige, sound-proofed wall, and all she really wanted to talk to me about was whether I was going to follow through and deposit crypto. There were several voice call follow-ups from her. The person in the video call was the woman in the photos that had been sent to me, but it was clear from her English language skills that she was not the only one sending me texts; her English was not consistent with the \u201cgrape factory\u201d level malapropisms of some of the daily messages I received.<\/p>\n<p>I dropped a news story about &#8220;pig butchering&#8221; operations in Cambodia wrapped in a tracking link into a conversation about my concerns. That link was opened 5 times\u2014first on an iPhone on one network, and then on four different Windows 10 desktops on another. Both networks, fronted by MicroTik routers, were provided by the same Phnom Penh-based ISP. Based on further refinement, the Windows computers appeared to be in the beach resort town of Sihanoukville, a known center of Chinese pig slaughtering operations.<\/p>\n<figure id=\"attachment_90067\" aria-describedby=\"caption-attachment-90067\" style=\"width: 468px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-26.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90067\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-26.png\" alt=\"Table with location data on scammer's phone, redacted.\" width=\"468\" height=\"244\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-26.png 468w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-26.png?resize=300,156 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/a><figcaption id=\"caption-attachment-90067\" class=\"wp-caption-text\">Figure 26. Geolocation and system information on Harley\u2019s iPhone.<\/figcaption><\/figure>\n<figure id=\"attachment_90068\" aria-describedby=\"caption-attachment-90068\" style=\"width: 468px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-27.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90068\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-27.png\" alt=\"Figure 27. One of four keyboarders\u2019 computers that opened the link from a different network.\" width=\"468\" height=\"329\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-27.png 468w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/figure-27.png?resize=300,211 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/a><figcaption id=\"caption-attachment-90068\" class=\"wp-caption-text\">Figure 27. One of four keyboarders\u2019 computers that opened the link from a different network.<\/figcaption><\/figure>\n<p>To see how the team behind Harley would react, I said that I would be traveling to Vancouver for work and wanted to meet them in person. They agreed and promised to meet with me. A few days later I told them that I was at the address of Sophos\u2019 office in Vancouver.<\/p>\n<p>They then accused me of trying to scam them. Communications were cut off, and our chat was deleted (but not before I archived it).<\/p>\n<h3>Conclusions<\/h3>\n<p>During my investigation of this particular ring, a target of a similar scam reached out to us. His story almost exactly mirrored my experience with a few exceptions\u2014the woman claimed to be Vietnamese and in New York running a makeup business, and she wanted him to use Crypto.com to join a \u201ccontract mining\u201d scheme (a fake decentralized finance operation based on \u201cliquidity mining\u201d like the one I <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/05\/17\/liquidity-mining-scams-add-another-layer-to-cryptocurrency-crime\/\">investigated<\/a> last year).\u00a0 I found a number of fake liquidity mining sites using the same style app distribution and web application frameworks as the fake trading sites I had uncovered, leading me to believe with confidence that this was another operation affiliated with the same Chinese \u201cback office\u201d supporting the \u201cgrape factory\u201d crew, suggesting a very large-scale overall operation with many social engineering franchises providing the flow of victims.<\/p>\n<p>The nature of these operations has been well-documented<a href=\"https:\/\/m-fx361-com.translate.goog\/news\/2020\/1210\/7315273.html?_x_tr_sl=zh-CN&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=sc\"> elsewhere<\/a>\u2014in some cases, the people behind the keyboards are not there of their own volition and were lured by fake employment ads for high-paying jobs. Others are willing participants and are paid well for their performances in comparison to what they could earn in the local economy.<\/p>\n<p>Regardless of how they are recruited, these keyboarders are part of an industrialized scam operation that is willing to invest hundreds of hours in conversation with victims in order to steer them toward investment and then extract all the value they can from them. They have refined emotional manipulation to a science. And their operational security skills are improving as they attract greater scrutiny.<\/p>\n<p>In the long term, the best defense against these scams (as with all cyber scam operations) remains public education\u2014the infrastructure is too fluid, and the tactics used by these operations are being adapted by cybercriminal rings around the world. Each time one set of infrastructure was identified and targeted, the scammers would simply switch on a new one; this may have caused minor disruption to their cash flow from victims, but it is evident from the wallet transactions tracked that they still were able to rake in millions.<\/p>\n<p>Law enforcement and threat research collaboration can increase the cost of running these scams, and perhaps with time disrupt the financial operations behind them, but a lack of international cooperation on cybercrime will continue to give the people behind these rings a safe harbor to operate from.<\/p>\n<p>&nbsp;<\/p>\n<p>Sophos X-Ops would like to thank Jagadeesh Chandraiah of SophosLabs and Jacquiline Koven of Chainalysis for their contributions to this report, and the threat teams at Coinbase and Amazon Web Services for their assistance in blocking and taking down scam infrastructure.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/02\/28\/sour-grapes-stomping-on-a-cambodia-based-pig-butchering-scam\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/shutterstock_143230831.jpg\"\/><\/p>\n<p><strong>Credit to Author: gallagherseanm| Date: Tue, 28 Feb 2023 11:00:10 +0000<\/strong><\/p>\n<p>A text message leads to discovery of a vast scam infrastructure run by Chinese cyber-criminals.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[25389,25390,23933,129,28485,28486,16771],"class_list":["post-21360","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-cryptocurrency-fraud","tag-cryptorom","tag-fake-apps","tag-featured","tag-pigbutchering","tag-shazhupan","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21360"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21360\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21360"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}