{"id":20803,"date":"2022-12-14T05:23:30","date_gmt":"2022-12-14T13:23:30","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/12\/14\/news-14536\/"},"modified":"2022-12-14T05:23:30","modified_gmt":"2022-12-14T13:23:30","slug":"news-14536","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/12\/14\/news-14536\/","title":{"rendered":"The scammers who scam scammers on cybercrime forums: Part 2"},"content":{"rendered":"<p><strong>Credit to Author: Matt Wixey| Date: Wed, 14 Dec 2022 12:00:20 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Following on from <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/12\/07\/the-scammers-who-scam-scammers-on-cybercrime-forums-part-1\/\">the first chapter of our investigation into scammers who scam scammers<\/a>, we turn to the variety of scams on criminal marketplaces \u2013 which range from crude \u2018rip-and-runs\u2019 to sophisticated, long-term efforts.<\/p>\n<h2>Rip-and-run<\/h2>\n<p>One of the most common scams, a \u2018rip-and-run\u2019 can work in two ways: A buyer receives goods but doesn\u2019t pay for them, or a seller receives payment but doesn\u2019t deliver. That\u2019s the \u2018rip.\u2019 The \u2018run\u2019 part means that the scammer goes dark, refusing to answer messages or disappearing from the forum altogether.<\/p>\n<p>Rip-and-runs usually involve small amounts, but there are exceptions.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image1-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88524\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image1-1.png\" alt=\"A scam report detailing a scam whereby a seller received money and then disappeared\" width=\"930\" height=\"311\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image1-1.png 616w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image1-1.png?resize=300,100 300w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/a><\/p>\n<p><em>Figure 1: A simple example of a rip-and-run scam on BreachForums, involving $200 USD<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image2-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88525\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image2-1.png\" alt=\"A $1500 scam report where a seller disappeared\" width=\"924\" height=\"127\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image2-1.png 1360w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image2-1.png?resize=300,41 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image2-1.png?resize=768,105 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image2-1.png?resize=1024,140 1024w\" sizes=\"auto, (max-width: 924px) 100vw, 924px\" \/><\/a><\/p>\n<p><em>Figure 2: A higher-value rip-and-run on Exploit, for $1500<\/em><\/p>\n<p>There\u2019s not much arbitrators can do about rip-and-runs; they usually ban the scammer, but it doesn\u2019t have much impact as the scammer is long gone. From the scammer\u2019s perspective, they lose their profile (and any associated reputation points), so they\u2019ll have to start from scratch if they want to run the scam again.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image3-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88526\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image3-1.png\" alt=\"A scam report where the complainant accuses a scammer of setting up multiple profiles\" width=\"930\" height=\"266\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image3-1.png 1563w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image3-1.png?resize=300,86 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image3-1.png?resize=768,220 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image3-1.png?resize=1024,294 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image3-1.png?resize=1536,440 1536w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/a><\/p>\n<p><em>Figure 3: An example of a scammer apparently creating a new profile to commit further rip-and-run scams<\/em><\/p>\n<h2>Fake leaks and tools<\/h2>\n<p>A scam that embodies the warning <em>caveat emptor<\/em>, this attack can take various forms, although it\u2019s especially common with database trades. A scammer offers a database for sale, which is actually publicly available or previously leaked.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image4-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88527\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image4-1.png\" alt=\"A scam report accusing a user of selling fake data\" width=\"933\" height=\"299\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image4-1.png 1368w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image4-1.png?resize=300,96 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image4-1.png?resize=768,246 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image4-1.png?resize=1024,328 1024w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><\/a><\/p>\n<p><em>Figure 4: A BreachForums scam report concerning a fake database<\/em><\/p>\n<p>This type of scam is prevalent on BreachForums (and was also very popular on its predecessor, RaidForums).<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image5-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88528\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image5-1.png\" alt=\"A scam report where a scammer attempted to sell public Facebook data\" width=\"943\" height=\"271\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image5-1.png 1010w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image5-1.png?resize=300,86 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image5-1.png?resize=768,221 768w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/a><\/p>\n<p><em>Figure 5: Another scam report, this one involving a publicly available database<\/em><\/p>\n<p>The moderator\u2019s response to the above report finds in favor of the complainant, citing the forum\u2019s rules, despite the accused disputing the claim:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image6-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88529\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image6-1.png\" alt=\"A BreachForums admin reiterates the rule banning the sale of public information\" width=\"944\" height=\"90\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image6-1.png 1338w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image6-1.png?resize=300,29 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image6-1.png?resize=768,73 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image6-1.png?resize=1024,98 1024w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/a><\/p>\n<p><em>Figure 6: The moderator&#8217;s response<\/em><\/p>\n<p>But it\u2019s not just databases. Here\u2019s an example from Exploit, where one user paid $200 USD to another user to bind an executable (presumably malware) to a PDF. The buyer raised a scam report because, rather than binding the executable, the user simply gave the file a PDF icon.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image7-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88530\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image7-1.png\" alt=\"A scam report where a user wanted to bind their exe with a pdf, and instead got an exe with a pdf icon\" width=\"957\" height=\"290\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image7-1.png 1360w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image7-1.png?resize=300,91 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image7-1.png?resize=768,233 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image7-1.png?resize=1024,311 1024w\" sizes=\"auto, (max-width: 957px) 100vw, 957px\" \/><\/a><\/p>\n<p><em>Figure 7: The PDF\/exe scam report<\/em><\/p>\n<p>And, in another example from Exploit, stolen credit card data turned out to be invalid.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image8-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88531\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image8-1.png\" alt=\"A scam report where a user accuses another of providing invalid credit card data\" width=\"969\" height=\"162\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image8-1.png 1049w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image8-1.png?resize=300,50 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image8-1.png?resize=768,128 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image8-1.png?resize=1024,171 1024w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/><\/a><\/p>\n<p><em>Figure 8: A scam report involving higher percentages of invalid card data than advertised. Note that the complainant in this case was subsequently banned for scamming!<\/em><\/p>\n<p>We saw numerous examples of users buying services, tools, and frameworks which were not as advertised or which did not meet requirements. The accused don\u2019t usually do a runner after pulling these scams, but instead, as one commenter pointed out in the PDF\/exe thread, hope that their \u2018marks\u2019 don\u2019t understand what they\u2019re paying for. It\u2019s attempted deception, rather than explicit scamming.<\/p>\n<h2>Referral scams<\/h2>\n<p>Often a variation of the first two scam types, referral scams involve two or more scammers working in tandem. The first, who may have a reasonable reputation score and feedback (possibly through \u2018alt repping\u2019), builds rapport with the victim throughout the sales process, and then introduces them to the second scammer, who they claim can complete the work in question. As shown in the example below, this usually ends with both scammers disappearing with the victim\u2019s money.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image9-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88532\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image9-1.png\" alt=\"A referral scam report\" width=\"993\" height=\"228\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image9-1.png 1537w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image9-1.png?resize=300,69 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image9-1.png?resize=768,176 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image9-1.png?resize=1024,235 1024w\" sizes=\"auto, (max-width: 993px) 100vw, 993px\" \/><\/a><\/p>\n<p><em>Figure 9: A referral scam report on Exploit<\/em><\/p>\n<p>In this case, despite clear misgivings about the trustworthiness of the second scammer, the first scammer\u2019s reassurances were enough to convince the victim to hand over money:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image10-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88533\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image10-1.png\" alt=\"A Telegram screenshot showing a chat between the victim and a scammer, discussing the second scammer not responding\" width=\"413\" height=\"472\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image10-1.png 413w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image10-1.png?resize=263,300 263w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/a><\/p>\n<p><em>Figure 10: A screenshot from a private chat between the first scammer and the victim, concerning the second scammer<\/em><\/p>\n<p>Referral scams can also involve dedicated infrastructure. In the example below, the first scammer contacted the victim and convinced them to contact a second scammer on a separate forum, which was a scam site (see <strong>Typosquatting, phishing, and ripper sites<\/strong>, below). To access the site, the victim had to pay a deposit and registration fee, losing $350 in total.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image11-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88534\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image11-1.png\" alt=\"A user posts a scam report about an attempted referral scam\" width=\"1190\" height=\"119\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image11-1.png 1562w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image11-1.png?resize=300,30 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image11-1.png?resize=768,76 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image11-1.png?resize=1024,102 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image11-1.png?resize=1536,152 1536w\" sizes=\"auto, (max-width: 1190px) 100vw, 1190px\" \/><\/a><\/p>\n<p><em>Figure 11: A referral scam involving a scam forum site<\/em><\/p>\n<h2>Alt repping and impersonations<\/h2>\n<p>\u2018Alt repping\u2019 is a variation on referral scams; rather than two separate scammers, one scammer operates multiple accounts, usually to artificially inflate their reputation score (a key metric for many users when deciding who to trade with).<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image12-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88535\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image12-1.png\" alt=\"An administrator accuses a user of running multiple accounts to artificially inflate their reputation score\" width=\"1193\" height=\"164\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image12-1.png 1365w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image12-1.png?resize=300,41 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image12-1.png?resize=768,105 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image12-1.png?resize=1024,140 1024w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/><\/a><\/p>\n<p><em>Figure 12: A BreachForums moderator accuses a user of alt repping<\/em><\/p>\n<p>Occasionally, scammers will use multiple profiles for other purposes. In one Exploit report, for example, a user claimed that an individual was operating accounts on both Exploit and XSS under different names to sell the same product, an AaaS listing, multiple times (we briefly examined reselling in <a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/q6r6n3x43mnrfchn5tfh3qmw\/sophos-x-ops-active-adversary-multiple-attackers-wp.pdf\">our recent white paper on multiple attackers<\/a>).<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image13-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88536\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image13-1.png\" alt=\"A scam report where a user complaints that someone who sold them an AaaS listing attempted to sell it to them again under a different name\" width=\"1211\" height=\"176\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image13-1.png 1547w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image13-1.png?resize=300,44 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image13-1.png?resize=768,112 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image13-1.png?resize=1024,150 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image13-1.png?resize=1536,224 1536w\" sizes=\"auto, (max-width: 1211px) 100vw, 1211px\" \/><\/a><\/p>\n<p><em>Figure 13: One individual, operating accounts on different forums, attempts to sell the same AaaS listing twice<\/em><\/p>\n<p>And in a stranger case, a user was banned on XSS for creating a trade between two sockpuppet accounts, and then opening an arbitration case about it (possibly because they incorrectly assumed the forum itself would compensate them):<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image14-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88537\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image14-1.png\" alt=\"An administrator bans a user for running two accounts attempting to scam the forum\" width=\"1209\" height=\"68\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image14-1.png 1512w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image14-1.png?resize=300,17 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image14-1.png?resize=768,44 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image14-1.png?resize=1024,58 1024w\" sizes=\"auto, (max-width: 1209px) 100vw, 1209px\" \/><\/a><\/p>\n<p><em>Figure 14: Two sockpuppet profiles are banned for trying to cheat the XSS forum<\/em><\/p>\n<p>A variation on alt repping is scammers impersonating users with high reputations, or jumping in on in-progress negotiations and attempting to pass themselves off as the seller:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image15-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88538\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image15-1.png\" alt=\"A user warns others that someone is attempting to impersonate them on a forum\" width=\"881\" height=\"306\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image15-1.png 570w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image15-1.png?resize=300,104 300w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/a><\/p>\n<p><em>Figure 15: A user warns the XSS forum that someone is attempting to impersonate them<\/em><\/p>\n<h2>Fake guarantors<\/h2>\n<p>Guarantors and \u2018middlemen\u2019 are typically optional on criminal forums, but moderators and senior users often recommend them. They function as an escrow service, holding funds until they receive confirmation from the buyer that the goods have been received and are as advertised. They usually take commission for this, although the BreachForums administrator offers it as a free service.<\/p>\n<p>A refusal to use a guarantor if asked is a bannable offense on some forums.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image17-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88540\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image17-1.png\" alt=\"An administrator asks a user to explain themselves for not using a guarantor when requested\" width=\"923\" height=\"391\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image17-1.png 1076w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image17-1.png?resize=300,127 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image17-1.png?resize=768,325 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image17-1.png?resize=1024,433 1024w\" sizes=\"auto, (max-width: 923px) 100vw, 923px\" \/><\/a><\/p>\n<p><em>Figure 16: A user is called out in an XSS scam report for refusing a guarantor<\/em><\/p>\n<p>Some scammers weaponize the concept of guarantors. Typically, this involves some form of impersonation attack, where a scammer impersonates an administrator or registers a misleading Telegram or Jabber name, as in the examples below:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image18-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88541\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image18-1.png\" alt=\"A user warns others that another user is spoofing the Jabber handle of the guarantor\" width=\"667\" height=\"458\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image18-1.png 453w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image18-1.png?resize=300,206 300w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/a><\/p>\n<p><em>Figure 17: An example of a misleading Jabber name designed to impersonate the Exploit guarantor service<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image19-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88542\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image19-1.png\" alt=\"A user warns others that a scammer is using a misleading Telegram handle to make other users think they're an admin\" width=\"678\" height=\"260\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image19-1.png 506w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image19-1.png?resize=300,115 300w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\" \/><\/a><\/p>\n<p><em>Figure 18: A malicious Telegram handle designed to impersonate XSS administrators<\/em><\/p>\n<p>A scammer who successfully impersonates a guarantor is likely to then disappear with the buyer\u2019s funds.<\/p>\n<p>The Exploit administrators have implemented a safeguard for this \u2013 a \u2018fake Jabber checker,\u2019 where users can submit Jabber names to check if they\u2019re legitimate.<\/p>\n<h2>Blackmail<\/h2>\n<p>We noted one allegation of blackmail in the scam reports we examined, and it didn\u2019t appear to be a particularly egregious one. The complainant, a database seller, alleged that a buyer threatened to accuse him of being a scammer if he didn\u2019t send more data for free.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image20-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88543\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image20-1.png\" alt=\"A scam report alleging blackmail\" width=\"1049\" height=\"144\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image20-1.png 1551w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image20-1.png?resize=300,41 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image20-1.png?resize=768,105 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image20-1.png?resize=1024,140 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image20-1.png?resize=1536,210 1536w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<p><em>Figure 19: An Exploit scam report alleging blackmail<\/em><\/p>\n<p>What this case does show is how seriously marketplace users take their reputation. An accusation of scamming can put a serious dent in a vendor\u2019s credibility, and therefore impact their earnings.<\/p>\n<p>What we didn\u2019t see \u2013 although that\u2019s not to say it doesn\u2019t happen \u2013 were any outright examples of blackmail, where users dox others and threaten to expose them or report them to law enforcement (although there have been <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252512902\/Distrust-feuds-building-among-ransomware-groups\">public accusations of this nature<\/a> involving high-profile threat actors).<\/p>\n<h2>Backdoored malware<\/h2>\n<p>Moving on to more sophisticated attacks, we saw several scam reports about backdoored malware \u2013 that is, malware sold or distributed on the forums which contains code designed to covertly attack its operators and steal their data.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image21-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88544\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image21-1.png\" alt=\"A scam report alleging that CypherRAT contains a backdoor\" width=\"1013\" height=\"266\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image21-1.png 1061w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image21-1.png?resize=300,79 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image21-1.png?resize=768,202 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image21-1.png?resize=1024,269 1024w\" sizes=\"auto, (max-width: 1013px) 100vw, 1013px\" \/><\/a><\/p>\n<p><em>Figure 20: An XSS scam report alleging that a RAT sold by a user installs a backdoor<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image22-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88545\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image22-1.png\" alt=\"A scam report alleging that a piece of malware is backdoored\" width=\"1007\" height=\"387\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image22-1.png 1240w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image22-1.png?resize=300,115 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image22-1.png?resize=768,295 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image22-1.png?resize=1024,393 1024w\" sizes=\"auto, (max-width: 1007px) 100vw, 1007px\" \/><\/a><\/p>\n<p><em>Figure 21: An Exploit user accuses the author of BitRAT of backdooring their malware<\/em><\/p>\n<p>A particularly interesting example involves an Exploit user who purchased a (deliberately) fake copy of Axie Infinity \u2013 an NFT-based game \u2013 with the intent of defrauding legitimate users by distributing it and passing it off as genuine. The fake copy contained a backdoor which stole the stolen cryptocurrency.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image23.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88546\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image23.png\" alt=\"A scam report alleging that a fake copy of Axie Infinity has been backdoored\" width=\"1042\" height=\"210\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image23.png 1543w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image23.png?resize=300,60 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image23.png?resize=768,154 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image23.png?resize=1024,206 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image23.png?resize=1536,309 1536w\" sizes=\"auto, (max-width: 1042px) 100vw, 1042px\" \/><\/a><\/p>\n<p><em>Figure 22: A scam report about a backdoored fake copy of Axie Infinity<\/em><\/p>\n<p>As with virtually every scam report we read, the irony of this situation was apparently lost on the victim.<\/p>\n<p>Backdoored malware isn\u2019t unique to criminal marketplaces. Security researcher <a href=\"https:\/\/blog.bushidotoken.net\/\">BushidoToken<\/a> reported in June 2022 that a software piracy site was<a href=\"https:\/\/twitter.com\/BushidoToken\/status\/1532360235209326592\"> serving up malware builders and panels backdoored with an infostealer<\/a>. And research by security firm JFrog in February 2022 revealed that <a href=\"https:\/\/jfrog.com\/blog\/malware-civil-war-malicious-npm-packages-targeting-malware-authors\/\">some malicious npm packages contained code designed to steal secret tokens from threat actors<\/a>, who themselves steal tokens from legitimate users.<\/p>\n<h2>Typosquatting, phishing, and ripper sites<\/h2>\n<p>We noted numerous instances of typosquatting, phishing, and scam forum sites designed to either trick users out of a \u2018registration fee\u2019 or to steal credentials for genuine criminal marketplaces (with possible motivations including theft of cryptocurrency, impersonating users for future scams, or ruining users\u2019 reputations).<\/p>\n<p>In many cases, scammers adopted similar approaches to those used by traditional threat actors to target individuals and organizations, with some context-specific differences.<\/p>\n<p>For example, we observed several cases where scammers had set up clones of current or former criminal marketplaces. Here\u2019s a fake version of the Exploit site, which uses the misspelling \u2018explolt\u2019 in the domain name, but is otherwise an identical clone:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image24.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88547\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image24.png\" alt=\"A clone of the Exploit homepage\" width=\"795\" height=\"569\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image24.png 1095w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image24.png?resize=300,215 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image24.png?resize=768,549 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image24.png?resize=1024,732 1024w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/a><\/p>\n<p><em>Figure 23: The fake Exploit homepage<\/em><\/p>\n<p>This site is probably intended to harvest credentials, or trick users into paying false registration fees, and appears to be well-constructed, redirecting to the genuine Exploit site.<\/p>\n<p>Amusingly, some Exploit users, on becoming aware of this fake site, tested its security and found an XSS vulnerability:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image25.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88548\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image25.png\" alt=\"An XSS attack against the fake Exploit homepage, showing a pop-up dialogue\" width=\"843\" height=\"470\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image25.png 928w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image25.png?resize=300,167 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image25.png?resize=768,428 768w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/><\/a><\/p>\n<p><em>Figure 24: An Exploit user&#8217;s screenshot of an XSS vulnerability in the fake Exploit site<\/em><\/p>\n<p>We observed another fake Exploit domain \u2013 this one misspelled as \u2018exlpoit\u2019 \u2013 used in conjunction with a Jabber phishing attack. Judging by the conversation, this scam was designed to dupe users into paying a deposit fee, although the target didn\u2019t fall for it on this occasion.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image26.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88549\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image26.png\" alt=\"A screenshot of a Jabber conversation where a scammer tries to get a user to visit a fake Exploit link\" width=\"640\" height=\"461\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image26.png 797w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image26.png?resize=300,216 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image26.png?resize=768,553 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 25: An excerpt of the Jabber conversation between scammer and target<\/em><\/p>\n<p>Other users aren&#8217;t so canny:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image27.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88550\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image27.png\" alt=\"A user admits to falling for a scam and asks the admin to block their Jabber account\" width=\"1075\" height=\"131\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image27.png 1275w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image27.png?resize=300,36 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image27.png?resize=768,93 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image27.png?resize=1024,124 1024w\" sizes=\"auto, (max-width: 1075px) 100vw, 1075px\" \/><\/a><\/p>\n<p><em>Figure 26: A user was fooled by a fake Exploit forum and entered their credentials<\/em><\/p>\n<p>We saw a few other typosquatting examples, like \u2018explolit\u2019 and \u2018exploti\u2019, used with varying degrees of success. Some users spotted the scam, others fell for it.<\/p>\n<p>XSS isn\u2019t immune either. We observed an XSS clone (spelled as \u2018xsss\u2019) which was <a href=\"https:\/\/twitter.com\/LawrenceAbrams\/status\/1488281547924979716\">previously reported by journalist Lawrence Abrams<\/a>. Upon entering credentials, the clone redirects to hxxps:\/\/fe-avv18[.]ru\/send.php, which presumably processes and stores the harvested credentials.<\/p>\n<p>We also noted a website, named \u2018xsx\u2019, which doesn\u2019t look anything like the genuine XSS site but may be designed to fool inexperienced users. This site demands a $100 registration fee (a very common scam amount, as we\u2019ll see in Part 3 of this series), and is reported on the XSS forum as a ripper site.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image28.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88551\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image28.png\" alt=\"A fake marketplace asks for a $100 registration fee and lists a Bitcoin address\" width=\"640\" height=\"269\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image28.png 867w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image28.png?resize=300,126 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image28.png?resize=768,322 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 27: The &#8216;xsx&#8217; scam site<\/em><\/p>\n<p>More commonly, we saw scams using domains similar to now-defunct criminal marketplaces, particularly Mazafaka (<a href=\"https:\/\/therecord.media\/maza-cybercrime-forum-hacked-user-data-dumped-online\/\">compromised in March 2021<\/a>) and Direct Connection.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image29-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88570\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image29-1.png\" alt=\"A scam report relating to a Direct Connection fake forum\" width=\"640\" height=\"246\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image29-1.png 1032w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image29-1.png?resize=300,115 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image29-1.png?resize=768,295 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image29-1.png?resize=1024,394 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 28: A user falls for a scam which plays on the name of a defunct criminal marketplace<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88553\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png\" alt=\"A chat between a user and a scammer who sends them a link to a fake marketplace\" width=\"640\" height=\"644\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png 914w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=150,150 150w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=298,300 298w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=768,772 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=32,32 32w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=50,50 50w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=64,64 64w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=96,96 96w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image30.png?resize=128,128 128w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 29: A user falls for another Direct Connection scam<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image31.jpeg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88554\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image31.jpeg\" alt=\"Another chat where a scammer sends a link to a fake marketplace\" width=\"640\" height=\"1188\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image31.jpeg 673w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image31.jpeg?resize=162,300 162w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image31.jpeg?resize=552,1024 552w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 30: Yet another Direct Connection scam<\/em><\/p>\n<p>Other examples include typosquatting domains relating to the prominent criminal forum Verified, with misspellings such as \u2018verifeid.\u2019<\/p>\n<p>Sometimes, scammers create sites which don\u2019t imitate known marketplaces but use the same methodology, i.e., charging a registration fee:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image32.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88555\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image32.png\" alt=\"A scam report where a user reports two fake marketplaces\" width=\"640\" height=\"317\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image32.png 738w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image32.png?resize=300,148 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 31: Two alleged scam sites reported by an Exploit user<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image33.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88556\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image33.png\" alt=\"A scam report where a user asks if a forum is legitimate; they are told it is not\" width=\"533\" height=\"458\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image33.png 533w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image33.png?resize=300,258 300w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/><\/a><\/p>\n<p><em>Figure 32: A scam site reported by an XSS user<\/em><\/p>\n<p>Most of these scams involve fake registration fees, although we saw some variations of other scams, like rip-and-runs and fake tools, connected to scam sites. For instance, one XSS user rented malware from a site, which worked for two days before the C2 panel disappeared (followed shortly by the site\u2019s owner):<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image34.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88557\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image34.png\" alt=\"A user describes, in Russian, how they were scammed on a site called grimxploit.com\" width=\"1126\" height=\"278\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image34.png 1362w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image34.png?resize=300,74 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image34.png?resize=768,190 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image34.png?resize=1024,253 1024w\" sizes=\"auto, (max-width: 1126px) 100vw, 1126px\" \/><\/a><\/p>\n<p><em>Figure 33: A user reports being scammed by a malware rental site<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image35.jpeg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88558\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image35.jpeg\" alt=\"The grimxploit homepage which shows various malware for sale or rent\" width=\"1079\" height=\"543\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image35.jpeg 1381w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image35.jpeg?resize=300,151 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image35.jpeg?resize=768,386 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image35.jpeg?resize=1024,515 1024w\" sizes=\"auto, (max-width: 1079px) 100vw, 1079px\" \/><\/a><\/p>\n<p><em>Figure 34: The malware rental site in question<\/em><\/p>\n<h2>Scammers scamming the scammers who scammed them<\/h2>\n<p>Unsurprisingly, while scamming threat actors might be lucrative, it can also be a dangerous game. We observed a few instances where threat actors weren\u2019t just indignant about being scammed \u2013 they wanted to get even.<\/p>\n<p>An XSS user annoyed at an alleged scammer for selling non-working tools and sending scam invites, doxed them \u2013 revealing their name, address, mobile phone number, and social media profiles, and their mother\u2019s name, phone number, and passport number. The accuser threw in a couple of photographs for good measure.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image36.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88559\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image36.png\" alt=\"A scam report where a user posts personal information about a scammer and their mother, including photographs\" width=\"1130\" height=\"588\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image36.png 1551w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image36.png?resize=300,156 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image36.png?resize=768,399 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image36.png?resize=1024,532 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image36.png?resize=1536,798 1536w\" sizes=\"auto, (max-width: 1130px) 100vw, 1130px\" \/><\/a><\/p>\n<p><em>Figure 35: An alleged scammer is doxxed on XSS<\/em><\/p>\n<p>Over on Exploit, a scammer who phished new users with a fake Direct Connection marketplace link (see <strong>Typosquatting, phishing, and ripper sites<\/strong>) got short shrift from a user who recognized the scam:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image37.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88560\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image37.png\" alt=\"A chat between a scammer and a user. The user realizes they are being scammed and tells them they're going to be reported\" width=\"640\" height=\"1171\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image37.png 659w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image37.png?resize=164,300 164w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image37.png?resize=560,1024 560w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 36: A user recognizes the Direct Connection\/Mazafaka scam and challenges the scammer<\/em><\/p>\n<p>The user then posted the scammer\u2019s information on Exploit, and invited other users to harass them:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image38.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88561\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image38.png\" alt=\"A user invites other users to harass a scammer on Telegram\" width=\"1152\" height=\"162\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image38.png 1525w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image38.png?resize=300,42 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image38.png?resize=768,108 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image38.png?resize=1024,144 1024w\" sizes=\"auto, (max-width: 1152px) 100vw, 1152px\" \/><\/a><\/p>\n<p><em>Figure 37: The Exploit user invites others to harass the scammer on Telegram<\/em><\/p>\n<p>The most interesting examples of scammers who scammed scammers getting scammed come from BreachForums.<\/p>\n<p>Following the news that a scammer was pretending to be Omnipotent (<a href=\"https:\/\/cyberint.com\/blog\/research\/breachforums\/\">one of the founders and administrators of RaidForums<\/a>) to trick users into paying $250 to join the \u2018new RaidForums,\u2019 the BreachForums administrator started a contest: $100 to whoever \u201ctrolls this man the hardest.\u201d<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image39.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88562\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image39.png\" alt=\"An admin posts an invitation to troll a scammer, providing various contact details and ideas for trolling\" width=\"1014\" height=\"450\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image39.png 1343w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image39.png?resize=300,133 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image39.png?resize=768,341 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image39.png?resize=1024,454 1024w\" sizes=\"auto, (max-width: 1014px) 100vw, 1014px\" \/><\/a><\/p>\n<p><em>Figure 38: The BreachForums administrator announces a contest to troll a scammer<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image40.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88563\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image40.png\" alt=\"An 'invalid onionsite' browser message against a background of Google Image search results which insult scammers\" width=\"1027\" height=\"549\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image40.png 1377w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image40.png?resize=300,160 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image40.png?resize=768,410 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image40.png?resize=1024,547 1024w\" sizes=\"auto, (max-width: 1027px) 100vw, 1027px\" \/><\/a><\/p>\n<p><em>Figure 39: One of the entries to the trolling contest. A BreachForums user sent this screenshot to the scammer, saying they couldn&#8217;t access the fake RaidForums site<\/em><\/p>\n<p>The eventual winner convinced the scammer that their website was leaking sensitive information, by showing them a screenshot of the Apache Server Status page. The scammer ended up taking the site down because they thought it had been compromised.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image41.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88564\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image41.png\" alt=\"A chat between a scammer and a user. The user posts a server status page and tells the scammer the server is in danger\" width=\"541\" height=\"998\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image41.png 541w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image41.png?resize=163,300 163w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\" \/><\/a><\/p>\n<p><em>Figure 40: Part of a long trolling thread targeting a BreachForums scammer<\/em><\/p>\n<p>According to recent posts, the same scammer is back at it again, and the BreachForums administrator has started another trolling contest \u2013 this time with a $300 prize.<\/p>\n<p>Finally, the BreachForums administrator scammed a scammer personally. An individual registered a Telegram username very similar to BreachForums, and was offering public databases for sale.<\/p>\n<p>The admin offered to buy the username from the scammer.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image42.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88565\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image42.png\" alt=\"An email chain between a scammer and admin. The admin offers to buy a Telegram handle; the scammer asks for an offer\" width=\"994\" height=\"309\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image42.png 947w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image42.png?resize=300,93 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image42.png?resize=768,238 768w\" sizes=\"auto, (max-width: 994px) 100vw, 994px\" \/><\/a><\/p>\n<p><em>Figure 41: The BreachForums administrator contacts a scammer and asks them to sell their Telegram handle<\/em><\/p>\n<p>After some back and forth, they agreed on a price of $10,000, and the admin asked the scammer to transfer the group to his account. The scammer was concerned about being scammed, but the admin reassured them, citing their reputation:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image43.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88566\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image43.png\" alt=\"The email chain continues. The scammer asks what prevents the admin from scamming them. The admin says their reputation.\" width=\"990\" height=\"467\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image43.png 619w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image43.png?resize=300,142 300w\" sizes=\"auto, (max-width: 990px) 100vw, 990px\" \/><\/a><\/p>\n<p><em>Figure 42: The administrator reassures the scammer that they won&#8217;t get scammed<\/em><\/p>\n<p>Once the scammer transferred ownership, the admin removed the scammer\u2019s permissions and banned him. Without paying, naturally &#8211; making this a rip-and-run scam against a scammer.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image44.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-88567\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image44.png\" alt=\"A Telegram screenshot. The admin removes the scammer's permissions and then bans them\" width=\"640\" height=\"378\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image44.png 864w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image44.png?resize=300,177 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image44.png?resize=768,453 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 43: The BreachForums administrator bans the scammer<\/em><\/p>\n<p>The scammer was not thrilled.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image45.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-88568\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image45.png\" alt=\"The scammer demands their money and makes a vague threat. The admin says they love their Telegram username\" width=\"684\" height=\"327\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image45.png 592w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/image45.png?resize=300,143 300w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/a><\/p>\n<p><em>Figure 44: The scammer threatens the BreachForums admin<\/em><\/p>\n<p>According to the admin, the scammer later attempted to DDoS BreachForums, but there have been no other repercussions since.<\/p>\n<p>In the third part of our series, due out the same time next week (Wednesday 21 December), we\u2019ll look at a specific, curious large-scale typosquatting scam, which involved a coordinated network of twenty fake marketplaces.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/12\/14\/the-scammers-who-scam-scammers-on-cybercrime-forums-part-2\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/shutterstock_426716044.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Wixey| Date: Wed, 14 Dec 2022 12:00:20 +0000<\/strong><\/p>\n<p>A shadowy sub-economy is more than just a curiosity \u2013 it\u2019s booming business, and also  an opportunity for defenders. In the second part of our series, we look at the different flavors of scams prevalent on criminal forums<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[28039,11638,28040,21828,10574,27030,16771,15775],"class_list":["post-20803","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-breachforums","tag-exploit","tag-marketplaces","tag-raidforums","tag-scams","tag-sophos-x-ops","tag-threat-research","tag-xss"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20803"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20803\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}