Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar Mark Forums Read
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 04-15-2019, 01:20 PM   #1
Bladewire
StraightBro
 
Bladewire's Avatar
 
Industry Role:
Join Date: Aug 2003
Location: Monarch Beach, CA USA
Posts: 56,232
Hacker Sentenced to 6 Years After Posing as FBI to Target Porn Users


Damn the Russians hooked this guy in at age 17, gave him malware to distribute and split the profit with him 50/50 and the scam last 18 months.

He spread the malware to over 165,000 PC's and made over $5.2 million

Hacker Sentenced to 6 Years After Posing as FBI to Target Porn Users

A British blackmailer who used fake FBI notices to scam porn site visitors out of more than $5 million has been jailed.

The sentencing of Zain Qaiser from London marks the conclusion of a case against England’s most prolific cyber criminal, who used his programming skills to frighten porn site users into parting with hard cash.

The BBC reported that investigators were able to pin down £700,000 ($916,135) of Qaiser's personal profits. However, in total, the 24-year-old’s criminal network may have made in excess of £4 million.

It took five years following Qaiser’s arrest for police and lawyers to untangle his intricate criminal enterprise, with further delays to the case caused by concerns for the defendant’s mental health.

Starting the scam when he was just 17, Qaiser contacted a Russian controller who provided the ransomware, agreeing to split the proceeds of the planned scam. As the initiative grew, the cyber mastermind extended his network to the U.S. and China, to online criminals who would help him move the vast sums of money rolling in.

Over a period of 18 months, he booked advertising space on a number of the world’s most popular legal porn sites. Contained within the link to the fake ads he provided, however, was malware known as an “Angler” tool.

Clicking on the malicious adverts downloaded software that would search for vulnerabilities and deliver the ransomware. Then a message would appear on the screen of the unsuspecting internet user, claiming to be from law enforcement agencies like the FBI.

A British blackmailer who used fake FBI notices to scam porn site visitors out of more than $5 million has been jailed.

The sentencing of Zain Qaiser from London marks the conclusion of a case against England’s most prolific cyber criminal, who used his programming skills to frighten porn site users into parting with hard cash.

The BBC reported that investigators were able to pin down £700,000 ($916,135) of Qaiser's personal profits. However, in total, the 24-year-old’s criminal network may have made in excess of £4 million.

It took five years following Qaiser’s arrest for police and lawyers to untangle his intricate criminal enterprise, with further delays to the case caused by concerns for the defendant’s mental health.

From the bedroom of his family home in the East London suburb of Barking, the cyber blackmailer used ransomware to hijack unwitting victims’ computers and then extort them for cash to give back control.

Starting the scam when he was just 17, Qaiser contacted a Russian controller who provided the ransomware, agreeing to split the proceeds of the planned scam. As the initiative grew, the cyber mastermind extended his network to the U.S. and China, to online criminals who would help him move the vast sums of money rolling in.

Over a period of 18 months, he booked advertising space on a number of the world’s most popular legal porn sites. Contained within the link to the fake ads he provided, however, was malware known as an “Angler” tool.

Clicking on the malicious adverts downloaded software that would search for vulnerabilities and deliver the ransomware. Then a message would appear on the screen of the unsuspecting internet user, claiming to be from law enforcement agencies like the FBI.

The fake messages would accuse individuals of having broken the law and demand they pay an immediate fine of roughly $200 or face three years in jail. Many users paid the ransom to avoid embarrassment.

Qaiser used the money, partially funneled through Gibraltar and Belize, to fund a lavish lifestyle. He bought a $6,500 Rolex watch, spent $2,600 to stay in an upmarket London hotel, and splashed cash on sex workers, drugs and gambling. In one casino visit, he spent a sum of almost $90,000.

The scam eventually unraveled when advertisers spotted what was happening. Otherwise, no victim of the con, believed to have been downloaded on to 165,000 PCs around the world, ever alerted authorities.

05:31
How A Cyber Attack Could Shut Down The U.S.
SHARE
WORLD
INTERNATIONAL AFFAIRS

A British blackmailer who used fake FBI notices to scam porn site visitors out of more than $5 million has been jailed.

The sentencing of Zain Qaiser from London marks the conclusion of a case against England’s most prolific cyber criminal, who used his programming skills to frighten porn site users into parting with hard cash.

The BBC reported that investigators were able to pin down £700,000 ($916,135) of Qaiser's personal profits. However, in total, the 24-year-old’s criminal network may have made in excess of £4 million.


It took five years following Qaiser’s arrest for police and lawyers to untangle his intricate criminal enterprise, with further delays to the case caused by concerns for the defendant’s mental health.

Zain Qaiser
The sentencing of Zain Qaiser from London marks the conclusion of a case against England’s most prolific cyber criminal.
NATIONALCRIMEAGENCY/TWITTER

From the bedroom of his family home in the East London suburb of Barking, the cyber blackmailer used ransomware to hijack unwitting victims’ computers and then extort them for cash to give back control.


Starting the scam when he was just 17, Qaiser contacted a Russian controller who provided the ransomware, agreeing to split the proceeds of the planned scam. As the initiative grew, the cyber mastermind extended his network to the U.S. and China, to online criminals who would help him move the vast sums of money rolling in.

Over a period of 18 months, he booked advertising space on a number of the world’s most popular legal porn sites. Contained within the link to the fake ads he provided, however, was malware known as an “Angler” tool.

Clicking on the malicious adverts downloaded software that would search for vulnerabilities and deliver the ransomware. Then a message would appear on the screen of the unsuspecting internet user, claiming to be from law enforcement agencies like the FBI.


The fake messages would accuse individuals of having broken the law and demand they pay an immediate fine of roughly $200 or face three years in jail. Many users paid the ransom to avoid embarrassment.

Qaiser used the money, partially funneled through Gibraltar and Belize, to fund a lavish lifestyle. He bought a $6,500 Rolex watch, spent $2,600 to stay in an upmarket London hotel, and splashed cash on sex workers, drugs and gambling. In one casino visit, he spent a sum of almost $90,000.

The scam eventually unraveled when advertisers spotted what was happening. Otherwise, no victim of the con, believed to have been downloaded on to 165,000 PCs around the world, ever alerted authorities.
Bladewire is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-15-2019, 02:44 PM   #2
crockett
in a van by the river
 
crockett's Avatar
 
Industry Role:
Join Date: May 2003
Posts: 74,068
So who's sites was he advertising on and how are people still that stupid to fall for it.
__________________
"If Israelis don't want to be accused of being like the Nazis, they simply need to stop behaving like Nazis." - Norman Finkelstein
crockett is online now   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-15-2019, 03:04 PM   #3
babeterminal
Confirmed User
 
Industry Role:
Join Date: Jul 2010
Location: tits
Posts: 2,751
webmasters were posting on board about this a while back
__________________
*SIG SPOT SEND MESSAGE IF INTERESTED*
babeterminal is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-15-2019, 03:38 PM   #4
Sarn
Say for inflation - YES!
 
Sarn's Avatar
 
Industry Role:
Join Date: Sep 2015
Location: Russia
Posts: 9,855
Quote:
Originally Posted by crockett View Post
So who's sites was he advertising on and how are people still that stupid to fall for it.

Contain suspicious or unknown software
https://transparencyreport.google.co...ster.com&hl=en
Sarn is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-15-2019, 03:56 PM   #5
Sarn
Say for inflation - YES!
 
Sarn's Avatar
 
Industry Role:
Join Date: Sep 2015
Location: Russia
Posts: 9,855
Quote:
Originally Posted by Bladewire View Post

Damn the Russians hooked this guy in at age 17, gave him malware to distribute and split the profit with him 50/50 and the scam last 18 months.

He spread the malware to over 165,000 PC's and made over $5.2 million
USA innocent of course

An NSA Cyber Weapon Might Be Behind A Massive Global Ransomware Outbreak
It's been a matter of weeks since a shady hacker crew called Shadow Brokers dumped a load of tools believed to belong to the National Security Agency (NSA). It now appears one leaked NSA tool, an exploit of Microsoft Windows called EternalBlue, is being used as one method for rapidly spreading a ransomware variant called WannaCry across the world.
https://www.forbes.com/sites/thomasb.../#63c2ce5de599
Sarn is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks

Tags
scam, porn, qaiser, cyber, criminal, ransomware, fake, fbi, london, cash, million, users, network, site, provided, blackmailer, money, zain, malware, downloaded, law, conclusion, marks, prolific, u.s
Thread Tools



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.