Scammer Payback Answers Scam Questions | Tech Support | WIRED

05 Nov 2024 (10 days ago)
Scammer Payback Answers Scam Questions | Tech Support | WIRED

Scambaiting Support (0s)

  • A scammer claiming to be from Amazon initiated a call, and the recipient offered to help, but then asked the scammer to let them remote onto their system and give them access to their computer for fun, revealing their true intentions (9s).
  • The recipient identified themselves as "perogi from Scammer Payback on YouTube" (11s).
  • The conversation is part of a segment called "Scam Baiting Support" from Mango May, where questions from the internet are answered (18s).
  • One of the questions addressed in the segment is "what are the red flags of a scammer" (26s).

Scammer red flags (27s)

  • Scammers often try to rush their victims into making quick decisions, such as buying gift cards or sending money through cash apps, as soon as possible, which is a red flag (36s).
  • This rush is likely due to the scammer's fear that a family member or someone else might intervene and stop the transaction if there is a delay (40s).
  • Allowing someone to remotely access your computer or phone is also a common scam tactic, and it's best not to let anyone do it, even if they claim to be from tech support (51s).
  • Scammers often use specific forms of payment, such as cash apps, gift cards, wire transfers, or Bitcoin, which can be a significant red flag indicating a scam (1m6s).

Scammers and Gift cards (1m12s)

  • Scammers often require gift cards as a means of obtaining money from victims, making it the easiest method for them to do so (1m12s).
  • To carry out this scam, victims are typically instructed to purchase gift cards, such as those from Target, scratch off the code on the back, and then provide the code to the scammer (1m19s).
  • The scammer then uses a bartering system on a website, offering to exchange the gift card for a different form of currency, such as Bitcoin, allowing them to launder money and remain anonymous (1m24s).
  • This process enables scammers to quickly obtain money while staying anonymous (1m34s).

How many scams are out there? (1m39s)

  • There are various types of online scamming, including popup tech support scams where a person receives a popup on their computer and is directed to call a fake Microsoft support number, resulting in a request for money (1m39s).
  • Romance scams are another type of online scam, where someone pretends to be a celebrity, and the victim is convinced to send large sums of money to help the supposed celebrity (1m51s).
  • An example of a romance scam involved a 90-plus-year-old woman who was convinced she was in love with a country star from Nashville and sent tens of thousands of dollars to help him (1m54s).
  • It is highly unlikely that a celebrity would be personally interacting with someone on Facebook, and such interactions are likely scams (2m6s).

Messing with scammers for fun (2m13s)

  • Messing with scammers can be done by reversing their computers, allowing intervention in actual scams and the ability to watch them on phone calls with victims (2m14s).
  • This intervention can be used to contact the victim, send law enforcement to their house, or stop the scam directly (2m35s).
  • One way to mess with scammers is by not following their instructions, such as right-clicking when they say left-click, or asking them to turn up their volume (2m44s).
  • Another method is to pretend not to listen to them or to ask them to repeat themselves, which can lead to the scammer becoming frustrated and angry (2m49s).
  • Some scammers can be provoked into yelling and cussing at the person messing with them, which can be an entertaining experience (2m59s).
  • In some cases, it is possible to access the scammer's webcam and force them to show their face, which can be used to expose their identity (3m9s).
  • One notable example of messing with scammers involved hacking into a scammer's computer and editing their scam emails to include their own photo and a message saying they were trying to scam the recipient (3m34s).
  • The scammer, who was sending tens of thousands of scam emails per day, eventually realized what was happening and stopped sending the emails (3m41s).
  • A person named Moles, who has been scam baiting for days, is interested in learning more about scam baiting and how to get started (3m53s).

Scambaiting: Origins (3m54s)

  • Scam baiting involves creating a fake persona, email, and virtual box to interact with scammers, but it's essential to prioritize self-protection to avoid getting hacked or compromised (3m55s).
  • To protect oneself, it's crucial to never let a scammer access a physical computer and avoid using an actual phone number when communicating with scammers (4m8s).
  • Scammers can use the information gathered from phone numbers to identify individuals and potentially cause harm, including SWATing, which is a serious concern (4m12s).
  • Some scammers can be extremely malicious, making it essential to exercise caution and avoid provoking them (4m18s).
  • A viewer, real superola, inquired about the origins of random scammer texts (4m23s).

Random scam texts (4m24s)

  • Scammers often send random texts to see if someone is actually there and if they will respond, as getting a response can indicate a potential target for their scam (4m26s).
  • Many scammers work with basic information such as a person's first name, last name, phone number, and email address, which can be obtained through data breaches and bought on the dark web (4m35s).
  • Even having an email address or phone number can lead a scammer to gather extensive information about their victim, including their full name, family members, physical address, and more, as this information is often publicly available on the internet (4m44s).
  • A viewer, Dice King, asked which social media platform has the most scammers (4m54s).

Most scammed social media platform (4m57s)

  • Facebook is considered the most scammed social media platform due to the presence of a large number of bots and scammers. (4m59s)
  • Scammers on Facebook often target specific groups, including religious groups that donate money to certain causes. (5m2s)
  • These scammers observe the charitable activities of group members, such as donating $500 to a cause, and then attempt to reach out to them to initiate a scam. (5m11s)
  • It is recommended to keep social media profiles private to prevent scammers from targeting users, regardless of the platform being used, including Instagram or Facebook. (5m17s)

Can scam texts track your phone? (5m23s)

  • Replying to scam texts does not allow scammers to track your phone, as they are not sophisticated enough to do so; instead, they are mass messaging people and responding to those who are willing to engage (5m23s).
  • Scammers use a mass messaging approach, and when someone responds, they initiate their scam; responding to scam texts does not directly interact with a person on the other end (5m35s).
  • The best course of action when receiving scam texts is to report them as junk, block them, and not respond, as responding can lead to more spam (5m41s).
  • Scammers often send links, such as fake UPS tracking numbers, which can be phishing attacks that prompt users to click on them and potentially download malware onto their phones (5m45s).
  • Mobile devices, especially Android devices, are more susceptible to malware, and clicking on suspicious links can lead to app downloads (5m54s).
  • If scammers know a phone number is active, they will mark it down and continue sending more scams, resulting in increased spam (6m3s).

Amazon scam LIVE (6m16s)

  • A scammer claiming to be from Amazon called, and the conversation started with the scammer asking for an order ID number, to which a response was given to cut to the chase (6m28s).
  • The scammer was offered a $10 Google Play card in exchange for remote access to the computer system (6m32s).
  • The scammer's intention was to gain access to the computer, and when questioned about the reason, the scammer responded that it was "for fun" (6m34s).
  • The scammer was told that the request was absurd, and the conversation continued with the scammer being toyed with (6m40s).
  • The conversation was being shared with a user named "user10" who was asked about the most absurd scam call they had received, with the code "18901" mentioned (6m58s).

The most absurd scam call ever (7m3s)

  • Scammers have gone to great lengths to deceive, including writing living wills for fictional characters, such as a grandma, and planning trips to their "homeland" (7m5s).
  • In one instance, a scammer participated in a mock wedding ceremony, even going so far as to say "I'm kissing you right now" during the ceremony (7m15s).
  • The scammer then asked the person they were interacting with to reveal their identity, and when the person "pulled down their mask," the scammer was surprised to discover they were interacting with a male, not a female (7m29s).
  • The scammer was playing the role of a Microsoft representative, but was simultaneously engaged in a fictional romantic relationship with a "grandma" character, who was actually a male with blue hair (7m37s).
  • The person on the other end of the interaction was referred to as "Ronnie" by someone named "Gum" (7m40s).

Voice changing/Scammer Payback Setup (7m42s)

  • A hardware device is used to change the voice during scam calls, rather than software, and it allows for various voice changes with a few clicks (7m46s).
  • The device used is the Roland VT4, which has a few presets and enables the user to become different characters, such as "Vivian Rogers," a blend of the user's grandma, mom, and their own voice (8m2s).
  • The character "Vivian Rogers" is a crazy persona that takes scammers on a wild ride, and this tactic is used to distract the scammers while the user gains access to their computers (8m18s).
  • The voice-changing tactic is part of a larger scam bait setup, which includes various tools and techniques used to mess with scammers (7m54s).
  • The goal of using different voices and characters is to distract the scammers, allowing the user to gain access to their computers and gather information (8m32s).

Phone number spoofing—how? (8m41s)

  • Scammers can use specific software to spoof their phone numbers, allowing them to pretend to be anyone, including the FBI, a friend, or even the person being called, by making it appear as though they are calling from a specific number (8m43s).
  • Spoofing a phone number does not allow the scammer to receive calls at that number, so a way to verify the authenticity of the call is to hang up and call the number back (9m3s).
  • It is essential not to believe someone is who they claim to be just because they call pretending to be that person, and instead, verify their identity by calling them back at the number they claim to be calling from (8m52s).

Scammed out of your crypto (9m8s)

  • A person claims to have been scammed after connecting their wallet to Crypto Wolf, resulting in the loss of their money, and is seeking advice on how to recover their funds and secure their wallet from scammers (9m8s).
  • This situation may be a common tactic used by scammers, where they post fake comments or tweets claiming to have been scammed, and then respond with false recommendations for recovery services (9m21s).
  • People who are genuinely trying to recover from a scam may come across these fake posts and mistakenly trust the recommended recovery services (9m35s).
  • Cryptocurrency is considered secure, but it's recommended that those who don't understand it should avoid dealing with it (9m41s).
  • To add an extra layer of security, it's suggested to use physical key codes and phrases stored on a physical device, rather than relying solely on digital storage (9m47s).
  • Having physical security measures in place can make it more difficult for scammers to access cryptocurrency accounts, and it's especially recommended for those with large amounts of money invested in Bitcoin (10m2s).

Benefits? PTO? How about a 401K Match? (10m13s)

  • People working at scam call centers do not earn sufficient wages, with many facing unemployment, especially during the pandemic, and are often motivated to work in these centers to support their families (10m13s).
  • Scammers often store financial information on their computers, which can be accessed when a manager's computer is compromised, providing valuable insights into the call center's operations (10m28s).
  • A monitored call center was found to be generating almost $1 million per month, with the salaries of nearly 100 scammers totaling around $7,500, indicating that the majority of the profits go to the bosses rather than the individual scammers (10m37s).
  • The individual scammers, referred to as "XYZ," typically receive a small percentage, such as 10%, of the scam earnings, which is often paid in Indian rupees and results in very low salaries that are difficult to live on (10m55s).

How do the creepy bots make money? (11m6s)

  • Scammers use bots to mass-produce likes and comments on social media platforms, attempting to engage with users and potentially scam them (11m13s).
  • These bots may pretend to be a romantic interest, convincing users to send compromising photos, which are then used for extortion (11m22s).
  • The scammers threaten to release the compromising content unless the user pays them, causing significant distress and mental health problems, particularly among teenagers (11m30s).
  • In some cases, the scammers may push the victim to harm themselves or end their life, demonstrating the cruel nature of these scams (12m0s).
  • There have been instances where scammers have faced justice, such as a case in Nigeria where scammers were extradited to the United States due to a teenager losing their life to an extortion scam (12m7s).

Programs (12m18s)

  • Programs used to protect internet traffic and hide systems include a VPN and virtualization software such as VMware and Virtual Box, which create a virtual environment. (12m18s)
  • Fake bank accounts are used to deceive scammers by changing dollar amounts, making them believe they are interacting with an actual victim. (12m29s)
  • Scam callers may keep calling and saying nothing to check if someone is on the other line, or to record the person's voice using artificial intelligence for future scams. (12m39s)
  • It is advised not to pick up the phone and start talking to scam callers, as this can help them obtain a voice sample to scam other people. (13m2s)

Some common senior citizen scams (13m8s)

  • Scammers often target senior citizens, using data from data brokers to obtain information about elderly people in a specific area, and then contact them with false claims, such as a grandchild being in trouble and needing money (13m17s).
  • The "Grandma scam" typically involves scammers calling a senior citizen, claiming their grandson is in trouble and needs money to get out of prison or the hospital, and asking them to withdraw a large sum of money from the bank (13m25s).
  • In some cases, scammers may even send someone to the victim's house to collect the money, making it difficult for the victim to recover their losses (13m41s).
  • A variation of the Grandma scam involves scammers using voice-changing technology and artificial intelligence to clone a grandchild's voice, making it seem like the grandchild is calling for help (13m58s).
  • Scammers may also use deep fake technology to create fake videos or audio recordings of family members or celebrities, making it difficult for victims to distinguish what is real and what is not (14m14s).
  • These scams often prey on the fear of the grandparent, making them more likely to fall victim to the scam (13m52s).

How do scam call centers work? (14m35s)

  • Scam call centers often occupy entire office buildings, but they try to avoid detection by creating side businesses with their ill-gotten gains to make it seem like they are running legitimate companies (14m35s).
  • Due to increased scrutiny, large scam call centers are becoming less common, and scammers are instead moving towards smaller, decentralized operations known as "safe houses" (14m59s).
  • These safe houses can have a group of scammers working together, but they are often spread across multiple locations, typically 5, to minimize the risk of being shut down if one location is discovered (15m5s).
  • Not all scam call centers are located in India; they can be found in various parts of Asia, Eastern Europe, and even countries like Pakistan (15m12s).
  • Some scam groups have ties to political figures, and they often collaborate with organized crime groups in the United States for money laundering purposes (15m24s).
  • The money trail of these scam operations can lead to serious organized crime groups, making it a significant issue once investigated (15m28s).

Money mule address (15m37s)

  • Money mule addresses are obtained through scam baiting, and these addresses can be crucial in helping law enforcement track down victims or criminals involved in money laundering schemes (15m38s).
  • A money mule is part of a process called "havala," a money laundering technique used by scammers in India to transfer money without getting caught by authorities (15m45s).
  • Havala can involve various methods, including gift cards, wire transfers, Bitcoin, or even shipping cash in a box to someone in the United States (15m54s).
  • Money mule addresses can lead law enforcement to one of three things: a victim being coerced into doing money laundering, an actual criminal collecting packages tied to a big crime organization, or additional packages with actual cash (16m8s).
  • Money mule crime organizations use various tactics, including utilizing Airbnb, rental cars, and hotel rooms, to move people around the US and collect packages (16m29s).
  • These organizations have a network of "Runners" who drive around the US with fake IDs, using rental cars, and get a percentage of the stolen money (17m15s).
  • The crime groups work with scammers overseas, using platforms like WhatsApp, Telegram, and Signal groups, to stay under the radar from governments and law enforcement (17m35s).
  • These groups are highly organized and can make significant amounts of money, with one group monitored making around half a million dollars a day (17m29s).

Someone hacked my amazon account! But… (17m50s)

  • Someone's Amazon account was hacked, and the hacker ordered items to be shipped to the scammer's address, which the account owner now has access to (17m50s).
  • The account owner is considering what actions to take, but is advised not to send anything to the scammer's address, as it is likely a random house being used to receive stolen goods (17m58s).
  • A similar situation occurred in the neighborhood, where a house received a large number of packages, over 100, before vans arrived to collect them, indicating a scammer was using the house as a drop-off point (18m29s).
  • The scam appears to involve someone collecting packages, shipping them elsewhere, and getting paid by their "boss", who is the real scammer selling the items for profit (18m48s).
  • The scammer is likely unaware of the origin of the goods and is simply following instructions to collect and ship items, such as iPhones, to make money (18m50s).

How did they get past my 2FA? (18m58s)

  • Someone's Instagram account was compromised despite having two-factor authentication (2FA), and a Bitcoin scam was posted from the account (18m58s).
  • 2FA can be bypassed, especially if it is set up to receive codes through text messages, as hackers can find ways to intercept these codes (19m12s).
  • It is recommended to use authenticator apps for 2FA instead of text messages, as these apps require physical access to the device with the codes to gain access to the account (19m14s).
  • If a device is compromised and the account owner is logged in, the hacker can access the account by requesting a password reset to the associated email address, which they also have access to (19m40s).
  • Using authenticator apps with social media accounts is highly recommended for added security (19m34s).

Is public wifi safe? Is VPN good? (19m56s)

  • Public Wi-Fi is not considered safe, and using a cell phone's tethering option is a much safer alternative for internet access (19m56s).
  • Using public Wi-Fi can put personal data at risk of being compromised by companies or hackers, making it essential to prioritize security (20m6s).
  • Airports are particularly high-risk areas for using public Wi-Fi due to the large number of people and potential for hackers (20m10s).
  • VPNs (Virtual Private Networks) are effective tools for protecting and encrypting internet traffic, and they should be used whenever additional security is desired (20m21s).
  • However, relying solely on a VPN is not enough, and it is still recommended to avoid using public Wi-Fi networks, especially in high-risk areas like airports (20m28s).
  • Hackers can create fake Wi-Fi networks, allowing them to access sensitive information, such as Gmail accounts, if users log in and provide their credentials (20m30s).

Gaining access to scammers machines (20m42s)

  • Various methods are used to gain access to scammers' machines, with the first method involving allowing the scammer to remote into a virtual machine, then sending a request to their machine to gain permanent access (20m43s).
  • This method involves running files on the scammer's machine without their knowledge, allowing for control over their system (20m58s).
  • Other methods of gaining access to scammer systems exist, but not all can be shared to avoid revealing secrets (21m3s).
  • Operatives have been sent into call centers to gain access to scammer systems from within (21m8s).
  • Ex-scammers who are fed up with the scam industry have also provided access to scammer systems, with one insider reaching out for help in exchange for assistance in returning home (21m14s).
  • Relationships are formed with people who are fed up with the scam industry, particularly in India, where many individuals want to fight back against scams (21m27s).

The epicenter of call centers? (21m36s)

  • Many illegal call centers operate in and around Kolkata, despite the police administration's claimed lack of awareness, which undermines the efforts of genuine entrepreneurs in the area (21m36s).
  • Kolkata is a significant tech hub, along with Hyderabad, and is home to many brilliant and smart individuals, but some big bosses have exploited this by making connections with the police to avoid raids (21m50s).
  • These scammers would pay the police per computer or seat in a call center, allowing them to conduct fake raids and continue operating with confidence (22m7s).
  • However, efforts to combat these scammers have been ongoing for many years, forcing them to stop or relocate, and the police and administration in Kolkata have improved in shutting down large call centers (22m25s).
  • As a result, scammers are starting to scatter from Kolkata, and credit is due to the authorities for their efforts in addressing the issue (22m39s).

Pierogi > Police? (22m48s)

  • Scammer Payback, an American YouTuber, is able to find the location of scammers in India, even when he is in another country, as long as the scammers have an internet connection (22m48s).
  • Using this method, Scammer Payback can typically pinpoint the exact location of the scammers within a 10-meter radius (22m56s).
  • One of the locations found by Scammer Payback was amusing, as it showed the scammer's location as a dot in the middle of a building on Google Maps (23m2s).
  • The information gathered by Scammer Payback is shared with US law enforcement and also made available to India, but it is up to them to take action (23m13s).
  • A question is raised about why scammers almost always seem to be based in India (23m18s).

Let’s move this convo over to WhatsApp (23m21s)

  • Scammers often want to move conversations to platforms like WhatsApp or Google Hangout immediately, as it allows them to create a more private and secure space for manipulation. (23m21s)
  • On platforms like Facebook, scammers may struggle to maintain their fake identity, as potential victims can view their profile, followers, and other information that may raise suspicions. (23m26s)
  • For example, in a romance scam, if a scammer is pretending to be someone like Brad Pitt, they may have a low number of followers, which could lead the victim to question the authenticity of the profile. (23m30s)
  • By moving the conversation to a different platform, scammers can avoid having to make excuses for inconsistencies in their fake profile and instead interact with the victim as a number or fake email. (23m44s)
  • This allows scammers to have more control over the conversation and manipulate the victim more easily in a private space. (23m55s)

Scam Likely (23m59s)

  • Phone providers are doing a better job of protecting people from scams, resulting in the "Scam Likely" label appearing on calls from reported scam numbers (24m4s).
  • Scammers buy phone numbers to carry out their scams, but once these numbers are reported, they are added to a database and labeled as "Scam Likely" (24m9s).
  • The "Scam Likely" label is a statement and a question, indicating that the call is likely a scam, and it serves as a warning to potential victims (23m59s).

Fake shopping sites/The Cat (24m19s)

  • Fake shopping sites are becoming less common due to the internet's efforts in stopping these types of fraud, but scammers are now moving towards platforms like Facebook Marketplace and Craigslist to deceive people (24m20s).
  • When buying items on Facebook Marketplace or similar platforms, it's essential not to pay deposits or any money until receiving the product or meeting the person first (24m36s).
  • Scammers often ask for payment for shipping or other reasons, and once the payment is made, the buyer may not receive the item, resulting in significant financial loss (24m41s).
  • A personal experience of buying a cat off Craigslist for $100 resulted in being scammed, as the cat was not what was expected, highlighting the importance of being cautious when making online purchases (25m7s).
  • It's crucial to be aware of potential scams and take necessary precautions to avoid falling victim to them, especially when buying items from unknown sellers on online marketplaces (25m19s).

Do scammers ever get caught? (25m27s)

  • Scammers often operate outside of a country's jurisdiction, making it difficult to force another country to arrest someone for stealing money from citizens in a different country (25m38s).
  • Despite jurisdiction challenges, some scammers have been caught and arrested in the United States, specifically money mules working with overseas scammers (25m45s).
  • The specifics of these cases cannot be disclosed due to the involvement of organized crime groups (25m50s).
  • Mike Stricker, also known as Scammer Payback, has been involved in efforts to catch scammers and has seen people getting caught and arrested (25m57s).

Caught in a PayPal scam (26m0s)

  • A PayPal account was hacked, and the hacker added a new phone number during the password reset attempt (26m1s).
  • The account owner managed to obtain the phone number added by the hacker and wants to report it to the authorities in a formal way, without calling 911 (26m8s).
  • The account owner is aware that scammers often use temporary or "burn" phone numbers and emails, making it difficult to track them down (26m11s).
  • The best course of action is to regain control of the PayPal account, change the password, and ensure that no one else can access it (26m21s).
  • There is limited action that can be taken against the random phone numbers used by scammers (26m27s).

I want my money back (26m31s)

  • It is challenging to retrieve money back from a scammer, as they are skilled at moving funds quickly. (26m31s)
  • Despite potential spelling mistakes, scammers are efficient in transferring money, making it difficult to recover lost funds. (26m35s)
  • If money has been given to a scammer, it is unlikely to be recovered. (26m40s)

Meet the team (26m45s)

  • The team is from Scammer Payback, and they are involved in scam bait support. (26m46s)
  • The team is expressing gratitude to the viewers for watching their content. (26m48s)
  • The team's motto is "don't get scammed." (26m51s)

Overwhelmed by Endless Content?