Accéder au contenu principal

Personal notes on information request

Hello, I work as a Private Investigator.
Our agency received a case with an objective of hacking into your email, phone, cloud storage, network and collecting intelligence.
We work with hackers from China for tasks like that, and they are the best. As you can see, they did a good job. Your accounts and devices are compromised.
But we do have an ethical protocol in place.
After checking the background of the person who paid for the hacking and investigation on you, I have decided to come forward and offer you to buy the information about that person (name, contacts, emails and other proof).
You will also get a report on yourself (including a list of compromised accounts, devices, logs, screenshots, photos and documents).
Normally, we do not disclose sensitive information about our clients, but in this case we will be.

Upon reviewing this case, I found that something illegal was planned against you.
The materials we have collected on you are very sensitive and can be easily used to blackmail you.
We usually address personal and corporate espionage cases, but this case is different.

We have received a prepayment of 50% for your case from that person (total agreed upon cost was 12500 USD).
However, I will give you a discount (without any profit for the agency), if you decide to buy this information.
After we get the payment, I will get back to you. You have 2 business days to make the transfer. It will cost you 40% of the unpaid balance.

We will process $2,500 payment through bitcoin. In case you have trouble with bitcoin, google how to fund it.
Send BTC to this wallet 1H7QWKGzZP1XcY7ruE16X4nYhdbqRzMJ52

It will be up to you what to do after you get the information. We will delete all files. The original client will get nothing and will never know about our deal.
Please keep in mind, because I need to pay Chinese contractors, and if you decline this offer, I will have to go to the original client and send all intel to cover the costs.
But at least you know that now and have a free heads up of what's coming.

Commentaires

Posts les plus consultés de ce blog

HTML5 Games On Android

On my last hollidays, I made two HTML5 games, and published on android market. Nowadays javascript has powerful libraries for doing almost everything, and also there are several compilers from java or c code to javascript, converting opengl c code to html5 canvas, but definitely, javascript execution is slower than dalvik applications, and of course much slower than arm c libs. For improving the speed of sounds and images loader, I have used javascript asynchronous execution and scheduling priority has been controlled with setTimeout/setInterval which deprioritize or priorize a code block. This games are published on the android market here: Android Planets and here: Far Planet Related news Hacker Hardware Tools Pentest Tools Port Scanner Hacker Tools For Mac Tools Used For Hacking Hacker Techniques Tools And Incident Handling Easy Hack Tools Hacking Tools Kit Hacking Tools Usb Hacker Hardware Tools Hacker Tools Hardware Hack Tools For Windows Hacking Tools For G...

BeEF: Browser Exploitation Framework

"BeEF is the browser exploitation framework. A professional tool to demonstrate the real-time impact of XSS browser vulnerabilities. Development has focused on creating a modular structure making new module development a trivial process with the intelligence residing within BeEF. Current modules include the first public Inter-protocol Exploit, a traditional browser overflow exploit, port scanning, keylogging, clipboard theft and more." read more... Website: http://www.bindshell.net/tools/beef Related links Pentest Automation Tools Ethical Hacker Tools Hacking Tools For Windows Free Download Pentest Reporting Tools Hack Tool Apk No Root Nsa Hack Tools Download Beginner Hacker Tools Hacking Tools For Windows Free Download Hack Tools For Mac Hack Tool Apk No Root Kik Hack Tools Hacking App Pentest Tools List Nsa Hacker Tools Hack Tools Mac Hacking Tools Kit Pentest Tools For Android Hack Tools For Windows Hackrf Tools Tools 4 Hack Hacking Tools Mac Hacking ...

CEH Practical: Information-Gathering Methodology

  Information gathering can be broken into seven logical steps. Footprinting is performed during the first two steps of unearthing initial information and locating the network range. Footprinting Footprinting is defined as the process of establishing a scenario or creating a map of an organization's network and systems. Information gathering is also known as footprinting an organization. Footprinting is an important part of reconnaissance process which is typically used for collecting possible information about a targeted computer system or network. Active and Passive both could be Footprinting . The example of passive footprinting is assessment of a company's website, whereas attempting to gain access to sensitive information through social engineering is an example of active information gathering. Basically footprinting is the beginning step of hacker to get hacked someone because having information about targeted computer system is the main aspect of hacking. If...