CHAPTER I
General Information on scambaiters
PART I
What is scambaiting?
Scambaiting comes from the words scam + bait. Scambaiters waste
their time about exposing scammer identification using scammer resources.
It’s when people call possible scammers and record the calls. S cammers
often try to harm others and steal cash/money. They can expose your
real information and doxxing you. If the person that has been called
appears to be a scammer, the phone numbers get reported with evidence
(Call records, video recordings, etc.) and get deactivated.
For access to scammer’s pc, they often use RAT (Remote Administration
Trojan), which is illegal. Often the rats are undetectable/invisible for
scammers. The purpose of rats is to access scammer’s files (illegally) and
shows as proof about arrest the scammer. The files may contain
documents about (scammers methods, phishing details, private information
programs and scripts they use, etc. ).
There are multiple types of scambaiting:
1) Scammer reporting
2) Scammer time wasting
3) Scammer phone number flooding (illegal)
4) Scammer website ddosing (illegal)
5) Scammer hacking (illegal)
1
PART II
What do the scambaiters generally do?
Scambaiters generally have contacts with the police and expose
scammer’s identities. After that some of them try to contact the victims of
the scam to help them get a refund after they explain the situation. At the
end they try to collect as much data as they can in order to locate the
scammers and get them arrested. Most scammers are located in India.
Some scambaiters may get scammed and work for a scammer company.
The investigation is hard if the scammer's company is private and raiding
failed. The more data they get the easier it is to detect if the same scam
company runs other companies/webpage as well.
There are as well some scambaiters who use flood bots to fill the
scammer numbers with calls so that no other person gets scammed.
Depending on the way they do it, scambaiters are criminal fighters who try
to protect people.
PART III
What kind of tools do scambaiters use?
For hiding their identity:
When you scambait, the most important thing you should do is hide
your real identity over the internet. Otherwise scammers may get your IP
address which will show them the ISP you use and they might be able to
locate you. The best way to do this is to use a VPN provider.
What does a VPN do?
2
VPN Diagram
http://bit.do/fKczA
Last accessed: October 11th 2020
As you see in the diagram instead of connecting through your internet to
the websites, a VPN literally connects you to a remote server of the VPN
provider and encrypts your connection and your IP by diverting all your
connections through that server. The connection to the VPN servers is
being encrypted by using specific encryption protocols for example
(OpenVPN, Wireguard, IKEv2). However you must make sure that the VPN
provider you use doesn’t keep logs. If it doesn’t keep logs, your real IP will
stay hidden and the IP anyone would see after you connect to their network
will be the IP of the server you connect to.
All your web traffic will be diverted through that server and your ISP won’t
be able to see your traffic and no one will ever track you.
Recommended VPN providers:
For VPN providers I suggest you check:
https://vpntierlist.com (Tom Spark VPN reviews)
Tom Spark reviews many well known VPN providers and does multiple
tests on the way they work and the protection they provide. So make sure
you check his tier list on the link I provided you and as well see his videos.
Staying secure when you scambait is the most important thing you
shall do!
For calls:
Generally scambaiters use free online services for calling, for
example (TextNow, Google Voice, etc.). The issue with such services is
actually though that if your number gets blocked by the scammer, it’s not
easy to change it. So many of them choose to purchase VOIP services in
order to alter their caller ID with fake ones and mess with the scammers.
However the main issue is that the scammers cannot call you back when
3
you spoof your caller ID which makes the scambaiting process more
difficult.
For investigation purposes:
The main tools that can be used for investigation purposes are
actually the search engines and some special tools which require expertise
for example, Maltego. However such products like it, are very difficult to
use and pointless if the users don’t know how to use the data they got.
As a community we recommend these tools for investigation:
1) https://domainbigdata.com/
(For finding the hosting providers of domains/websites)
2) https://scamrtc.com
(For finding the providers of US & Canada phone numbers)
For Virtual Machines:
The scammers and scambaiters use most Virtual Machines (Virtual
Box, VMware) for safety from infecting or exposing. Virtual machine means
PC Emulator of an operational system. They simulate operating systems
over an already working system protecting that way your main system from
the scammer’s programs and files. Their implementations may involve
specialized hardware, software, or a combination. The Virtual Machines are
being well masked so that scammers don’t detect they are connected to a
VM
Suggested software for virtual machines
1)h ttps://www.virtualbox.org/
(Virtualbox, one of the best free software for VMs)
2) http://bit.do/fKdv9
(VMware Workstation player, the free version of vmware)
3)h ttp://bit.do/fKdwg
(VMware Workstation Pro, the best Virtual Machine program)
4
Note: A fter you install your system on the VM, doesn’t mean it is masked. To mask
it for scambaiting purposes as a community we suggest to search on youtube. Many
videos get created and updated due to new program versions.
CHAPTER II
General information on Scams
PART I
Which are the types of scam and what’s their purpose?
Technical Support Scam:
They work by either scaring the user with fake popups , which open after
clicking on random ads and say that your pc or mobile has been blocked
and ask you to call a number, or by scammers who call random people and
telling them that the user’s pc has notified them that you have been
infected by a virus and they must connect to your pc to fix it.
MICROSOFT POPUP SAMPLE (Fake microsoft phone number)
http://bit.do/fKdup
Last accessed October 12th 2020
5
Apple Tech Support scam (Fake apple support phone number)
http://bit.do/fKduM
Last accessed October 12th 2020
6
Sample of what scammers will tell you
Their purpose is literally to connect to your computer to fix a fake error and
after that they steal files or confidential data and then lock your system
claiming the virus did it and ask for money to unlock it.
For Survey Scam:
An online survey scam is a type of social engineering attack where
fraudsters trick users into filling out forms that steal their information or
install malware onto their computers. All with the promise of making large
amounts of money from home or winning hardware for example iphones,
macbooks or playstations. They even try either to charge you on your
phone bill with sms or get your credit card information.
7
Survey scam sample
http://bit.do/fKdw6
Last accessed October 12th 2020
For Phishing Scam:
Phishing scams are attempts by scammers to trick you into giving out
personal information such as your bank account numbers, passwords and
credit card numbers. These attempts are being made by email by either
trying to convince you you won an amount a money or you claimed
inheritance:
Phishing scam via email sample.
Screenshot By PlayerFridei
8
For Romance Scam:
A romance scam is a confidence trick involving feigning romantic intentions
towards a victim, gaining their affection, and then using that goodwill to
commit fraud. Fraudulent acts may involve access to the victim's money,
bank accounts, credit cards, passports, email accounts, or national
identification numbers; or forcing the victims to commit financial fraud on
their behalf. In many instances, a mail-order bride scam will also bait the
victim into committing felonies to establish citizenship for the perpetrator.
FTC Romance scam explanation
Link: h ttp://bit.do/fKdAy
Last accessed October 20th 2020
Travel Scam:
It Is very easy to become a victim of such scams. These contain, free
vacation you won over the phone by joining a survey from a number you
accidentally called. Free vacation offers are very suspicious. Many people
got disappointed as they had to pay for their vacation. When you join one of
those you are asked to give you credit card numbers for identification
purposes. The truth is that you get a ticket for vacation but you have to pay
taxes.
More information on such scams may be found in:
1) http://bit.do/fKdCt (Link to the appropriate information on travel scams)
2) http://bit.do/fKdCE (Link to a cruise blog)
9
CHAPTER III
Contacts
PART I
Recommended communities/people
Do you believe you got scammed? Did someone try to trick you on
purchasing products for viruses or windows problems you didn’t really
have? Did they have a call center or a website?
Modder paul Huckers image
We are all here to assist you. You can Join the following communities to
contact us
MODDER PAUL HUCKERS
Modder Paul Huckers logo
10
Famous scambaiter youtuber
Without his contribution we wouldn’t succeed writing this book!
Does scambaiting live streams and teaches people scambaiting!
Youtube channel: http://bit.do/fKdFk
Discord Community: https://discord.gg/YNjYwqY
NEEP Scambaiting
Scambaiter who visited scammer call centers.
Website: h ttps://neep.ml
Youtube channel: http://bit.do/fKdF8
Discord account: NeeP#6262
TOM SPARK REVIEWS
(Not for scambaiting purposes)
Tom Spark
11
The most accurate and trustworthy VPN reviewer.
Website: https://vpntierlist.com
Youtube channel: h ttp://bit.do/fKdMr
Discord community:h ttps://discord.gg/ewjpkK2mjE
PART II
EDITORS/HELPERS
8-Ball
The owner of the project
The m ain editor and the person who brought up the idea
Email: [email protected]
Discord: 8-Ball#1862
Discord community: h ttps://discord.gg/ZtBefa6
12
Paranormal activity
The first helper
Discord: Paranormal Activity#4841
PlayerFridei
Made our book cover & help with texts
Website: h ttps://playerfridei.xyz/
Discord:PlayerFridei#9452
Discord Community: https://discord.gg/sQxFEyE
Retrobe
Spelling and syntax check
Discord: Retrobe#3449
Email: [email protected]
13
SPECIAL THANKS
TO SCAMMERS FOR EXISTING
WITHOUT THEM WE WOULDN’T EXIST
We thank Modder Paul Huckers For Providing us these pictures
For our project!
14
DISCLAIMER:
This e-book is provided as it is and no copies from it or changes
or download or uses without the permission of all editors or the
main one are allowed.
For ways to contact us you can check CHAPTER III Part II
Or you can contact the main owner/author at:
[email protected]
For all other data for example pictures etc. you must ask for
permission to use their rightful owners as we did
15
NOTES
16