Phishing Scam

0
0

Hi there, there is a fraudulent phishing domain hosted by a armenian person which seems to use Ucom as internet provider which pretend to be a crypto money exchange but is a phishing site. They try to trick people and scam their money in form of cryptocurrency. They promote this fraud site through social media such as Youtube and search engine SEO. The site "boomchange.io" is static and have a .php script on it which generates always the same crypto addresses which belong to the domain holders of "boomchange.io", formerly "boomchange.com" (old domain got from them suspended), so if people send crypto money there it is gone forever in their pockets. The Phishing Domain is: boomchange.io Their end-order page is also static, showing everybody the same fraudsters crypto address and can be visited through direct URL, Proof:: https://boomchange.io/order/5bdda7e1a9 https://boomchange.io/order/c7dda2e520 Everybody can visit the order page because everybody gets redirected to the same pages, which show the crypto address of the fraudsters. The shown Ethereum address is "0x4c2acc0580765d04d555a791bcb0b3661af67b8d" and the shown bitcoin address is "bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72". Blockchain scan of "bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72": https://www.blockchain.com/de/explorer/addresses/btc/bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72?page=1 On these transactions the Bitcoins got transferred to Binance: https://www.blockchain.com/explorer/transactions/btc/23647cd8c00823a8357e909dc747fef811c2b6404105e9c5677ca27072604260 https://www.blockchain.com/explorer/transactions/btc/1793e0ccd25137a5d0d182ea9970f2156d01353f17408a2aff036f65aeb93959 Etherscan of "0x4c2acc0580765d04d555a791bcb0b3661af67b8d": https://etherscan.io/address/0x4c2acc0580765d04d555a791bcb0b3661af67b8d On these transactions the Ethereum got transferred to Binance: https://etherscan.io/tx/0x89be54e7669f3da8b41f1b018761be9b598801d91244068178aad5a4349531e9 They had a domain before under "boomchange.com" which was already suspended for fraudulent activities, Proof: https://www.whois.com/whois/boomchange.com https://web.archive.org/web/20220701070044/https://boomchange.com/ (Backup in the Internet archive from 2022, before it was suspended). There are also some other reports on the internet about this fraudulent website hosted by a armenian, they did changed their static crypto addresses sometimes on their phishing site, online reports against "boomchange.io" can be found in the internet from victims around the world. The suspect lives in Armenia, Yerevan. This are his email addresses: boomchange222@gmail.com boomchange6@gmail.com register2022.2023@gmail.com edgarhakobyan2012@gmail.com These are his IP addresses: 37.252.89.7 - Armenia, Yerevan - Internet Provider: Ucom.am (This might be his computer IP) 46.130.8.54 - Armenia, Yerevan - Internet Provider: Telecom AM (This might be his mobile phone IP) Kind regard.

Amount lost

115000.00 USD

on Apr 18, 2023
Reported Addresses and Domains

Reported Addresses and Domains

boomchange.io

boomchange.com

Bitcoin logo
Scam
bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72
Ethereum logo
Scam
0x4c2acc0580765d04d555a791bcb0b3661af67b8d
Bitcoin logo
Scam
bc1q6a5gket0qhzks42k6v94uwshrse5t0njtpy3gr
Bitcoin logo
Scam
18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr
Tron logo
Scam
TPHCvU6SeCKnmGUc2Vt1yuAE9aJ6B9EmKv
Cardano logo
Scam
DdzFFzCqrht8aXTncbxFkD9pkv73TNHfN2cYe59xUye6zh93cCMU6aYcheNpmwNrunJdxJ5vPLYGxmm37i89ESnR9Bh3PZHUPmUTYhy6
Litecoin logo
Scam
LKLCaCVM2aZu4CiTCVv9GnbhCt3X7pQtWb
Solana logo
Scam
72jXsoiK9UZdwdGpA3TYyAGAnVBGggQ9YvEjFS2CW5UE

Comments

5

Spammy comments promoting asset recovery services will be deleted.

Ernando

Oct 30, 2023 at 12:2 PM

Operator of Boomchange (Boomchange.com - Boomchange.io) got now a new Bitcoin address to receive stolen Bitcoin from victims: bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2tt - Already over $58.000 stolen as of October 30th 2023.

Iesere

Jun 7, 2023 at 10:4 PM

It seems like that the User changelawyer20 is the owner of the Scam Exchange Boomchange and is now trying to defend his fraudulent platform, despite clear evidence that this is a case of fraud. He also tries to steer the issue to other sites without any evidence or anything else to possibly distract from himself.

changelawyer20

Jun 7, 2023 at 1:39 PM

Its fake reports . Owner of fake report is coin-changer.net .( competitor of Boomchange.io ) Coin-hanger.net made a copy design of the boomchange website . We have reported to Police to find owner of Coin-changer.net . in They fooled a lot of people. this is not their first project they have many other websites. Github accounts https://coinpal.eu/ https://coin-changer.net/ https://bitmixing.net/ Github accounts https://github.com/Yandex41 https://github.com/AlexHerman1 Interpol can find them .

Iesere

Apr 18, 2023 at 7:23 AM

Another IP address of the armenian living in Yerevan cyber criminal: 37.252.93.99 - his iPhone IP address (Mozilla/5.0 (iPhone; CPU iPhone OS 16_0_2 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Mobile/15E148 Safari/604.1)

Iesere

Apr 18, 2023 at 12:40 AM

There are some more reports on the internet about the fraudulent website "boomchange.io / boomchange.com": https://cryptscam.com/en/detail/bc1q6a5gket0qhzks42k6v94uwshrse5t0njtpy3gr , https://scam-alert.io/scam/bc1q6a5gket0qhzks42k6v94uwshrse5t0njtpy3gr , https://www.bitcoinabuse.com/reports/18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr , https://www.chainabuse.com/report/ffc4d97c-7ad9-43f4-8367-171235623102?context=search-domain&d=

Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo
Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo