176.119.1.66
Open in
urlscan Pro
176.119.1.66
Public Scan
URL:
http://176.119.1.66/
Submission: On December 06 via manual from US — Scanned from DE
Submission: On December 06 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
BTC-ALPHA WHAT'S THE MATTER ? November 2, 2021 were hacked cryptocurrency exchange BTC-Alpha (https://btc-alpha.com/). If you read it now, most likely, you or their user, or follow their news, or their employee, or police dog. In any case, the essence of the case does not change. Hacking was made to obtain redemption for the data, the attack was successful. Custom data and source project codes are fully stolen. We demanded a ransom from the exchange on November 2, 2021. A public requirement until December 1, 2021 was put forward on November 17, 2021 in our blog, references below. In case of non-payment of ransom, the data will be sold in the criminal world in 1 hands. If until December 1, 2021 will not be proposed quite good in our view, the data will be published in free access in our blog and a bunch of hands from the criminal world will be used. Do not be offended if everything is started to work out - from scammers to bandits. Also, these data will be available to law enforcement officers to identify and investigate financial and any other crimes. VITALY BODNAR LIARZ? Unfortunately this is the case: 1. With the stock exchange we have contacted repeatedly and have repeatedly received questions about the price in response. We voiced your offer in 100 bitcoins, the offer of the exchange did not hear in response. It follows that the exchange did not answer unequivocally no, as was stated in the media, but simply tried to bring down the price in this way, but the dialogue was not open on the "every case". 2. "The hackers never lead negotiations" - such a phrase says Vitaly Bodnar in one of his video contents and tries to convince this position of users. We are not fraudsters / cards / someone else. We are a public hacker group under the pseudonym Lockbit. We have a blog in which we published a public requirement for Vitaly about paying. Our impeccable reputation in work since 2019 with our victims allows us to confidence. Vitaly was notified of this for another 2 November. Until November 16, he had time to study information about our grouping and a conseceration in various countries in order to write statements to the police. Thus, all the "investigations" conducted by Vitaly, which he does not get tired of telling in his video, not consistent. All information (who we are, that we stole, our requirements, the time we give) He knew and checked on November 2. 3. What data are stolen? In its first access to customers from November 3, 2021, Vitaly said that no data was stolen. In the future, he says that Email data was stolen. Then he says that also passwords. Let's make clarity in this matter and answer it straight, because we have nothing to hide and if Vitaly will not pay a ransom until December 1, 2021, all these data will be published in our blog and each of you can check every word. All data were stolen. Email / Password / Name / Address / Date of Birth / Passport details. Part of the data was really covered with encryption, but we pulled out all and this data was also able to decipher. Therefore, respected 362,000 users, until December 1, there is time to pay us. If Vitaly does not pay - all this data is really leaving. He also knew this on November 2. 4."Customer hacking" - also invented by Vitaly character. Below will be our links to the blog and much more, you can independently make sure that we have an independent public hacker group and no customer exists. Vitaly also knew about this on November 2. Above we outlined some of the main theses, I think, relying on them, you can revise all the appeals of Vitaly Bodnar and make all the other conclusions. WHO ARE WE AND WHY CAN WE TRUST? Our name Lockbit. Below the link to the blog and on the requirement for BTC-Alpha are below (it is advisable to open the main blog page, after recording, this is a temporary anti-DDOS solution, since attacks are underway on our blog): Blog: http://lockbitapt.uz/ Requirements: http://lockbitapt.uz/post/1tmK4lw2EbwBWoA361948e577bad3 TOR Blog: http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion/ TOR Requirements: http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion/post/1tmK4lw2EbwBWoA361948e577bad3 You can learn more about us on Google / Twitter / Reddit / Facebook / somewhere else You can contact Recovery and antivirus companies - they also know about us perfectly You can contact companies who decided not to pay and whose data are already published in our blog - they also know about us :) Vitaly Bodnar asked proof of hacking for another 2 November 2021, we provided them, he confirmed everything, after which she asked about the price. In addition, we make no sense to lie. We have already confirmed every word, what Vitaly Bodnar and other BTC-Alpha employees know perfectly well. In any case, we do not lose anything. The data is published by the exchange of the exchange, and not ours. We pay the whole world, and who does not pay - loses business. If Vitaly does not pay until December 1, 2021, and all the data will be published, it will become an excellent example for our next victims. We are not afraid of law enforcement agencies - open our blog - there are many victims, everyone wrote a statement. Make conclusions yourself, please. SALE OF DATA We are ready to sell the entire database and source code of the BTC-ALPHA project. Contact us to discuss prices and refine details. Sale is carried out in 1 hands to those who offer the greatest price. OUR CONTACTS Blog: http://lockbitapt.uz/ TOR Blog: http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion/ TOX ID: 3085B89A0C515D2FB124D645906F5D3DA5CB97CEBEA975959AE4F95302A04E1D709C3C4AE9B7 Jabber #1: 598954663666452@exploit.im Jabber #2: 365473292355268@thesecure.biz