Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


Gainer last won the day on February 15

Gainer had the most liked content!

Community Reputation

9 Neutral


About Gainer

  • Rank
    Rank #4

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. A Slovenian man convicted of authoring the destructive and once-prolific Mariposa botnet and running the infamous Darkode cybercrime forum has been arrested in Germany on request from prosecutors in the United States, who’ve recently re-indicted him on related charges. NiceHash CTO Matjaž “Iserdo” Škorjanc, as pictured on the front page of a recent edition of the Slovenian daily Delo.si, is being held by German authorities on a US arrest warrant for operating the destructive “Mariposa” botnet and founding the infamous Darkode cybercrime forum. The Slovenian Press Agency reported today that German police arrested Matjaž “Iserdo” Škorjanc last week, in response to a U.S.-issued international arrest warrant for his extradition. In December 2013, a Slovenian court sentenced Škorjanc to four years and ten months in prison for creating the malware that powered the ‘Mariposa‘ botnet. Spanish for “Butterfly,” Mariposa was a potent crime machine first spotted in 2008. Very soon after its inception, Mariposa was estimated to have infected more than 1 million hacked computers — making it one of the largest botnets ever created. Škorjanc and his hacker handle Iserdo were initially named in a Justice Department indictment from 2011 (PDF) along with two other men who allegedly wrote and sold the Mariposa botnet code. But in June 2019, the DOJ unsealed an updated indictment (PDF) naming Škorjanc, the original two other defendants, and a fourth man (from the United States) in a conspiracy to make and market Mariposa and to run the Darkode crime forum. More recently, Škorjanc served as chief technology officer at NiceHash, a Slovenian company that lets users sell their computing power to help others mine virtual currencies like bitcoin. In December 2017, approximately USD $52 million worth of bitcoin mysteriously disappeared from the coffers of NiceHash. Slovenian police are reportedly still investigating that incident. It will be interesting to see what happens with the fourth and sole U.S.-based defendant added in the latest DOJ charges — Thomas K. McCormick, a.k.a “fubar” — allegedly one of the last administrators of Darkode. Prosecutors say McCormick also was a reseller of the Mariposa botnet, the ZeuS banking trojan, and a bot malware he allegedly helped create called “Ngrbot.” Between 2010 and 2013, Fubar would randomly chat me up on instant messenger apropos of nothing to trade information about the latest goings-on in the malware and cybercrime forum scene. Fubar frequently knew before anyone else about upcoming improvements to or new features of ZeuS, and discussed at length his interactions with Iserdo/Škorjanc. Every so often, I would reach out to Fubar to see if he could convince one of his forum members to call off an attack against KrebsOnSecurity.com, an activity that had become something of a rite of passage for new Darkode members. On Dec. 5, 2013, federal investigators visited McCormick at his University of Massachusetts dorm room. According to a memo filed by FBI agents investigating the case, in that interview McCormick acknowledged using the “fubar” identity on Darkode, but said he’d quit the whole forum scene years ago, and that he’d even interned at Microsoft for several summers and at Cisco for one summer. A subsequent search warrant executed on his dorm room revealed multiple removable drives that held tens of thousands of stolen credit card records. For whatever reason, however, McCormick wasn’t arrested or charged until December 2018. According to the FBI, back in that December 2013 interview McCormick voluntarily told them a great deal about his various businesses and online personas. He also apparently told investigators he talked with KrebsOnSecurity quite a bit, and that he’d tipped me off to some important developments in the malware scene. For example: “TM had found the email address of the Spyeye author in an old fake antivirus affiliate program database and that TM was able to find the true name of the Spyeye author from searching online for an individual that used the email address,” the memo states. “TM passed this information on to Brian Krebs.”
  2. Can anyone please recommend a free and reliable one for mac os 10.15??
  3. Hey I have Au Usa And Eu Cvv Pm me When U Ready dude
  4. Lol Youre a funny guy . If you havent paid attention people sell good shops over here, for good money too, if you think someone is just gona hand it to you, you are very wrong. As for youre other question, yes for some in store pick ups you need an ID
  5. Best bet is to get the PP credit accoutn verified as much as possible and then open a PayPal business account Once you have your own shop with a bank drop attached buy your own shit slowly, $20-$50 at a time for a week or so then go up to $150-$300
  6. use escrow , its free , be very attantion!!! good luck man!
  7. do u know how to cash them out
  8. If you still need it, msg me in PM and i will suggest a good service to you
  9. Gainer

    Some method

    What is your setup? You may have issues with your browser. Antifraud systems are checking a lot of things nowadays, like whether you have quality residental IP or not, canvas, webgl, geolocation in your browser and so on.. They will link your payment tries if you dont spoof these things and you will waste your good cards..
  10. There are a few payment processing services which definitely check the open ports. If the port 80 is open, it means that a webserver is running on the server. (port 22 means SSH server) The average user doesnt host any website on his home PC where they usually buy stuff online. So yeah this could affect the success rate.
  11. Try freight forwarding services bro. Do you have any freight forwarding companies in us that ships anywhere in the world?
  • Create New...