Logo
    Search

    Internet Hitmen Aren't Really A Thing

    enSeptember 16, 2022

    Podcast Summary

    • The Basa Mafia's Deceptive Marketing StrategyThe Basa Mafia used astroturfing to create a fearsome online reputation, hiring people to write threatening testimonials and promote their hitman service.

      The Basa Mafia, an alleged online hitman service, was discovered a few years ago and gained notoriety through rumors on the dark web and social media platforms like Quora and Reddit. The Basa Mafia's website stood out with its slick design and efficient operation, offering to connect clients with local hitmen. Eileen Ormsby, a cybercrime writer, uncovered the site and began investigating. However, she soon discovered that the Basa Mafia was engaging in an astroturfing campaign, hiring people to write threatening testimonials and promote the organization's fearsome reputation online. Ormsby exposed this marketing strategy, leading to a backlash from the Basa Mafia, who threatened her to stop spreading false information. The incident highlights the complex and deceptive nature of online criminal enterprises and the importance of critical analysis when encountering potentially dangerous information on the internet.

    • Internet Hitmen: A Likely ScamInternet hitmen, as portrayed on the dark web, are a scam with no incentive for hitmen to carry out the hits, while drug dealers offer a repeat business model.

      Internet hitmen, as portrayed on the dark web, are likely a scam. The economics of such a business model don't make sense. Once a hitman is paid, they have no incentive to carry out the hit as they remain anonymous and untraceable. Drugs, on the other hand, offer a repeat business model for dealers. Eileen, a journalist, discovered this after encountering threats and eventually uncovered that the Mesa mafia, a group claiming to be Internet hitmen, were actually scammers. Their victims are not assassination victims but rather individuals trying to hire hitmen, who often get strung along for as much money as possible. The scam's structure is always the same - send the name and photo of the target and then send the money. However, the journalist's investigation could only go so far, and she didn't want to risk sending money or putting a real person's name and photo at risk. The Mesa mafia's business model involved paying for content to be written about them, which opened up a new avenue for investigation - astroturfing. In summary, Internet hitmen are likely a scam, and the people most victimized are those trying to hire them.

    • Astroturfing: Creating a False Sense of Grassroots SupportCriminal organization 'Basement Mafia' used Astroturfing tactics to build authenticity and attract customers by creating fake testimonials, blog posts, and videos of supposed criminal activities, hiring freelance writers, and paying them low wages. This is an example of how Astroturfing can manipulate public perception and create a false sense of legitimacy.

      The term "Astroturfing" refers to fake grassroots campaigns where organizations or individuals create a false appearance of grassroots support. In the context of the discussion, a criminal organization called Basement Mafia used Astroturfing tactics to build authenticity and attract customers by creating a network of fake testimonials, blog posts, and even videos of supposed criminal activities. They hired freelance writers to create these fictional stories and paid them low wages, while also using the content to lure potential clients and gain media attention to put pressure on law enforcement to shut them down. This is an example of how Astroturfing can be used as a powerful tool for manipulating public perception and building a false sense of legitimacy.

    • The Basement Mafia's Online ScamAn alleged criminal organization created a convincing online presence to scam people, promising hitman jobs and manipulating fear. Always verify online information and individuals' authenticity.

      The Basement Mafia, an alleged online criminal organization, was able to create a convincing online presence that attracted not only customers but also applicants for hitman jobs. The group's leader, who went by the name Yura, used this ruse to scam people out of money by giving them tests, such as setting cars on fire, and promising them roles in the organization. Yura, who was later identified as being from Romania, communicated with Aileen, a blogger who was writing about the Basement Mafia, under the guise of being the group's PR person. The correspondence between Aileen and Yura became increasingly intense, with Yura making threats. It was later discovered that Yura was likely the mastermind behind the entire scam, using the fear and allure of an organized crime syndicate to manipulate and deceive people. This incident serves as a reminder of the power of online personas and the importance of verifying the authenticity of information and individuals encountered on the internet.

    • The Blurred Line Between Scammers and Dangerous IndividualsScammers like Euro, who use threats to manipulate victims, can pose a significant danger when their clients seek illegal services.

      The line between scammers and dangerous individuals can be blurred. Euro, who threatened Eileen to stop writing about his scam, was not a traditional hitman but a digital marketer for an elaborate scam. He tried to manipulate Eileen with threats and offers, but his intentions were more about justifying his illegal activities than causing harm. However, the real danger came from Euro's clients, who were willing to pay for his services to carry out murders. Eileen's goal was to expose these individuals and raise awareness about their dangerous intentions. Despite Euro being a scammer, his access to a list of people seeking illegal services posed a significant threat. The story serves as a reminder that not all threats come from the most obvious sources and that the consequences of scams can be far-reaching and dangerous.

    • The discovery of a dark web hitman site and the challenges in addressing itInitially disbelieved and disliked by law enforcement, a dark web hitman site posed a new and unconventional threat. Collaboration between law enforcement and technology experts was crucial to uncovering the mafia behind it and addressing the potential danger.

      The discovery of a dark web hitman site, where people could pay to have hits carried out, was initially met with disbelief and disinterest from law enforcement agencies. The three main players in this situation were a true crime writer, a fake Internet hitman, and the people who wanted to hire hitmen for real. The balance between these groups continued until the hitman site and the mafia behind it were hacked, revealing more details about the clients. This incident highlights the challenges in addressing new and unconventional threats on the dark web and the importance of collaboration between law enforcement and technology experts. Despite the potential danger posed by these clients, who included husbands, business partners, and even disgruntled sports bettors, law enforcement remained uninterested. The case serves as a reminder of the evolving nature of cybercrime and the need for continuous vigilance and innovation in combating it.

    • Discovery of a Hitman Site on the Dark WebThe dark web hosts dangerous criminal activities, including hitman services. Law enforcement response can be slow, leaving individuals and communities vulnerable. Collaboration between governments and cybersecurity professionals is crucial to combat these threats.

      The dark web harbors dangerous criminal activities, such as hitman services, which can pose significant threats to individuals and societies. In the discussed case, a hitman site named Basa Mafia was discovered, revealing thousands of emails exchanging orders for hits on people, including gruesome requests for acid attacks, murders, and even a 14-year-old boy. Despite the severity of the situation, law enforcement showed little interest or concern, leaving those trying to expose the site feeling frustrated. The individuals behind the site, like Yara, were not only facilitating these heinous acts but also attempting to keep their businesses running, even when faced with potential exposure. This incident underscores the importance of increased collaboration between governments and cybersecurity professionals to combat the growing threats on the dark web and ensure the safety and security of communities.

    • Using the internet to catch cybercriminalsAnonymity on the internet makes it easier for criminals to operate but harder for authorities to track them down. Effective use of the internet by law enforcement can lead to the identification and arrest of cybercriminals.

      The internet can be used as a tool for both good and evil, and the line between the two can be blurry. In this case, a man named Uro, who ran a fake murder-for-hire website, used it to lure potential clients and then reported them to law enforcement. However, it took years for the authorities to take action, and it wasn't until recently that five men believed to be part of the Basin Mafia, the group behind the website, were arrested in Romania. The case highlights the importance of law enforcement taking online threats seriously and the challenges of identifying and apprehending cybercriminals. It also underscores the anonymity the internet provides, making it easier for criminals to operate but harder for authorities to track them down. Despite the risks, the internet can also be a powerful tool for fighting crime when used effectively.

    • The Reality of Internet Hitmen is Often a Disappointing ScamDespite sensational headlines, no actual murders linked to Internet hitmen. Real people get hurt by false accusations and scams.

      While the phenomenon of Internet hitmen may seem intriguing and even dangerous, the reality is often a disappointing scam. Despite numerous arrests and significant financial transactions, no actual murders have been linked to these online assassins. However, the story takes a tragic turn when we focus on the victims, such as Amy Allwine, who was targeted by a man named dogdaygod. Despite being an innocent suburban housewife, she was falsely accused of stealing a husband and a business, and was even visited by the FBI due to the hit placed on her. Despite providing them with evidence, the FBI didn't seem to take it seriously, leaving Amy feeling threatened and scared. This case serves as a reminder that behind the sensational headlines, there are real people who get hurt by these scams.

    • Religious beliefs and infidelity led to tragic consequencesReligious constraints should not lead to violence or harm against others, seek help and communicate openly instead.

      Religious beliefs and infidelity can lead to extreme measures. In this tragic story, a husband, who was also a minister in a Pentecostal church that did not allow divorce, felt trapped in his marriage after being discovered having an affair. Unable to leave his wife and maintain his position in the church, he resorted to murder. The local police quickly uncovered the truth behind the apparent suicide, revealing a complex web of deceit and religious constraints. This unfortunate event serves as a reminder that personal dilemmas should never lead to violence or harm against others. We encourage open communication, understanding, and seeking help from trusted resources when faced with difficult situations.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Dalla lupara alla tastiera: come e perché le mafie si sono insediate nel Dark web

    Dalla lupara alla tastiera: come e perché le mafie si sono insediate nel Dark web
    Nonostante le cose siano cambiate da molto tempo, sono troppe le persone tuttora abituate a pensare le mafie e i mafiosi secondo stereotipi totalmente inadatti a raffigurare la realtà. Lontanissima dai cliché che la volevano soggetta ai capricci e alle scelte anche irrazionali di ignoranti ma spietati padrini, «la criminalità mafiosa contemporanea» è invece sempre di più «profondamente influenzata dalle dinamiche della globalizzazione e dall'evoluzione delle tecnologie». Vive il suo tempo. E in qualche caso lo domina, anche e soprattutto attraverso strumenti all'avanguardia: i sofisticati prodotti della rivoluzione informatica. «Le mafie nell'era moderna preferiscono le tastiere alle pistole», anche perché la Rete ha spalancato le porte di infinite possibilità d'azione», facilitando «alle organizzazioni criminali» la connessione delle loro attività con il cybercrime.
    Alcuni studiosi, tra cui Antonio Nicaso e Greta Nasi, sono tra gli autori di un prezioso volume che sistetizza anni di ricerca sui processi di mutazione informatica messi in atto dalle mafie, e in particolare dalla 'ndrangheta calabrese, in relazione alle proprie attività illegali e criminali. In questa puntata di CentoParole il nostro Dario Campione ci parla di The Dark-Web Side of Mafia. Appalti, crypto e cybercrime. Le mafie adesso: più invisibili e potenti pubblicato dall'editore milanese Zolfo.

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    This week in the Enterprise News, Mission Secure Announces Series B, Akamai Technologies Acquires Inverse, for Microsoft, Security is a $10 Billion Business, Sontiq acquires Cyberscout, IRONSCALES improves the ability to detect phishing attacks, Imperva updates its WAAP and Data Security offerings, SonicWall Confirms A Zero-Day Vulnerability with NO other details, Arista intros Multi-Domain Macro-Segmentation Service (I don't know what it means, but its provocative), & more!

     

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw215

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    Imperva Updates WAAP, SonicWall Confirms 0-Day, & Arista Zero Trust - ESW #215

    This week in the Enterprise News, Mission Secure Announces Series B, Akamai Technologies Acquires Inverse, for Microsoft, Security is a $10 Billion Business, Sontiq acquires Cyberscout, IRONSCALES improves the ability to detect phishing attacks, Imperva updates its WAAP and Data Security offerings, SonicWall Confirms A Zero-Day Vulnerability with NO other details, Arista intros Multi-Domain Macro-Segmentation Service (I don't know what it means, but its provocative), & more!

     

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw215

    Fraud, Scams, and Other Assorted Awfulness - Jorij Abraham, Global Anti-Scam Alliance

    Fraud, Scams, and Other Assorted Awfulness - Jorij Abraham, Global Anti-Scam Alliance

    Many of us have fallen victims to scams.  Most of us know someone else who has.  Fraud did not start with the Internet, but it has unfortunately become an integral part of the online experience.

    Jorij Abraham is Managing Director of the Global Anti-Scam Alliance (GASA), a non-profit organization based in Amsterdam and a partner to CyAN.  

    In today's Secure-in-Mind episode, we talk about GASA's mission fighting scams of all sorts.  What is a scam?  What types of scams are most common around the world, who are the victims, and who are the major perpetrators?  

    Jorij shares his experience in helping to fight abuse, whether it involves fake work visa promises, business email compromise, as well as subscription, romance, crypto, and many other scams that defraud innocent victims of their money.  How are we working with law enforcement?  What are tech companies doing to fight scams?   And, as always, we ask Jorij his views on what the future will bring.

    CyAN strongly endorses GASA's mission; visit them at https://gasa.org, as well as their https://scamadviser.com service where you can check whether something is a known scam.  

    Consider also register for GASA's annual summit in Lisbon, Portugal, on Oct 18-19 2023 - https://www.gasa.org/event-details/4th-global-anti-scam-summit-2023

    You can find Jorij on LinkedIn at https://www.linkedin.com/in/jorijabraham/

    The Cybersecurity Advisors Network lives at https://cybersecurityadvisors.network -

    This episode is available as a video at https://youtu.be/XidPnG6SmaY

    All our various media channels are here: https://cybersecurityadvisors.network/media

    Intro/outro music courtesy of Studio Kolomna via Pixabay: https://pixabay.com/users/studiokolomna-2073170/