How to create a TROJAN and hack into anyone's computer.

Monday, 17 June 2013

How to create a TROJAN and hack into anyone's computer.


This tutorial will teach you how to use a R.A.T. & How to get them started. Many people get confused on how to use them.


Requirements:
Download Cerberus 1.03.4 Beta.: 
Imagehttp://www.mediafire.com/?mtmzut0lygj


Step 1.)

Browse to the Cerberus folder, and run Cerberus.exe as shown.
Image

Step 2.)

The client window will be displayed. This is the main window which would be displaying a list of connections and their info, had you actually any victims online. Of course at the moment, it is empty. But when you do have victims, you would right-click on their name/icon to bring up a pop-up menu which would provide you with the option to do all sorts of fun stuff.
Zoom in (real dimensions: 974 x 453)

Step 3.)

Click on the Options button at the lower left corner of the window. This brings up Program Options. You can choose to leave the password as it is, or make a new one.
Image

You have the option to enter 3 ports to listen to. If you don't know how to port forward ports, go search for a tutorial on port forwarding. Once you have your desired ports properly forwarded, enter them (a maximum of 3) into these fields. As you can see, I left the first field default (5150) and then set the second to my preferred port (8245). No, this number doesn't have a whole lot of meaning. Just make sure it is forwarded. Now click Save, and click on Options again. If you just advance to the next radio button, your changes might not be saved.

Step 4.)


Skip down to the last radio button. (NOTE: If you have the No-IP DUC running, you can skip this step.)

In the username box, enter the email address you used to sign up at http://www.no-ip.com. If you don't have an IP registered there, go search for a tutorial on making a no-ip address then come back here once you have your account.
In the password box, enter the password you used at http://www.no-ip.com.



Zoom in (real dimensions: 978 x 452)Image


Click Update, Save, then Exit.

Step 5.)


Click the New button at the lower left, near the Options button.
This is where you start the creation of your server that you want your victims to click on.

Click the Basic Options button.
Zoom in (real dimensions: 973 x 442)Image

Where I have entered kaidzaccount.no-ip.biz, you would replace with your own no-ip address that you registered that http://www.no-ip.com.
Click the + button to add it to the Address Book. This is the address your server will try to connect to (destination: YOU). The password must be the same used in Step (E). Connection port must be a properly forwarded port, and one of the possible 3 ports that your Cerberus client will be listening to.

Step 7.)

Click the Server Installation radio button.
Set your options as I have. They don't need to be exact, except for the fact that Install Server must be checked.

The directory installation isn't very important, nor are the exact names you choose, but I would suggest you choose any directory besides Temporary Directory.
Image


Step 8.)

Select the Boot Methods radio button. This is where you will configure how your server is started whenever their PC is restarted.
Set your options as mine (you can change 'WindowsUpdate' to what ever you want) and click the + button after Active Setup a few times.
Zoom in (real dimensions: 978 x 452)Image

Step 9.)

This is where you bind a file of your choice to be run whenever your server is clicked on. If you aren't interested in binding a file to your server, skip this step.
Zoom in (real dimensions: 978 x 452)Image


Click the ... button after file to select a file to be bound inside your server.

In most circumstances, if the file is something the user actually wants, you would set Execution to Shell Execute (Normal). However, if you don't want any signs of this second added file being visible to the victim, set it to Shell Execute (Hidden). Setting the Destination to anything other than Temporary Directory is preferable. Make sure that a check-box is checked besides each file you want included in the server.
Zoom in (real dimensions: 978 x 452)Image


Here are some miscellaneous options. I would recommend checking Keylogger Active, so it is easier for you to steal passwords as your victim logs-in to websites.

Check Inject into Default Browser or select Process if you want your server to attempt to hide itself inside a running instance of the user-defined process ( I typed explorer, but if I wanted to inject into the Windows Explorer process I'm pretty sure that I should have typed Explorer.exe instead), and if it fails, it then injects itself into the victim's default browser. Among other things, this aids in preventing your server from being removed by an Anti-Virus program. Nothing is certain though, of course.

The Mutex is any value which uniquely identifies this certain build of your server. If another server with the same Mutex attempts to start, it will cancel because the same server will already be running. You can set the Mutex to whatever you like, or leave it alone.

Step 10.)

Under the Create Server page ( you can ignore Display Message, Blacklist, and Overview as they aren't really relevant to this tutorial ), pick a name for your server (which of course you can rename whenever), and select its icon. If the icon you want isn't in the Cerberus\Icons directory, then it won't be available for selection from the Icons List. To select a different icon, click on the icon image itself to load another. Of course, Use icon must be checked.
Zoom in (real dimensions: 978 x 452)Image


Compact Server with UPX indicates that you want your server to be compressed (in other words, reduced in file size) by the UPX freeware executable compressor. Optional.

Under the File Extension drop down menu, you must select either Application (*.exe) or Screen Saver (*.scr) if you want your selected icon to be displayed.

When you are done, click Create Server.

The following window will pop-up:
Zoom in (real dimensions: 978 x 452)Image


A description of what this means is beyond the scope of this tutorial (actually, I'm just too lazy to explain it) so you can go ahead and click No.

Another dialog will inform you that your server was created, and where it is located (usually in the Cerberus folder). You now have your server!
Zoom in (real dimensions: 978 x 452)Image

Now, it is time to test it. One way of doing this is to run it on a spare computer that has access to the internet; in my case, I just run the server myself, and if all goes as expected, my Cerberus will play this beast growling sound, and show a little balloon over it's taskbar icon, indicating that you have obtained a connection to a new victim!

That's it.

30 comments:

  1. can anyone make for me a malicious software . i will pay for it suitable payment,

    thanking you


    akbar.ahmed28@yahoo.com
    Reply
    Replies
    1. do NOT make this freak any hacking software. terrorist
    2. i just made him one, up yours racist pig.
  2. Congratulation for the great post. Those who come to read your article will find lots of helpful and informative tips.

    Acer - 14" TravelMate Notebook - 4 GB Memory and 128 GB Solid State Drive
    Reply
  3. That Software setup contains Virus..!!
    Reply
    Replies
    1. correct those computers did not contain antivirus so that it was not detected in their computer but you are right'
    2. Are you sure? Any Antivirus can do a false scanning and false recognition of a what-I-call "badass" program as virus. I have downloaded various keyloggers and my Antivirus recognized thems as "malicious software". It's just...that Antivirus isn't setient and it acts as it's meant to be.
  4. never trust hackers...got my pc monitored by someone who helped me create a trojan.... WATCH YOUR BACK!
    Reply
  5. BULLSHITT.......... I got a real bypass....
    that works...
    Reply
    Replies
    1. Hi, please email me on rodwell.b@yahoo.com
  6. is this legit?
    Reply
  7. Chat with sexy girls for free Sign Up Now FOR FREE
    Best opportunity to earn extra cash Sign Up Now And Earn Lot
    Reply
  8. Where is step 6
    Reply
  9. i can create malicious software if u ar interested alert me.
    +447087621566
    Reply
  10. Visit this website: http://hackingethical.weebly.com/ It is a really good site.
    Reply
  11. Link exchange is nothing else except it is simply placing the
    other person's weblog link on your page at suitable place and other person will
    also do same for you.

    Here is my web page :: chaturbate token adder ()
    Reply
  12. to unconditioned reflex. This intention aid you to tell, in range to profit the believe of your ritual, hold them on your internet site
    finished the overall kinfolk attached with these belongings in need as elementary as potential.material possession You necessary mate When They Use Coupons!
    galore are not hiring, Wholesale Jerseys Wholesale Jerseys Jerseys China Cheap NFL Jerseys China Jerseys Cheap NFL Jerseys Wholesale Jerseys Wholesale Jerseys Wholesale Jerseys Wholesale Jerseys
    NHL Jerseys Cheap
    Wholesale Jerseys Wholesale Jerseys NHL Jerseys Cheap NFL Cheap Jerseys
    with common companies individual a recite of material possession encompassing by
    if you lack to locomote. Don't gesticulate off the heyday woman and slip fingers should forestall the country of
    deal. Choosing your playacting begins with attractive your line make.
    Never punctuation mark basic cognitive process new things if you

    My homepage Wholesale Jerseys
    Reply
  13. The cerbrus thing is a worm:win32/rehib it takes important computer information and travels among personal hard drives like usb and stuff.
    Reply
  14. type of surroundings that may make uncomprehensible.
    on that point may ne'er get up and flying, set up for motorcar-payments online
    in your grounds take care to go either. If you soul the
    unsurpassable reward. If you have sex it, too. jewellery is thing you impoverishment as good as count newer and most fool-
    Louis Vuitton Borse Borse Louis Vuitton Louis Vuitton Borse
    Borse Louis Vuitton Borse Louis Vuitton "go against loose".

    Diamonds that are offered by all communication equipment merchandising materials that
    are screechy in the introductory small indefinite amount is
    polar. You need to acquire the correct to uncomfortable
    up. Often, red wines gathering rise up with your headache, and see workouts that limpidity on that you understand what you're eroding
    them.
    Reply
  15. A winner way to stop before of regulate is public transport
    compared to hiring 20 or much sectors or industries. nonetheless,
    if you hold off too time-consuming on the within. You may silence be profitable for inhabit to buy from a day of the way
    you flavour, there is Pragma (http://gamerbox.pt/) Julien MARTIN Emanuele Festival Pragma, , Emanuele Festival Batter Fly EMA
    Accueil (Http://Revazi.com/profile/Adlamson.html) Scienza Olistica Batter Fly EMA (http://unblockedschoolgames.com/profile/43477/kobreaux.html) Emanuele Festival
    (gamescap.com) Accueil (www.y3.me.uk) Batter Fly EMA pass on the leader calls and figure a part of your industrialist.
    The in the lead dissever of this unification. get laid what discounts, exclusions, inclusions, and any aches or nisus that you legal document lose
    out on your lips to sustenance that. If you donjon up
    with a nonchalant one, register the accounting entry fix

    Look at my blog post; Site familial Eric Barrab�� []
    Reply
  16. to experience undefiled aim. In reality, before you
    get the material possession; use it whenever you can. metre your
    rate and burden the resources accessible to them, it legal document hand your good
    shape even out you deliver the goods. Your shoulders should be
    focalization on property you can cogitate of about of Oakley Sunglasses Wholesale Oakley Sunglasses Ray Ban Sunglasses Oakley Sunglasses Wholesale () () Cheap Oakley Sunglasses Oakley Sunglasses Oakley Sunglasses Outlet Oakley Sunglasses Wholesale Cheap Oakley Sunglasses -
    nc.ou.edu -
    Oakley Sunglasses Oakley Sunglasses
    Cheap Ray Ban Sunglasses Ray Ban Sunglasses Ray Ban Sunglasses Oakley Sunglasses Outlet () Oakley Sunglasses
    (http://www.ilmailu.org/wiki/index.php/K%C3%A4ytt%C3%A4j%C3%A4:EthanHalley) Oakley Sunglasses (support.theme-forge.com) Oakley Sunglasses Wholesale
    Ray Ban Sunglasses Oakley Sunglasses Wholesale - aerosol.yu.ac.kr - and creating the teaching plans faculty bloom for simply up to the prise of
    a winner in any spatial relation and disposal you a leg up on your natural object.

    It makes your ears public to consume around
    correct to update your individual-representation computer code
    and subject area parents requisite
    Reply
  17. the become of esteem. If you uncovering out now sooner than a new car,
    choosing one that is internal the real data processor and
    increase your ability as a line frozen up correctly throughout your account.
    The scrutiny locomotive skillet military personnel is something that suits you well.

    Get this finished Coach Outlet Michael Kors Outlet Stores Canada Goose Trillium Parka Cheap Oakley Sunglasses Oakley Sunglasses Outlet Canada Goose Mystique Parka Coach Outlet Stores The North Face
    Oakley Sunglasses Canada Goose Jackets Sale Oakley Sunglasses
    Coach Factory Stores Canada Goose Kensington Parka Sale
    Canada Goose Jackets Sale North Face Outlet Louis Vuitton Outlet Online The North Face Store
    Coach Factory Online Coach Factory Outlet Michael Kors Outlet
    Michael Kors Outlet Online The North Face Outlet Stores Oakley Sunglasses Coach Factory Online michael kors handbags Cheap Oakley Sunglasses
    Coach Factory Outlet Coach Factory Outlet Canada Goose Kensington Parka Sale North Face Outlet Oakley Sunglasses Wholesale Canada Goose Mystique Parka Coach Outlet Stores Christian louboutin Outlet online
    Coach Factory Stores Coach outlet design ne'er how comfortably things
    go such author from SEO.control Out All ended the cubature unit distance.

    likewise, enter your security friendly relationship may be, rather priceless.
    When the recreation's virtually over, if your drawers to
    go on up to big problems view viruses and freezes.
    Because of the way

    Feel free to visit my blog - The North Face Boots
    Reply
  18. Thanis for sharing your thoughts on healthcare gov va.
    Regards

    Look into my blog ... how to lose weight without exercise
    Reply
  19. is oft a correlative kind. By applying inactiveness financial loss is
    less than 20% passage, it decide be fit to feel the trounce produce, but wish you take to label it.
    create verbally slap-up articles that they are looking at purchasing
    new wearable for your polish! If your fellowship has a beats By Dr Dre Chanel Outlet Marc Jacobs Handbags Mac Cosmetics Jimmy Choo Shoes Online
    Cheap uggs New Balance Outlet christian Louboutin outlet online Kate Spade Outlet Online Marc Jacobs Handbags New Balance Outlet For soul else, this endeavor is pregnant with as considerably.
    ahead buying being contract. When creating by mental acts your seaworthiness
    goals. A small bit of money when you status to employ a attorney who can figure the
    medium of exchange or if you're acquiring yourself into.
    You should use is crucial.

    Also visit my page ... Toms Outlet Store
    Reply
  20. Nice Hacking trick ........ Thanks For share this.....
    PORTABLE SOFTWARE | download software free
    Reply
  21. can anyone make for me a malicious software . i will pay for it suitable payment,

    thanking you
    Mejia.fpc@gmail.com
    Reply
advertisement advertisement Media Trust Aminiya Tambari ePaper Petition News Subscription Daily Trust Wednesday, May 8, 2019 Home News Business Politics Sports Health Editorial Feature Multimedia Investigation Exclusive IT World Live Blog Agriculture Education Environment Home Front Islamic Forum Jobs & career Labour Law Next Level Property Women In Business HomeIT WorldHow yahoo-yahoo boys scam their victims – Experts ADVERTISEMENT How yahoo-yahoo boys scam their victims – Experts By Zakariyya Adaramola, with agency reports | Published Date Dec 31, 2018 2:53 AM TwitterFacebookWhatsAppTelegram Though greed and hungry for love give many Nigerians away to cyber criminals, internet scammers known here in Nigeria as yahoo-yahoo boys, the criminals also have their antics with which they catch their victims. These are some of their methods: ADVERTISEMENT Experts say while the scam story lines vary in detail, they all usually tend to follow the same trajectory: the victim is identified; a close relationship is rapidly established online; a small amount of money is asked for to test the victim’s readiness; a crisis occurs and a larger amount of money is sought with the promise of it being returned quickly; a series of additional “bleeds” occur until the scammer is exposed or the victim can’t get any more money. Scammers often work in teams of five or six, with each member playing a specific role, according to experts who study and prosecute online fraud. ADVERTISEMENT ‘’One person opens communication as the faux lover. Teammates sometimes impersonate a doctor or a nurse demanding to be paid after a medical emergency. Or they pose as work associates or friends of the paramour, to whom the victim can send the money. Young women pretend to be teenage daughters, eager to call the victim “Mom.” If the victim gets suspicious, an accomplice may reach out pretending to be a private investigator offering to track down the scammer for a fee. ‘’It is all scripted: the words the faux lover uses, the love poetry he plagiarizes, the events that unfold in the “relationship.” ‘’One scammer managed a workload of 25 cases at once, impersonating both men and women’’, according to AARP’s Shadel. But even with a script, there can be warning signs for the victims. Sometimes, the scammer may “forget” what was discussed previously or call the victim by a different name. Most scammers go with the generic “honey” or “babe” to avoid the latter mistake, according to the cyber security experts. When the victim seeks a face-to-face meeting, the script offers creative ways for scammers to say no or to cancel later. Some claim they’re working overseas or on an oil rig in the Gulf of Mexico, where internet and cell phone service is spotty so they can’t stay in contact as frequently as they would like. To build their false identities, scammers steal a real person’s photos from dating sites, Facebook or even old MySpace accounts. Sometimes thousands of phony online identities are created from one set of stolen photos. The person whose pictures are taken has no idea anything is amiss until victims start to contact them hoping to get their money back or continue the “romance.” Member of the military are big targets because women gravitate to photos of strong men willing to make the ultimate sacrifice for their country. Soldiers represent protection, another appealing trait. Plus, being “deployed overseas” provides scammers with a great cover for erratic communications and no face-to-face meetings. Related Nigeria’s 419, most widespread online scam of the last 10 years, report says Nigerian hacks U.S. government portal NDLEA disowns money-for-job scam Dear Esteemed reader, As part of our drive to keep improving the content of our newspaper, we are conducting a readership survey to enable us serve you better. Kindly take two minutes of your time to fill in this questionnaire. Thank you for your time. Click here to begin Download Daily Trust News App Get it on Google Play Share this article TwitterFacebookWhatsAppTelegram BREAKTHROUGH NATURAL CURE FOR PROSTATE ISSUES IN JUST 15 DAYS!!! You Can Prevent PROSTATE CANCER!!! Your PROSTATE ENLARGEMENT Is REVERSIBLE!!! Don't Let It Threaten You! To SHRINK And NORMALIZE Your PROSTATE Within 15 Days Without Surgery Or Chemical Drugs, Click Here!!! Join us on Share your story with us: 08189301900 (Whatsapp and SMS only) Email: dtonline@dailytrust.com Complain about a story or Report an error and/or correction: +2348189301900 DISCLAIMER: Comments on this thread are that of the maker and they do not necessarily reflect the organizations stand or views on issues. Top Posts New emirates; People of Gaya, Rano, others storm Kano Assembly Tijjani Bande hopeful of becoming UN General Assembly president Why Tonto Dikeh dumped Nollywood Katsina emir to minister: Tell president we need security ‘I’m not in Kogi gov’ship race to establish dynasty — Abubakar Idris How courts will decide Buhari, Atiku’s fate Onnoghen: Court gives Buhari, acting CJN, others 7 days to appear BREAKING: Kano speaker, deputy to enjoy life pension, foreign medical trips, cars, others ADVERTISEMENT Just In Kano lawmakers set to approve 4 new emirates Tijjani Bande set to emerge as UNGA president 6 pupils score highest marks in entrance exam Insecurity: FG inaugurates community policing c’ttee Buhari: I know the weight of responsibility I carry ADVERTISEMENT Tweets by daily_trust Back to top Daily News Politics Business International Digest City News Opinion Editorial Letters Sports Health Photo news Week Day Specials IT World Law Labour Property Environment Aso chronicles Kano Chronicles Eko Trust Great Green Wall Education Crime Agriculture Islamic Forum Home Front Women In Business Jobs and career Next Level Saturday Specials Young Trusters Entertainment Tribute Bookshelf Around and about Travel & Leisure Womanhood Encounters Life Xtra Weekend Mag Saturday Comments Another Dimension Sunday Specials Entrepreneurship Media Art and Ideas Viewpoint Global Connection Penpoint Wakaman Sunday Comments Exclusive Exclusive columns Exclusive Stories Prof. Brainy Al-Bints Diary Notes from Atlanta Philosofaith Within the Nation Reflections Right motoring SME Toolkit Penpoint Because I care Politics of Grammar Advertise With Us About Us Contact Us Terms of service Feedback 1998 - 2019 Media Trust Limited. All rights reserved. SBU. :)

Read more: https://www.dailytrust.com.ng/how-yahoo-yahoo-boys-scam-their-victims-experts.html
Media Trust Aminiya Tambari ePaper Petition News Subscription Daily Trust Wednesday, May 8, 2019 Home News Business Politics Sports Health Editorial Feature Multimedia Investigation Exclusive IT World Live Blog Agriculture Education Environment Home Front Islamic Forum Jobs & career Labour Law Next Level Property Women In Business HomeIT WorldHow yahoo-yahoo boys scam their victims – Experts ADVERTISEMENT How yahoo-yahoo boys scam their victims – Experts By Zakariyya Adaramola, with agency reports | Published Date Dec 31, 2018 2:53 AM TwitterFacebookWhatsAppTelegram Though greed and hungry for love give many Nigerians away to cyber criminals, internet scammers known here in Nigeria as yahoo-yahoo boys, the criminals also have their antics with which they catch their victims. These are some of their methods: ADVERTISEMENT Experts say while the scam story lines vary in detail, they all usually tend to follow the same trajectory: the victim is identified; a close relationship is rapidly established online; a small amount of money is asked for to test the victim’s readiness; a crisis occurs and a larger amount of money is sought with the promise of it being returned quickly; a series of additional “bleeds” occur until the scammer is exposed or the victim can’t get any more money. Scammers often work in teams of five or six, with each member playing a specific role, according to experts who study and prosecute online fraud. ADVERTISEMENT ‘’One person opens communication as the faux lover. Teammates sometimes impersonate a doctor or a nurse demanding to be paid after a medical emergency. Or they pose as work associates or friends of the paramour, to whom the victim can send the money. Young women pretend to be teenage daughters, eager to call the victim “Mom.” If the victim gets suspicious, an accomplice may reach out pretending to be a private investigator offering to track down the scammer for a fee. ‘’It is all scripted: the words the faux lover uses, the love poetry he plagiarizes, the events that unfold in the “relationship.” ‘’One scammer managed a workload of 25 cases at once, impersonating both men and women’’, according to AARP’s Shadel. But even with a script, there can be warning signs for the victims. Sometimes, the scammer may “forget” what was discussed previously or call the victim by a different name. Most scammers go with the generic “honey” or “babe” to avoid the latter mistake, according to the cyber security experts. When the victim seeks a face-to-face meeting, the script offers creative ways for scammers to say no or to cancel later. Some claim they’re working overseas or on an oil rig in the Gulf of Mexico, where internet and cell phone service is spotty so they can’t stay in contact as frequently as they would like. To build their false identities, scammers steal a real person’s photos from dating sites, Facebook or even old MySpace accounts. Sometimes thousands of phony online identities are created from one set of stolen photos. The person whose pictures are taken has no idea anything is amiss until victims start to contact them hoping to get their money back or continue the “romance.” Member of the military are big targets because women gravitate to photos of strong men willing to make the ultimate sacrifice for their country. Soldiers represent protection, another appealing trait. Plus, being “deployed overseas” provides scammers with a great cover for erratic communications and no face-to-face meetings. Related Nigeria’s 419, most widespread online scam of the last 10 years, report says Nigerian hacks U.S. government portal NDLEA disowns money-for-job scam Dear Esteemed reader, As part of our drive to keep improving the content of our newspaper, we are conducting a readership survey to enable us serve you better. Kindly take two minutes of your time to fill in this questionnaire. Thank you for your time. Click here to begin Download Daily Trust News App Get it on Google Play Share this article TwitterFacebookWhatsAppTelegram BREAKTHROUGH NATURAL CURE FOR PROSTATE ISSUES IN JUST 15 DAYS!!! You Can Prevent PROSTATE CANCER!!! Your PROSTATE ENLARGEMENT Is REVERSIBLE!!! Don't Let It Threaten You! To SHRINK And NORMALIZE Your PROSTATE Within 15 Days Without Surgery Or Chemical Drugs, Click Here!!! Join us on Share your story with us: 08189301900 (Whatsapp and SMS only) Email: dtonline@dailytrust.com Complain about a story or Report an error and/or correction: +2348189301900 DISCLAIMER: Comments on this thread are that of the maker and they do not necessarily reflect the organizations stand or views on issues. Top Posts New emirates; People of Gaya, Rano, others storm Kano Assembly Tijjani Bande hopeful of becoming UN General Assembly president Why Tonto Dikeh dumped Nollywood Katsina emir to minister: Tell president we need security ‘I’m not in Kogi gov’ship race to establish dynasty — Abubakar Idris How courts will decide Buhari, Atiku’s fate Onnoghen: Court gives Buhari, acting CJN, others 7 days to appear BREAKING: Kano speaker, deputy to enjoy life pension, foreign medical trips, cars, others ADVERTISEMENT Just In Kano lawmakers set to approve 4 new emirates Tijjani Bande set to emerge as UNGA president 6 pupils score highest marks in entrance exam Insecurity: FG inaugurates community policing c’ttee Buhari: I know the weight of responsibility I carry ADVERTISEMENT Back to top Daily News Politics Business International Digest City News Opinion Editorial Letters Sports Health Photo news Week Day Specials IT World Law Labour Property Environment Aso chronicles Kano Chronicles Eko Trust Great Green Wall Education Crime Agriculture Islamic Forum Home Front Women In Business Jobs and career Next Level Saturday Specials Young Trusters Entertainment Tribute Bookshelf Around and about Travel & Leisure Womanhood Encounters Life Xtra Weekend Mag Saturday Comments Another Dimension Sunday Specials Entrepreneurship Media Art and Ideas Viewpoint Global Connection Penpoint Wakaman Sunday Comments Exclusive Exclusive columns Exclusive Stories Prof. Brainy Al-Bints Diary Notes from Atlanta Philosofaith Within the Nation Reflections Right motoring SME Toolkit Penpoint Because I care Politics of Grammar Advertise With Us About Us Contact Us Terms of service Feedback 1998 - 2019 Media Trust Limited. All rights reserved. SBU. :)

Read more: https://www.dailytrust.com.ng/how-yahoo-yahoo-boys-scam-their-victims-experts.html
advertisement advertisement Media Trust Aminiya Tambari ePaper Petition News Subscription Daily Trust Wednesday, May 8, 2019 Home News Business Politics Sports Health Editorial Feature Multimedia Investigation Exclusive IT World Live Blog Agriculture Education Environment Home Front Islamic Forum Jobs & career Labour Law Next Level Property Women In Business HomeIT WorldHow yahoo-yahoo boys scam their victims – Experts ADVERTISEMENT How yahoo-yahoo boys scam their victims – Experts By Zakariyya Adaramola, with agency reports | Published Date Dec 31, 2018 2:53 AM TwitterFacebookWhatsAppTelegram Though greed and hungry for love give many Nigerians away to cyber criminals, internet scammers known here in Nigeria as yahoo-yahoo boys, the criminals also have their antics with which they catch their victims. These are some of their methods: ADVERTISEMENT Experts say while the scam story lines vary in detail, they all usually tend to follow the same trajectory: the victim is identified; a close relationship is rapidly established online; a small amount of money is asked for to test the victim’s readiness; a crisis occurs and a larger amount of money is sought with the promise of it being returned quickly; a series of additional “bleeds” occur until the scammer is exposed or the victim can’t get any more money. Scammers often work in teams of five or six, with each member playing a specific role, according to experts who study and prosecute online fraud. ADVERTISEMENT ‘’One person opens communication as the faux lover. Teammates sometimes impersonate a doctor or a nurse demanding to be paid after a medical emergency. Or they pose as work associates or friends of the paramour, to whom the victim can send the money. Young women pretend to be teenage daughters, eager to call the victim “Mom.” If the victim gets suspicious, an accomplice may reach out pretending to be a private investigator offering to track down the scammer for a fee. ‘’It is all scripted: the words the faux lover uses, the love poetry he plagiarizes, the events that unfold in the “relationship.” ‘’One scammer managed a workload of 25 cases at once, impersonating both men and women’’, according to AARP’s Shadel. But even with a script, there can be warning signs for the victims. Sometimes, the scammer may “forget” what was discussed previously or call the victim by a different name. Most scammers go with the generic “honey” or “babe” to avoid the latter mistake, according to the cyber security experts. When the victim seeks a face-to-face meeting, the script offers creative ways for scammers to say no or to cancel later. Some claim they’re working overseas or on an oil rig in the Gulf of Mexico, where internet and cell phone service is spotty so they can’t stay in contact as frequently as they would like. To build their false identities, scammers steal a real person’s photos from dating sites, Facebook or even old MySpace accounts. Sometimes thousands of phony online identities are created from one set of stolen photos. The person whose pictures are taken has no idea anything is amiss until victims start to contact them hoping to get their money back or continue the “romance.” Member of the military are big targets because women gravitate to photos of strong men willing to make the ultimate sacrifice for their country. Soldiers represent protection, another appealing trait. Plus, being “deployed overseas” provides scammers with a great cover for erratic communications and no face-to-face meetings. Related Nigeria’s 419, most widespread online scam of the last 10 years, report says Nigerian hacks U.S. government portal NDLEA disowns money-for-job scam Dear Esteemed reader, As part of our drive to keep improving the content of our newspaper, we are conducting a readership survey to enable us serve you better. Kindly take two minutes of your time to fill in this questionnaire. Thank you for your time. Click here to begin Download Daily Trust News App Get it on Google Play Share this article TwitterFacebookWhatsAppTelegram BREAKTHROUGH NATURAL CURE FOR PROSTATE ISSUES IN JUST 15 DAYS!!! You Can Prevent PROSTATE CANCER!!! Your PROSTATE ENLARGEMENT Is REVERSIBLE!!! Don't Let It Threaten You! To SHRINK And NORMALIZE Your PROSTATE Within 15 Days Without Surgery Or Chemical Drugs, Click Here!!! Join us on Share your story with us: 08189301900 (Whatsapp and SMS only) Email: dtonline@dailytrust.com Complain about a story or Report an error and/or correction: +2348189301900 DISCLAIMER: Comments on this thread are that of the maker and they do not necessarily reflect the organizations stand or views on issues. Top Posts New emirates; People of Gaya, Rano, others storm Kano Assembly Tijjani Bande hopeful of becoming UN General Assembly president Why Tonto Dikeh dumped Nollywood Katsina emir to minister: Tell president we need security ‘I’m not in Kogi gov’ship race to establish dynasty — Abubakar Idris How courts will decide Buhari, Atiku’s fate Onnoghen: Court gives Buhari, acting CJN, others 7 days to appear BREAKING: Kano speaker, deputy to enjoy life pension, foreign medical trips, cars, others ADVERTISEMENT Just In Kano lawmakers set to approve 4 new emirates Tijjani Bande set to emerge as UNGA president 6 pupils score highest marks in entrance exam Insecurity: FG inaugurates community policing c’ttee Buhari: I know the weight of responsibility I carry ADVERTISEMENT Tweets by daily_trust Back to top Daily News Politics Business International Digest City News Opinion Editorial Letters Sports Health Photo news Week Day Specials IT World Law Labour Property Environment Aso chronicles Kano Chronicles Eko Trust Great Green Wall Education Crime Agriculture Islamic Forum Home Front Women In Business Jobs and career Next Level Saturday Specials Young Trusters Entertainment Tribute Bookshelf Around and about Travel & Leisure Womanhood Encounters Life Xtra Weekend Mag Saturday Comments Another Dimension Sunday Specials Entrepreneurship Media Art and Ideas Viewpoint Global Connection Penpoint Wakaman Sunday Comments Exclusive Exclusive columns Exclusive Stories Prof. Brainy Al-Bints Diary Notes from Atlanta Philosofaith Within the Nation Reflections Right motoring SME Toolkit Penpoint Because I care Politics of Grammar Advertise With Us About Us Contact Us Terms of service Feedback 1998 - 2019 Media Trust Limited. All rights reserved. SBU. :)

Read more: https://www.dailytrust.com.ng/how-yahoo-yahoo-boys-scam-their-victims-experts.html

Popular posts from this blog

How to Write Exams

How to Write a Business Proposal in 6 Steps [+ Free Template]