![]() |
Jimmy "The Greek" aka Toughmarketing WARNING!!!
Guys,
Jimmy AKA "The Greek" i belive on this board managed to take down my server, get into my email and then somehow managed to get into my epassporte account creating 4 accounts and withdrew a total of $15k. Everything is being investigated now but if anyone has any information on this fucking cunt i would greatly be appreciated!!!!! Down side is this 15k was payments for my affiliates ARRGGHHHHHH!!! CUNTS i tell you! |
i was here
|
Quote:
but let me get this straight... this guy somehow seemed to password guess into your server, then guess your email login, then somehow magically get past the epass verification (step before you enter your password), then guess the password and get in and pull out $15k from epass? now you dont have money to pay affiliates because of your lack of security? lame :2 cents: |
server got ddos'd on old host, no idea how he gained entry... :/
Still doesnt suffice to take 15k. |
That's fucked up, sorry to hear...
|
is Michael O still with epass, can he actually confirm that this has happened, just asking....not trying to stir up shit
|
Michael is on holiday this week.
Yeah.... nasty story, i wish no one this. |
wtf did you do to piss him off so bad?
|
omg, thats is a good chunk of cash
I hope they can reverse the stolen money |
Quote:
|
Holy fuck. Thats gotta hurt
|
Don't believe this scumbag, he owns snugcash.com another Craigslist spamming program. They post ads on craigslist in w4m and when the guy responds they direct him to a fake age verification page like this one http://saferdating.net/?page=preview where the guy is asked to put in his credit card info to prove he is not a sex offender or murderer. It is supposed to be free membership but of course it is filled with crossales from Platinum Bucks, Quickbuck, cashtraffic and a bunch of other sleazy programs. Just put in fake info to get you to the nest page and you will see the list of crosssales.
And no this is not rogue affiliate bullshit Platinum Bucks Quickbuck and the others know all about it they allow it to happen because these guys bring in big volume of sales. There are a hundred of these programs on blackhatworld right now. In fact Graphicnut was affiliated with crushdollars.com another program like this that ended up disappearing and ripping off all their affiliates. Sounds like same old song and dance to me :1orglaugh:1orglaugh:1orglaugh:1orglaugh:1orglaugh |
Quote:
Your story here seems to far fetched that someone would be able to do this all in one day, then steal all your money that you use to pay affiliates. Seems to me that you spent the money yourself and now you cant pay your affiliates so you make a post on here to refer to them to say "see, it happened because I posted it here." Just another shady company stealing money from affiliates IMO |
Quote:
Then, if the server hosted the email account, you would have access to it and no need to guess a password there, either. |
Quote:
|
Quote:
regardless, how would they still get the info that you setup in step 2 if you are using a different computer? Quote:
I still rest that the OP is full of shit :2 cents: |
The dog ate my fucking homework, can you believe that shit? It was all finished and in my school bag.
|
Michael will confirm it as soon as he's back just to proove i am not lying. I dont know how else i can proove to yourselves that this has gone on. What would i gain by posting this crap? Crikey :/
|
Quote:
|
Quote:
It is one thing for someone to hack your server, and another thing completely for someone to hack your server, hack your email and then hack your epassporte account with the identity verification. Unless of course you're telling us that you were actually stupid enough to store all this information on your server and he happened to stumble across it when he hacked the server. Is that what you're trying to tell us? That is just about the only thing that would lend a shred of credibility to your story. :2 cents: |
good excuse for not paying affiliates
|
|
What he said actually turned out to be true but of course you idiots won't apologize LOL
|
Thank you for posting this thread. You make me feel glad that I am not in your position. $15K stolen!!! Wow!!!
|
Some of you guys are ridiculous with your assumptions and accusations. :2 cents:
Graphicnut : Hope everything works out for you. |
Quote:
|
Well just to let you know everything is still being investigated at Epass. As far as affiliates, all have been paid.
ALOT of information has been provided for the case of this guy who still is on this forum and also over at gfgfy. The epass id's used to steal from 4 other accounts aswell our business one is "toughmarketing" "rzongos" there were also affiliate accounts created off of our account also with the names dcotton35 just to make you aware. We traced ip's which were logged on friday to "DIMITRIOS ZONGOS" and have got alot more information regarding this guy. Any more information on this guy if you have ever had any dealins would be greatly appreciated. |
I hope you figure out what is going on and get your money back.
|
Let me add, here is his facebook which he has since deleted but is cached
http://209.85.229.132/search?q=cache...t=clnk &gl=uk Notice the handle "toughmarketing" for his short form facebook ID which leads to the name Dimitrios Zongos also.. coincidence?? In his friends is also a "friend" called Daniel Cotton, coincidence?? Also in his family http://www.facebook.com/family/Zongos/1 there is someone called "Raquel Zongos" coincidence that the username used to withdraw the funds was rzongos?? |
Quote:
|
http://www.cqcounter.com/whois/?query=12.232.20.163
OrgTechHandle: DZO4-ARIN OrgTechName: ZONGOS, DIMITRIOS OrgTechPhone: +1-619-948-8600 OrgTechEmail: [email protected] just another piece of information collected from the logged IP, we also have his whole IP range, now if any mods of the forum are here, i'd love to get any information you have from his username on this board (IP Logs) |
Man that sucks. I hope it all works out for you in the end.
|
Hope you sort this!
|
All times are GMT -7. The time now is 01:32 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123