October 16

đź“š Terminology

Hey everyone! Today, the team has prepared a discussion on key terms in our work that everyone should know. These concepts will help you navigate the field better and broaden your understanding. Ready to dive into some interesting topics? Let’s get started!

Mammoth/Whale - victim

Affiliates are a bunch of different teams within our crew, where workers can earn cash. These affiliates have tons of projects designed for easy work, giving you great opportunities in our field. Each landing page in our team is unique and has been checked out before going live, so you can confidently jump into any of them.
The goal of an affiliate is to get visitors to take some action that’ll boost your profits.

Multitasking - being part of multiple affiliates at the same time.

Social Engineering - a way to connect with people and encourage them to take action through conversation.

Profit - a term that means earnings or income.

TC - short for "Theme Creator."

Drainer - someone who siphons off all possible types of tokens from a victim directly through a website by signing a web3 contract. This includes tokens like ETH, USDC, USDT, WETH, 1INCH, APE COIN, DAI, and all NFTs (like BAYC, CRYPTO PUNK, MAYC, DOODLES, AZUKI, etc.).

Parsing - searching for "mammoths."

Terminology of Log Tracking - In this section, we'll cover the basic concepts of log tracking, so you won't have any questions about this channel in our team.

Log - info about the successful arrival of "mammoths" to our server.

Log Tracking - a Telegram group where logs from all affiliates are posted. In this channel, you can check the final status of your log.

Checked - the TC successfully withdrew funds from your "mammoth."

Empty - there could be various reasons for this, but the main one is that the "mammoth" has no wallets with a balance.

Brute - the TC has sent your log to a password cracker for processing.

Terminology of Stealers and Their Concepts

  1. Stealer - a type of malware designed to steal sensitive information from users. It can capture data like passwords, logins, credit card numbers, and other personal info. Stealers often operate in the background, gathering information without the user's knowledge.In our team, we have two different types of system stealers:1.1 Crypt - the encryption of information in files that protects the virus from being detected by various antivirus software.1.2 FUD Crypt - refers to an ideal crypt (for a stealer) that no antivirus can recognize.1.3 Detect - the process of identifying stealer-type software.1.4 SmartScreen - a nasty hurdle that 99% of cryptors can't bypass. SmartScreen checks files for digital signatures (SSL certificates). Such signatures typically cost thousands of dollars and are hard to find in the clear net since they are under strict protection and not shared with third parties. If your landing page bypasses SmartScreen, congrats—you’ve found one of the few skilled creators.1.5 Build - the creation of a new version of the virus by updating and modifying its source code.1.6 Launcher - a program or app that tricks the "mammoth" into thinking the application is legitimate, used to run the stealer. Typically, a launcher has a user interface that provides access to various features and settings related to launching apps or games. Additionally, landings may install certificates on the launcher to bypass SmartScreen.
    • Windows Stealer - This type is more common and versatile for various adaptations. It was the first on the market and remains the most popular today.
    • MacOS Stealer - This one is relatively new in our field, aimed at Apple PC systems, specifically MacBooks and iMacs.

Security Terminology

  • XMR (Monero) - a privacy-focused cryptocurrency with untraceable transactions. There are rumors that IP addresses of systems holding wallets can be tracked, so we recommend keeping your wallet on a virtual machine.
  • Laundering - manipulating money to make it hard to trace the original source of funds.
  • Virtual Box - software for creating virtual systems.
  • Kali Linux - a specialized operating system for setting up anonymity and full privacy online, based on Linux.
  • Utility - a helper program designed for specific tasks.
  • Proxychains - a utility for Kali Linux that allows you to route connections through a chain of multiple proxy servers for each system program.
  • Remmina - a utility for Kali Linux that connects to VPS (Virtual Private Servers), similar to Remote Desktop Connection for Windows.
  • Antik - a browser program designed for multi-accounting.
  • Emulator - a virtual system created using your computer's capabilities.
  • Proxifier - a router program for setting up connections through proxies.
  • Tor - onion routing for traffic anonymization.
  • Dedicated Server (Dedik) - a dedicated server used for processing information, storing materials, and various databases. In simple terms, it’s a computer located in another country that enhances your security.
  • Exchange - a place where you can swap money for cryptocurrency.
  • Whonix Gateway - a component of the Whonix operating system designed for online anonymity. It uses the Tor network to route all internet traffic, helping to hide the user’s location and ensure privacy.
  • Proxy - a server or program that acts as an intermediary between the user and internet resources. When you use a proxy, your requests to websites go through this server, which processes them and sends back the response. Here are the main functions and benefits of using a proxy: