IP Addresses
Tracking them down with IPs and social engineering.
Last updated
Tracking them down with IPs and social engineering.
Last updated
#1 Hyperoptic Residential IP
I tracked one residential IP address, most likely registered to one of the fraudster's mobile contract. This is the first IP I extracted by creating the fake article.
Fortunately, after contacting Hyperoptic, they confirmed that they retain customer data for seven years, including who was logged in on a specific IP on a specific Timestamp. I also contacted the National Crime Agency UK, which handles Cybercrime, and asked how long it would take to get a warrant for a scammerโs identity linked to an IP from the ISP. Their reply was that it would take two to five days. In this case, the authorities can get a warrant against the perpetratorโs IP to discover the userโs real identity that was connected to the IP at the timestamp mentioned above.
#2 WeWork Business IP
I tracked the fraudsters to an office in London operated by Wework UK Limited. WeWork would be the obvious choice to work on a scam operation, with a $299 all-access monthly membership plan and no contracts. WeWork Operates 49 Co-working offices across London. However, the fraudsters seem to always go to the same one since I got multiple hits on different dates from this IP.
The above business static IP can only be assigned to one office.
To narrow down the search myself, I used several IP-to-Location services and plotted all WeWork London offices manually based on their physical address on Google Maps. I then plotted the WeWork IP I acquired. Due to the difference in accuracy between each service I used, I got four different locations for the IP. The Red markers are in four different locations, along with all WeWork offices in Blue. One stood out as itโs right on one of WeWorkโs offices (far right). The office in question is WeWork, 30 Churchill Place, London E14 5RE, UK (Canary Wharf).
I needed to confirm the above location. Therefore, I created a project on UpWork titled "Calling all London freelancers at Canary Wharf" and requested custom website development. I got several bids, two of which were working from, you guessed it, WeWork Canary Wharf. I politely asked them for the office IP, and they gladly shared it with me. It was a 100% match. We now know for certain that some of the fraudsters are working from the following office:
WeWork 30 Churchill Place London, England E14 5EU.
The good thing about WeWork is that to get both WeWork On Demand and WeWork all access, you need to provide identification such as a national ID or passport. Additionally, when arriving, you can only access the building by swiping the WeWork card, which tells WeWork which customers are in the building at any given time.
#3 Virgin Media Limited IP
The above IP was traced from devops@orbeonprotocol.com, meaning that the person behind it is directly involved in the scam. The above IP is a residential/mobile IP from Virgin Media Limited. The authorities can easily get a warrant against the IP to identify the fraudsters.
With a warrant, the authorities can ask Virgin for the residential or mobile contract that was using that IP at the specific timestamps from the multiple hits I gathered. A contract is always tied to a legal person or a business.
#4 British Telecommunications PLC
This IP was traced from marketing@orbeonprotocol, again directly involved in the project.
This is another residential IP that can be traced to a real identity with the proper warrants.
#4 Squid Proxy
This proxy was set up so that the fraudsters could relay their internet connection through it and conceal their real IPs. The proxy doesnโt allow basic authentication, meaning that when setting it up, they whitelisted IPs that would be allowed to access the proxy. Those IPs can potentially be the home and workplace IPs of the perpetrators in London and beyond.
As a matter of fact, we know that there are over 18 admins in the Telegram group, some of which greet the members with Good Morning when it's evening in the UK. That means that some fraudsters are overseas in faraway countries, but never far from justice.
With the squid proxy data, it would be easy to get to all of them. The authorities can request a warrant to get a snapshot of the Digital Ocean droplet, which can then be booted on a new server so that authorities can access and retrieve all the whitelisted IPs leading to the fraudstersโ homes and offices in the UK and beyond.
Since the proxy was set up long ago, we can assume that access logs would show the fraudsters continuously accessing the other projects mentioned before and even others we donโt know about, with their real IPs. This proxy is critical to the investigation and can link many of the scammers to the entire operation, including past and current scams.
5# Other IPs
Some other IPs I managed to track down with social engineering.