DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Fraudster’s fake data breach claims should remind media to be careful what we report

Posted on March 5, 2024 by Dissent

Over the past few weeks, DataBreaches had occasionally checked a dark web leak site by an individual or group called “Mogilevich.” However, DataBreaches didn’t report on any of their claimed victims because the site and the claims seemed sketchy and there was no confirmation.

DataBreaches will not name and shame those sites or outlets that did report on the alleged hacks, but many sites and news outlets have responsibly headlined that Mogilevich’s claims were all a hoax. Hoaxes have consequences. Firms who are falsely accused of having been hacked may experience harm to their reputation. They may incur expenses to investigate the (false) claims and have to pay for public relations or legal services. A recent situation with State Farm comes to mind. Threat actors claimed to have hacked them and exfiltrated all customer data. They hadn’t acquired the customer data they had claimed, but that didn’t stop some eager-beaver lawyers and customer(s) from rushing to file suit over the alleged data breach. State Farm had to deal with bad press and litigation over a breach that never happened.

In a farewell post, Mogilevich claimed to have made money from what they describe as professionally executed fraud, but their claims about making money might also be a total hoax:

Hi here it's the Mogilevich group, unfortunately this link led you to an important announcement of our business instead of evidence of a breached database. You may be wondering why all this, and now I'm going to explain everything you need. In reality, we are not a Ransomware as a Service, but professional fraudsters. None of the databases listed in our blog were as true as you might have discovered recently. We took advantage of big names to gain visibility as quickly as possible, but not to fame and receive approval, but to build meticulously our new trafficking of victims to scam. We have sold exactly 8 panel accesses belonging to our private infrastructure, something that in itself has never existed. Initially, the price was a deposit of one thousand dollars, When victims paid, we decided to double the deposit, we manipulated the victims giving him the choice of receiving the money back, or updating the deposit with an additional thousand dollars. From here, about sixteen thousand dollars are taken from the victims. Have you wondered why we were asking for screenshots of potential buyers' crypto wallets? Our goal was to use this evidence of funds to sell alleged accounts Crypto stolen under other identities. From here we were able to take about seven thousand dollars from the victims. We used social engineering pretending to be big buyers to get Initial Access Brokers to send us evidence of their accesses, such as photos and videos. We've used all of this to sell fake accesses and to build our own credibility from Ransomware as a Service. From here, about eleven thousand dollars are taken. The biggest coup was made today.As you know, we have published a well-known drone company as a target. The price for the alleged one-terabyte database was one hundred thousand dollars. We were immediately contacted by interested people, One of them was put at ease, as if he were the boss at the time, we explained to them that the data of that company They were private prototype projects, blueprints, and that unfortunately even a small leak of data in the sample could cause great damage. We made him believe that we had other buyers who were pressing us and that they wanted the projects as soon as possible. So seeing this, the victim did nothing but think that by doing so he would miss an opportunity. After various techniques adopted to make ourselves credible, we came to terms by agreeing on a price of eighty-five thousand dollars. Now the real question is? Why confess all this when we could just run away? This was done to illustrate the process of our scam, We don't think of ourselves as hackers but rather as criminal geniuses, if you can call us that. I think I've taught a lot of people, especially Epic Games, a lesson that by creating ads and tweets has done nothing than advertise us by enlarging our fraudulent network. My tox to confirm its me: E424A6FF3A035D5B733AB6AC253531B36910380D9BA8DDE4115923235457BE574EFA8997FCD5 - Pongo

During Mogilevich’s brief existence, DataBreaches reached out to Mogilevich on Telegram to learn more about the individual or group. At the time, the individual claimed he knew “Kmeta,” but when DataBreaches contacted Kmeta, he said he never heard of Mogilevich. Confronted with that denial, Mogilevich claimed that Kmeta knew him under his previous name. But he didn’t provide it, and that’s where that interaction had ended.

Yesterday, a user named “Pongo” contacted DataBreaches on Telegram to ask DataBreaches to tell an administrator on BreachForums that Pongo was not Kmeta. That seemed to backfire for him because when DataBreaches contacted an administrator to inform them of the unexpected request, the administrator immediately said Pongo’s request proved that Pongo was Kmeta. But while the forum administrator is convinced that Pongo and Kmeta are the same, when asked directly, Kmeta denied being Pongo. But, of course, that’s what you’d expect a liar and a fraudster to say, right?

Kmeta suggested that Pongo was a clown who had never made any money or scammed anybody and was seeking attention. “There is zero proof he scammed anyone,” Kmeta told DataBreaches, adding that all journalists and researchers who reported on Mogilevich/Pongo have just helped him make himself famous.

So is Pongo really Kmeta, or is Kmeta telling the truth, and Pongo is just a Kmeta-wannabe?

DataBreaches isn’t sure, but it is sure that this site will likely not knowingly report on Pongo again unless it’s his arrest.

 


Related:

  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
Category: Breach IncidentsBusiness SectorU.S.Uncategorized

Post navigation

← Developing: AlphV allegedly scammed Change Healthcare and its own affiliate (1)
Update: Robert A. Purbeck, aka “Lifelock, to plead guilty in Atlanta →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • UK sanctions Russian cyber spies accused of facilitating murders
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India’s top exchange
  • Government will ‘robustly defend’ compensation claims from Afghans put at risk by data breach
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Singapore Facing ‘Serious’ Cyberattack by Espionage Group With Alleged China Ties

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.