Dear Bitcoin Talk community,There is a fraudulent cryptocurrency exchange operating under the name of Boomchange or Boom Change, which can be found at "Boomchange.com", "Boomchange.io" and "Boomchange.net". This fraudulent platform, operated by an individual from Armenia (🇦🇲) in Asia, who may be using Ucom as an internet provider, claims to offer cryptocurrency swapping and withdrawal to fiat currencies, with methods such as PayPal. However, this exchange is fraudulent in nature and seeks to scam its users through cryptocurrency theft.
Numerous reports have been filed regarding the fraudulent activities of Boomchange around the internet.
Their fraudulent websites, boomchange.com and boomchange.io, are promoted through various means, including social media platforms like YouTube (
https://www.youtube.com/@boomchange_com &
https://www.youtube.com/@boomchangeespanol), as well as search engine optimization (SEO) tactics. They employ these strategies to attract unsuspecting victims, and lure them into their fraudulent schemes.
The website "Boomchange.com" is a static site built on a .php script. This script generates crypto addresses that belong to the domain holders of "Boomchange.com", who were previously associated with "Boomchange.io". The old domain owned by the fraudsters was suspended by the Namecheap registrar, but they have now brought "Boomchange.com" back online.
The fraudulent scheme operates in such a way that if users send cryptocurrency to "Boomchange.com", their funds will end up in the wallet of the fraudsters, and these funds will be lost forever. The scam is designed to deceive users into thinking that boomchange.com and boomchange.io are legitimate cryptocurrency exchange platforms, but in reality, they are fraudulent websites that should be avoided at all costs.
The Armenian company, Smartweb.am, is believed to have developed a fraudulent website for the Armenian Boomchange Operator. The suspicion arises from the fact that the operator of Boomchange specifically ordered their programming service to create their scam platform, "Boomchange". This assertion can be further verified by visiting the portfolio page on:
https://smartweb.am/#portfolio , providing evidence that Smartweb.am could have been responsible for designing the fraudulent website.
Red Flags of Boomchange: Unlicensed, Unregistered, and Verified as a ScamBoomchange lacks an official license from entities like FinCEN or MSB, proving it to be a fraudulent cryptocurrency exchange.
The absence of a physical office or headquarters, coupled with the lack of a company address, further confirms that Boomchange is a deceptive crypto scam phishing website.
Another concerning aspect is the complete absence of official business registration or any similar documentation, underscoring the illegitimate nature of Boomchange.
A significant cause for alarm is Boomchange's failure to comply with Anti-Money Laundering (AML) regulations, solidifying its reputation as a malicious scam crypto exchange.
In addition to these red flags, Boomchange's website features a fabricated Terms of Use page, incorporating AI-generated texts, while crucial sections such as the refund policy and privacy policies are intentionally missing.
You can view the page here: (
https://web.archive.org/web/20240106020937/https://boomchange.com/terms-of-use).
The most damning evidence against Boomchange lies in its verification as a scam by reputable platforms like MetaMask and Scam-Alert, further reinforcing the prevailing concerns regarding its lack of trustworthiness.
You can view the pages here:
https://metamask.github.io/phishing-warning/v3.0.0/#hostname=boomchange.com&href=https%3A%2F%2Fboomchange.com%2F ,
https://scam-alert.io/scam/bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2ttBelow in this text, you can find additional evidence and indicators of the fraudulent and malicious activities associated with the fake crypto exchange scam phishing website known as "Boomchange".
The SCAM Domains are:boomchange.com
boomchange.io
boomchange.net
This page can be accessed through a direct URL and serves as proof that the scam operation is in place:https://boomchange.com/order/5bdda7e1a9 (Backup from 10/30/2023:
https://web.archive.org/web/20231030133554/https://boomchange.com/order/5bdda7e1a9)
https://boomchange.com/order/c7dda2e520 (Backup from 10/30/2023:
https://web.archive.org/web/20231030133703/https://boomchange.com/order/c7dda2e520)
https://boomchange.io/order/5bdda7e1a9https://boomchange.io/order/c7dda2e520The scammers behind the fraudulent "Boomchange" operation utilize a static end-order page, which persistently presents the same cryptocurrency address to all visitors, irrespective of their affiliation with the fake exchange. Furthermore, the end order pages of the Boomchange scam do not impose any specific information or credential requirements, thereby allowing unauthorized users unhindered access.
In addition, the final order pages of the "Boomchange" fraudulent scheme consistently exhibit identical fraudulent cryptocurrency addresses to all visitors, each of which is controlled by the operator of the scam.
Visitors to the order page do not need to provide any information or login credentials, making it easily accessible to anyone. However, the displayed Ethereum address "0x4c2acc0580765d04d555a791bcb0b3661af67b8d" and Bitcoin addresses "bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72" and "bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2tt" are actually being used to deceive users by pretending to be a legitimate cryptocurrency exchange.
Blockchain scan of "0x4c2acc0580765d04d555a791bcb0b3661af67b8d", "bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72" & "bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2tt"
:https://www.blockchain.com/en/explorer/addresses/btc/bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72 (Over $50.000 stolen as of 10/30/2023)
https://www.blockchain.com/en/explorer/addresses/btc/bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2tt (Over $58.600 stolen as of 10/30/2023)
https://www.blockchain.com/explorer/addresses/eth/0x4c2acc0580765d04d555a791bcb0b3661af67b8d (Over $14.700 stolen as of 10/30/2023)
On these transactions stolen Bitcoin got transferred to Binance:https://www.blockchain.com/explorer/transactions/btc/39b3941da4aff56ccf55d307065034a87bb7c7629d3cf7c03db0129f5bf76a0e (Date 12/30/2023) - (Send from their main BTC address "18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr" to Binance)
https://www.blockchain.com/explorer/transactions/btc/88cd37cc36aa16a3e0963c3a18b0cf0ded0ecd4074ed9813875ddd041df9ea37 (Date: 11/19/2023) - (Send from their main BTC address "18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr" to Binance)
https://www.blockchain.com/explorer/transactions/btc/23647cd8c00823a8357e909dc747fef811c2b6404105e9c5677ca27072604260 (Date: 04/13/2023)
https://www.blockchain.com/explorer/transactions/btc/1793e0ccd25137a5d0d182ea9970f2156d01353f17408a2aff036f65aeb93959 (Date: 04/13/2023)
On these transactions stolen Ethereum got transferred to Binance:https://etherscan.io/tx/0x359d3c4b2aee4b2b191a294c84c471764b0261c2203dc84a35db9fc87ced5720 (Date: 12/27/2023)
https://etherscan.io/tx/0xd7843b410728ca37629c441dab98242086b5c959e8199d12dba5360ad4a8e695 (Date: 12/27/2023)
https://etherscan.io/tx/0x2782028af54d394d4b3d696e61d8c1ede9a492fcac89edc373bc930af8a42a28 (Date: 12/25/2023)
https://etherscan.io/tx/0x60474eca656a3181b65d02bfb81eaddd334671a9c27d1c4d0f47c49b9979eded (Date: 12/23/2023)
https://etherscan.io/tx/0x0642e03eba70ffb421a6158e90cb02168f95e6a137304e939ac9b3465c270512 (Date: 11/09/2023)
https://www.blockchain.com/explorer/transactions/eth/0xf2d55ededda318a19783b3fe27f5862c7421ef9d2c53a5f1f25871a9dc9a3687 (Date: 10/29/2023)
https://www.blockchain.com/explorer/transactions/eth/0x5301ae7030ff97f3f5d8d5f746ef70ff1d69da18ec10bde8105d56e2c359335e (Date 10/24/2023)
https://www.blockchain.com/explorer/transactions/eth/0xac3eda2a292978fb28cf5f5fb95362da38cc6ec894192d261264df722a858b73 (Date 10/18/2023)
https://etherscan.io/tx/0x89be54e7669f3da8b41f1b018761be9b598801d91244068178aad5a4349531e9 (Date: 04/14/2023)
Etherscan of "0x4c2acc0580765d04d555a791bcb0b3661af67b8d"
:https://etherscan.io/address/0x4c2acc0580765d04d555a791bcb0b3661af67b8dOn these transactions the stolen Solana got transferred to Binance:https://solana.fm/tx/3eQpCf5ZqHzXp73JFi8oipH2LKToAQwbrkcW3WBJdhjgsAapZre7Z8qHTaqGumUwCmb5pJvUtvATQb7p6xU7tSA9?cluster=mainnet-solanafmbeta (Date: 10/28/2022)
https://solana.fm/tx/4XwmxztUJVteBRPXxVtU8Pvns8bFrtbWuEZavXwbKAvqyL7vhat56da6sDx1SFb8xC5tW55Z7ehfX1gKeKUfYrvC?cluster=mainnet-solanafmbeta (Date: 09/09/2022)
https://solana.fm/tx/4oM4AXm5mkupj1FPnfbg1hjwrxDxr5TmcXnsuubNJNJZNeAevD8jtKjC63RrenS9CXFNW2rdaFJu6LZ2sUFhfvf9?cluster=mainnet-solanafmbeta (Date 07/19/2022)
https://solana.fm/tx/3Ehg7CiBYw3QdrkSRe4N6KEtUgFJ8TscgWpuujEGpdTiVHtxvnT9DTLHgeq5xnXhM6gf3YNRogyXidaBt4dTkwFm?cluster=mainnet-solanafmbeta (Date: 06/18/2022)
Solana transactions of "72jXsoiK9UZdwdGpA3TYyAGAnVBGggQ9YvEjFS2CW5UE"
:https://solana.fm/address/72jXsoiK9UZdwdGpA3TYyAGAnVBGggQ9YvEjFS2CW5UE?cluster=mainnet-solanafmbetaOn these transactions stolen Litecoin got transferred to Binance:https://blockchair.com/litecoin/transaction/58fac1b1e87b193de67217ac38aa82c986fe2004a7d04222fd1caa75b03ada57 (Date 11/24/2023)
https://blockchair.com/litecoin/transaction/fd31a44fc010bffba99194aaac34fd088447d1014436231095e790cf8dceb65c (Date: 11/09/2023)
https://blockchair.com/litecoin/transaction/60d346dbca52955b8dd3d69991076e8f64b8dacdddb625833ed3e34604f810a1 (Date: 10/30/2023)
https://blockchair.com/litecoin/transaction/d0e507c605a23230b1c6afacd6c6dff87880ffe64dedf2b3790307db4f34742f (Date: 10/28/2023)
https://blockchair.com/litecoin/transaction/e8d2a5029bba9775f46647d0cbfd668fe804e90d99b7d6399d67cb01f78ccd8b (Date: 10/26/2023)
Litecoin transactions of "LKLCaCVM2aZu4CiTCVv9GnbhCt3X7pQtWb"
:https://blockchair.com/litecoin/address/LKLCaCVM2aZu4CiTCVv9GnbhCt3X7pQtWbIt seems like they transfer their stolen Bitcoin to their main wallet address: 18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr (
https://www.blockchain.com/explorer/addresses/btc/18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr)
From there, they launder/withdraw the stolen Bitcoin on Binance which can be seen here:https://www.blockchain.com/explorer/transactions/btc/ec650ca4af3bea979ded41826cb21050023e576d8b5de633a99b06211710eaf2 (Date: 10/29/2023)
https://www.blockchain.com/explorer/transactions/btc/8d957595451c9f71609739c93dc2f863610bd7b0880a941eed408d60dcb11f1c (Date: 10/29/2023)
https://www.blockchain.com/explorer/transactions/btc/772debb4680e452a5202ab3d83f26998efd24e896c8060265b571ff910a98f30 (Date: 10/24/2023)
https://www.blockchain.com/explorer/transactions/btc/3505be6daa3b71cb76c0bb01ca8b38cec6b5ae80aa6e699b7f6b2e17d63d8253 (Date: 10/23/2023)
https://www.blockchain.com/explorer/transactions/btc/c006ef5184f49afc519824cd1ab8fe1bb8ccbbbfb69ac9de3a6672eaeecb0ff3 (Date: 10/21/2023)
And the list goes on as it can be tracked on the Blockchain page of Boomchange operators bitcoin address "18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr" (
https://www.blockchain.com/explorer/addresses/btc/18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr).
Blockchain scan of "18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr "
:https://www.blockchain.com/explorer/addresses/btc/18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr (Over $196.000 stolen as of 10/30/2023)
After adding this, they began to use a new bitcoin wallet address (bc1qr0avgajde8y37qadrtjd4vt6sdvl9dgq7j6ckj) to which they transferred the stolen bitcoin from the victims of Boomchange. Their new wallet address can be found here:
https://www.blockchain.com/explorer/addresses/btc/bc1qr0avgajde8y37qadrtjd4vt6sdvl9dgq7j6ckj (Over $70,00 stolen as of 11/2/2023)
The new Bitcoin address of "Boomchange.com"
is: 1Dgc3h8caaJKEBRyrLgovwQWudxmDXmKiK (
https://www.blockchain.com/en/explorer/addresses/btc/1Dgc3h8caaJKEBRyrLgovwQWudxmDXmKiK) (Already over $590,00 in Bitcoin stolen as of 11/21/2023)
The Bitcoin address of "Boomchange.com"
as of 1/03/2024 is: 18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr
As of 1/3/2024, the operator of the malicious scam platform "Boomchange.com" continues to utilize their deposit bitcoin address "18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr" to deceive unsuspecting victims into sending their hard-earned bitcoin, resulting in irreversible loss of funds.
The current Bitcoin address of "Boomchange.com"
as of 2/09/2024 is: bc1qv4rnhlx4fr9zn2cdklawjx429wr9nqhf7yf9uv
As of 2/9/2024, the operator of the malicious scam platform "Boomchange.com" utilize his deposit bitcoin address "bc1qv4rnhlx4fr9zn2cdklawjx429wr9nqhf7yf9uv" to deceive unsuspecting victims into sending their hard-earned bitcoin, resulting in irreversible loss of funds.
The current Ethereum address of "Boomchange.com"
as of 2/09/2024 is: 0x4d070f2380F60764E0f48725be03850afA3C0Ee2
As of 2/9/2024, the operator of the malicious scam platform "Boomchange.com" utilize his deposit ethereum address "0x4d070f2380F60764E0f48725be03850afA3C0Ee2" to deceive unsuspecting victims into sending their hard-earned ethereum, resulting in irreversible loss of funds.
Below are the cryptocurrency addresses associated with the "Boomchange"
fraud:1. Binance USD (BSC): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
2. BNB Beacon Chain (BEP2): bnb1ajdl4npzsuwtfvwy9a5lq6wd2ufm60cag69nde
3. BNB Smart Chain (BEP20): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
4. Bitcoin (BTC): bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2tt
5. Bitcoin (BTC): bc1qmxkj49ujzednhnzkr3wqpkeh4kfslr9zqume72
6. Bitcoin (BTC): 18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr
7. Bitcoin (BTC): 1Dgc3h8caaJKEBRyrLgovwQWudxmDXmKiK
9. Bitcoin (BTC): bc1qv4rnhlx4fr9zn2cdklawjx429wr9nqhf7yf9uv
10. Cardano (ADA): DdzFFzCqrht8aXTncbxFkD9pkv73TNHfN2cYe59xUye6zh93cCMU6aYcheNpmwNrunJdxJ5vPLYGxmm
37i89ESnR9Bh3PZHUPmUTYhy6
11. Ethereum (ETH): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
12. Ethereum (ETH): 0x4d070f2380F60764E0f48725be03850afA3C0Ee2
13. Litecoin (LTC): LKLCaCVM2aZu4CiTCVv9GnbhCt3X7pQtWb
14. MANA Decentraland (ETH): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
15. Monero (XMR): 846qqAML6S5aLVAxbfb7bzZQEjznGoJDNEm3coutRZEuK6rXZxTaRPhZqcYHHYVqfEcZK1rksvr8xXe
UY2pymuXmHAHu3uD
16. Perfect Money (USD): U37414135
17. Polkadot (DOT): 16kATcRPnQRDJXNZmUq21gk83edHnkaoPzmrwtmkp4qbsUo4
18. Ripple (XRP): rEb8TK3gBgk5auZkwc6sHnwrGVJH8DuaLh
19. Shiba Inu (ETH): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
20. Solana (SOL): 72jXsoiK9UZdwdGpA3TYyAGAnVBGggQ9YvEjFS2CW5UE
21. STEPN GMT (SOL): 72jXsoiK9UZdwdGpA3TYyAGAnVBGggQ9YvEjFS2CW5UE
22. Tether (ERC20): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
23. Tether (TRC20): TK72J7YwNqkeqEsbbhcSZTG6QXWTQgX7dA
24. Tron (TRX): TK72J7YwNqkeqEsbbhcSZTG6QXWTQgX7dA
25. Trust Wallet TWT (BEP20): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
26. USD Coin (SOL): 72jXsoiK9UZdwdGpA3TYyAGAnVBGggQ9YvEjFS2CW5UE
27. Polygon (MATIC): 0x4c2acc0580765d04d555a791bcb0b3661af67b8d
The above cryptocurrency addresses, associated with the "Boomchange" fraud, were discovered on their domains, "Boomchange.com" and "Boomchange.io".
The "Boomchange" fraudsters change the static crypto addresses on their end order pages whenever they detect reports or complaints about their phishing website. They use this tactic in an effort to trick victims and evade detection, thus allowing them to continue their scamming activities. In addition, there have been reports from victims across the globe who have fallen victim to the scam. These reports can be found on various online platforms which are linked below.
The operator suspected to be in charge of Boomchange (Boomchange.com & Boomchange.io) resides in Yerevan, Armenia (Asia).
Suspended History of the Domain "Boomchange.com":
The history of the "Boomchange.com" domain is marked by suspensions and changes of ownership. Initially registered with NameCheap, the domain was suspended by the registrar. After expiring, it became available again and was repurchased by the Armenian operator of "Boomchange" through another domain registrar called NICENIC. It is noteworthy that NICENIC is considered the most abused domain registrar according to Spamhaus.org (
https://www.spamhaus.org/statistics/registrars/).
"Boomchange.com" was also suspended on NICENIC. Unfortunately, the domain is currently back online as the operators have employed psychological operations and social engineering techniques to persuade the NICENIC abuse support teams to unblock their abused domain. As of 1/19/2024, the domain is still accessible.
As of February 16, 2024, the operator of "Boomchange.com" changed the domain registrar from "Nicenic" to "Internet Domain Service BS Corp" to continue his fraud and abuse of their domain services (
https://web.archive.org/web/20240306101848/https://www.whois.com/whois/boomchange.com).
Here is the evidence to support these claims:
https://web.archive.org/web/20230510133318/https://www.whois.com/whois/boomchange.comhttps://web.archive.org/web/20240119200752/https://www.whois.com/whois/boomchange.comTheir previous domain, "Boomchange.com", was already suspended for fraudulent activities and an archived version of the site from 2022 at
https://web.archive.org/web/20220701070044/https://boomchange.com/ before suspension.
Currently, the domain has expired on the old registrar, Namecheap where it was blocked, and the fraudsters have switched to the NICENIC chinese registrar and later to Internet Domain Service BS Corp registrar.
Despite the domain's checkered past, it is back online, and people continue to fall victim to its scams.
As of April 10, 2023, the operator of "Boomchange.com" is now using a new domain, "Boomchange.net" again on NICENIC chinese registrar, as the previous one was flagged as a phishing website by MetaMask and some other crypto cybersecurity companies.
These are the email addresses of the "
Boomchange"
operator:[email protected][email protected][email protected][email protected][email protected]A newer email address that has been identified is:
[email protected]These might are the fraudsters IP addresses:37.252.89.7 - Armenia, Yerevan - Internet Provider: Ucom.am (This might be his computer IP)
46.130.8.54 - Armenia, Yerevan - Internet Provider: Telecom AM (This might be his mobile phone IP)
Another IP address of the Armenian living in Yerevan cyber criminal: 37.252.93.99 - his iPhone IP address (Mozilla/5.0 (iPhone; CPU iPhone OS 16_0_2 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.0 Mobile/15E148 Safari/604.1)
Update as of 11/2/2023:46.162.253.8 - Armenia, City: Yerevan, State/Region: Erevan - Internet Provider: Ucom.am (New IP of "Boomchange" operator as of 11/2/2023)
Possible VPN
or Proxy IP Addresses
of the Armenian Operator
of "Boomchange":
41.160.35.133 - South Africa, Gauteng/Johannesburg/Western Cape - Internet Provider: Liquid Telecommunications Operations Limited (New IP of "Boomchange" operator, might be a Proxy or VPN as of 11/2/2023)
217.182.175.162 - France, Hauts-de-France - Internet Provider: OVH SAS (New IP of "Boomchange" operator, might be a Proxy or VPN as of 11/2/2023)
The Hosting provider of the scam website "Boomchange.com"
is: Amarutu Technology - Koddos.net
Boomchange can be reported to
[email protected] or through a ticket on their site under "Abuse":
https://koddos.net/clients/submitticket.phpThe Domain provider of the scam website "Boomchange.com"
is: NICENIC INTERNATIONAL GROUP CO., LIMITED - Nicenic.net
Boomchange can be reported to
[email protected] through email.
"Boomchange" has been scamming people for years, utilizing search engine optimization (SEO) and purchasing positive online reviews on platforms like Trustpilot and Sitejabber to promote their fraudulent services.
The "Boomchange" Operator systematically deletes negative reviews by flagging them as not genuine, abusing the report system of these platforms, and making it difficult for scammed victims to provide the necessary evidence to keep their reviews visible, resulting in only verified negative reviews remaining on Trustpilot and Sitejabber.
These are the social media accounts of the criminal operator of "Boomchange"
, which he uses to promote this fraud:https://www.youtube.com/@boomchange_comhttps://www.youtube.com/@boomchangeespanolhttps://www.youtube.com/@boomchange_iohttps://www.facebook.com/people/Boom-Change/100084132785601/https://www.tiktok.com/@boomchangehttps://www.reddit.com/user/boomchangehttps://www.twitter.com/BoomChange1https://www.instagram.com/boomchange_comWhen the domain "Boomchange.com" was blocked by the former domain registrar Namecheap, the scammers switched to using "Boomchange.io" for their fraudulent activities. During that time, they also changed their YouTube handle to "@boomchange_io" to match their new domain name.
Now, after buying back the "Boomchange.com" domain name following its expiration on another domain registrar, the scammers have resumed using the domain name for their deceptive activities. As a result, they have reverted back to their old YouTube handle, "@boomchange_com".
The operator of "Boomchange" uses the Telegram and WhatsApp number (+18502800803) to engage in social engineering and manipulate victims into sending cryptocurrency to the fraudulent platform.
GitHub accounts of the operator of "Boomchange"
:https://github.com/Boomchangehttps://github.com/adminchangerhttps://github.com/Uscompanylawhttps://github.com/Jerayerhttps://github.com/Rodriguez3234https://github.com/CarsWell87https://github.com/Kurtel-liot0808 (banned)
https://github.com/User-Jack22 (banned)
https://github.com/Gagi77788 (banned)
The operator of the "Boomchange" scam has created multiple spam accounts on GitHub, including "adminchanger" and "Uscompanylaw". These accounts use words in their username such as "lawyer" and "admin" to suggest authenticity, but they are fake and part of a malicious manipulation tactic.
As of 1/3/2024, the operator of the malicious scam platform "Boomchange" was recently active on GitHub under the account username "@Jerayer" (
https://github.com/Jerayer).
Possibly "Boomchange"
operator accounts on BitcoinTalk:https://bitcointalksearch.org/user/craigorders-3559734 (Username: Craigorders)
https://bitcointalksearch.org/user/jerayer-3551462 (Username: Jerayer)
https://bitcointalksearch.org/user/james77887799-3561707 (Username: James77887799)
https://bitcointalksearch.org/user/tobi4255-828900 (Username: tobi4255)
It seems that the account with the username "tobi4255" on
https://bitcointalksearch.org/user/tobi4255-828900 may have been purchased on the black market, given its suspicious activity promoting the fraudulent website "Boomchange" found here:
https://bitcointalksearch.org/topic/withdraw-crypto-to-paypal-with-boomchange-100-safe-and-legit-crypto-exchange-5457875 It is worth noting that during the same time period, many questionable accounts - some of which with a Trust rating of -1 - posted almost identical positive comments about the website, which appears suspicious.
The Connection Between "Boomchange.com" and "IPTVleopard.com": Uncovering the Association with Other Illegal Activities:I researched and discovered that the website "iptvleopard.com" may be associated with the "Boomchange.com" Operator, who also owns the website. The website "iptvleopard.com" is being promoted on the same Medium account as "Boomchange.com" through fake articles.
You can view these articles at the following archived links:
1.
https://web.archive.org/web/20240120180921/https://medium.com/@WBD-Vlad 2.
https://web.archive.org/web/20240120181225/https://medium.com/@WBD-Vlad/best-canada-iptv-service-provider-for-tv-channels-iptvleopard-2b4e4a896e74 3.
https://web.archive.org/web/20240120181609/https://medium.com/@WBD-Vlad/the-best-reliable-crypto-exchange-boomchange-a9220839b228In one of their YouTube videos, where they advertise the "Boomchange" scam platform, I discovered that the operator also researched becoming an "IPTV Reseller".
You can see this in the following video:
https://www.youtube.com/watch?v=h4KrPTeNCCA&ab_channel=BoomChange (archived:
https://web.archive.org/web/20240120181903/https://www.youtube.com/watch?v=h4KrPTeNCCA).
At 0:08 minute mark, it is evident that they searched on Google to become an IPTV reseller, making it the second clear connection I found.
Additionally, they promote the "IPTV" stuff on a YouTube channel.
The videos on this channel are similar to the ones on the "Boomchange" YouTube channel, both in terms of creation and voiceovers.
This further suggests that the Armenian operator of "Boomchange" also operates the "IPTVleopard.com" website.
You can find their YouTube channel here:
https://www.youtube.com/@ShortMovies2024 (Channel-ID: UC6IM2FP9we9E5A3IGGl1fgQ)
For their other platform, "iptvleopard.com", they use the WhatsApp number "+37433890790" and attempt to promote this website on Reddit, just like they do with "Boomchange".
You can see the attempted promotion here:
https://www.reddit.com/r/Internet/comments/17vsev8/best_iptv_service_providers_in_2023_trusted/However, the post has already been removed by Reddit fortunately.
It seems that "iptvleopard.com" belongs to the Armenian operator of the "boomchange.com" crypto scam phishing website. The utilization of illegal IPTV services directly violates copyright laws that are in place to protect the intellectual property of content creators and providers.
More information about the "Boomchange"
scam can be found on Chainabuse and other Bitcoin abuse sites, such as:-
https://www.chainabuse.com/domain/boomchange.comhttps://www.chainabuse.com/domain/boomchange.iohttps://www.chainabuse.com/report/2281bb1d-cc6a-4023-a57a-a09504d258a8?context=search-domain&d=https://www.chainabuse.com/report/2d277c00-5a1d-4544-941c-66a784c47d39?context=search-address&a=bc1qr0avgajde8y37qadrtjd4vt6sdvl9dgq7j6ckj&chain=https://www.chainabuse.com/report/dc9abf1d-264f-4420-ba2a-b475809e0411?context=search-address&a=1Dgc3h8caaJKEBRyrLgovwQWudxmDXmKiK&chain=-
https://scam-alert.io/scam/bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2tt - Confirmed Scam (boomchange.com) by Scam-Alert
https://scam-alert.io/scam/bc1q6a5gket0qhzks42k6v94uwshrse5t0njtpy3grhttps://scam-alert.io/scam/18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkrhttps://scam-alert.io/scam/bc1qr0avgajde8y37qadrtjd4vt6sdvl9dgq7j6ckjhttps://scam-alert.io/scam/1Dgc3h8caaJKEBRyrLgovwQWudxmDXmKiK-
https://cryptscam.com/en/detail/bc1qgwx3z59thekwcmp92arrvf4s2yg4ystsr9k2tthttps://cryptscam.com/en/detail/bc1q6a5gket0qhzks42k6v94uwshrse5t0njtpy3grhttps://cryptscam.com/en/detail/18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkrhttps://cryptscam.com/en/detail/bc1qr0avgajde8y37qadrtjd4vt6sdvl9dgq7j6ckjhttps://cryptscam.com/en/detail/1Dgc3h8caaJKEBRyrLgovwQWudxmDXmKiK-
https://www.bitcoinabuse.com/reports/18vpuWeMMFEZhm5tgxjuTs7aHtwotchPkr-
Be cautious of the scam known as "Boomchange" which operates under the domains "Boomchange.com" and "Boomchange.io", and thank you for your attention.
Kind regards.