Latest information from the group, which claims to be an ethical hacker shows efforts to trace and identify the owners of the work of the defunct HashOcean Bitcoin mining company, which suddenly disappeared from the estimated millions of dollars in digital currency as an investment of the miner, it is on a constant basis.
"We are so close, and we gave all our Intel to Dunn and Cowan," a group calling sebyaKypertech says CoinTelegraph. If this group, which claims to be «Ethical Hacking group dedicated to preserving the security blockchain technology" achieves success, it will help those who have invested their money in the now extinct mining companies make their money back.
What hackers do?
The group says that they need to perform injection and brute force attack to reveal the whereabouts of the remaining data centers, as well as help in discovering the identity of the true owner Hashocean.
"If we had just over 20 hackers, they can run the UA-ID to find nabuiltwith.com with IP - address associated throughout hashocean hashocean and partner sites to find the owner or owners," says the artist.
Group members attributed CoinTelegraph:
"Currently we have 43 hackers who work with us throughout the world, and we found three of the seven alleged HashOcean data centers. Our main priority is now to reveal the processor of payments to them, and we narrowed it down to the territory of Russia. We have just received Intel on Russian transactions we need. we are currently tracking IP-address. Once we have placed the majority of them, HashOcean will cease and desist, and either put their website back online, or just give up. we will destroy them and capture their prey rigs! "
Hackers claim they have offered 100 BTC
"They wanted to stop [us] to find them," the group said CoinTelegraph, arguing that the mining company offered him 100 of BTC ", to stop trying to get to HashOcean." E-mail was sent "HashOcean representative" through deep web using the module itself is destroyed, which removes three seconds. Hackers say they are close and will not stop.
Working with the FBI
The defendant says that they have had some success, working with law enforcement agencies such as the FBI.
He says CoinTelegraph:
"We have already passed in the place of San Francisco in the FBI, Interpol and the rest. We are doing everything in our power, but it is up to people to decide how much to help us."
The group also says that he is working with the company digital assets, which was leading the investigation and coordination with the FBI, taking in all the intelligence and compile all user HashOcean information, such as e-mails and purchases, which will be submitted to the FBI to seize equipment datacenters be eliminated or transferred to users.
As individual miners to help?
The group wants the miners to give them detailed information about their dealings with HashOcean as additional information they receive, the greater the likelihood that they will be able to accurately track the IP-addresses.
They say:
"Until now, everyone has given us everything we need, and in the 1000's of people have emailed us with Intel. Its users give us the information, and the hackers we hire to help us side quests. This global community helping each other with ethical point of view. "
Hackers say they still need more hackers with specializations in brute force and an injection to apply them using their messenger ID # hashocean and others can share your page with Facebook in the,, to get more involved Hashocean users.
Official statement from Kypertech
At the moment, we have traced the two data centers one being near the running X11 San Francisco and the other in Eastern Europe, the FBI was aware of and prepared for the capture operations.
No, they do not cheat you they stole your mining equipment, we can see that their Datacenters running. It was not a Ponzi scheme, because the payment was daily and consistent
At the moment, we have traced the two data centers one being near the running X11 San Francisco and the other in Eastern Europe, the FBI was aware of and prepared for the capture operations.
A little bit about us. We are a group of ethical hackers and yes, we are a victim of hashocean. We supposedly lost $ 85,000, and that's why we pissed. We can not publish information that we receive from external sources, as corrupt practices. We will post the relevant progress reports as follows.
Diamond Skull # hashocean has the same UA-ID in the form of bits Rapid INVEST NOT repeat NOT INVEST!
What will happen next
The group claims that they have a hacker is working on connecting to bitsrapid dacaposolutions.com, which reportedly belongs Hashocean. He says that there is redirect the HTTPS protocol that fools UA-ID, but they are working on it.
Kypertech claims:
"We are in desperate need of 10 Singapore transaction # hashocean THANK YOU! Please email
kypertech@hackermail.comSo far we've found 8 basic purses totaling over 200,000 BTD.Eto correctly, saying that they correspond to each of their data centers, each of them share a different IP-address and scattered almost perfect, where they were told that their data centers are. But each of them have a common "Overlord" IP-address, which each of them is touched in some way.
# Hashocean is actually going to be broken for real. One of our Polish hackers found a backdoor route to hashocean.com it will allow us to get the real information, forwards the wallet, but not access to the lost funds. This is a great ANNOUNCEMENT ".
For more updates, follow the team on Twitter @KyperTech.