• Dapps:16.23K
  • Blockchains:78
  • Active users:66.47M
  • 30d volume:$303.26B
  • 30d transactions:$879.24M

Scammer Identified as Ape 31 Stole $650,000 from Twitter Users

user avatar

by Giorgi Kostiuk

a year ago


A UK-based scammer, operating under the Twitter handles @ape_31 and @60711, has stolen more than $650,000 from over 250 unsuspecting users on Twitter (X) in the past year.

Ape 31's Financial Frauds

Investigations from blockchain detective ZachXBT show that the fraudster baited victims by posting fake profit and loss (PNL) screenshots from a Bybit demo account and used a fake news account to funnel victims into paying for bogus services. Once the scammer received payment, they immediately blocked their victims, cutting off all contact.

Victims and Casualties

Ape 31 targeted users by replying to large accounts and regularly posted PNL screenshots to fake engagement. The scam involved offering paid copy trading services, where users were tricked into paying fees between $250 and $500. After receiving payment, the scammer would ask for additional funds under the guise of managing them, claiming that the process was risk-free. Victims were blocked on both Telegram and Twitter once they had sent their money. One victim reported sending $500 to Ape 31 for a copy trade service, after which Ape 31 demanded $20,000, promising to trade with 'zero liquidation price' on their behalf. Another victim who sent $3,000 was led to believe their investment would grow from $10,000 to $100,000 in a matter of days. This victim was also ghosted after transferring the funds. In a third case, a victim reported losing $500 and provided information that Ape 31 logged into a TradingView account with a UK Telecom IP address (81.78.179.107). The scammer has used over 16 different wallets, which have received over $650,000 in just one year.

Fake Identities and Attempts

Ape 31 also attempted to con another person with a fake over-the-counter (OTC) deal and recorded the video call with the victim. The investigation shows a long list of centralized exchanges the scammer used, including KuCoin, Kraken, Bitget, OKX, MEXC, and Poloniex. Zach also found out that Ape 31 is actually based in the UK, not Singapore as he claims. Their IP address, 81.78.179.107, is registered in Ealing under Vodafone Limited. The scammer has changed name and location multiple times to mislead their victims and cover their tracks.

Recent investigations have shown that Ape 31 uses a variety of tricks and platforms to deceive victims, causing substantial losses totaling over $650,000. Social media users need to be extremely cautious and verify information to avoid falling prey to such scams.

0

Rewards

chest
chest
chest
chest

More rewards

Discover enhanced rewards on our social media.

chest

Other news

Bitcoin Market Faces Bearish Phase Amid Price Drop

chest

Speculations arise that the cryptocurrency market has entered a bearish phase following a significant drop in Bitcoin's price.

user avatarMaria Gutierrez

Mixin Network Announces Compensation Plan for Hack Victims

chest

Mixin Network has initiated a debt registration and repayment process for users affected by the September 2023 hack, offering compensation in stablecoins and tokenized claims.

user avatarDavid Robinson

Mixin Hacker Wallet Transfers $385 Million to Tornado Cash

chest

A wallet linked to the 2023 Mixin hack has transferred $385 million to a new wallet, which then sent the funds to Tornado Cash.

user avatarAndrew Smith

Goldman Sachs Invests Heavily in Solana Spot ETFs

chest

Goldman Sachs has made substantial investments in Solana Spot ETFs, totaling approximately $108 million, indicating a growing interest in altcoins and a shift towards broader crypto adoption by traditional financial institutions.

user avatarJacob Williams

Connecticut Man Accused of Defrauding Crypto Investors

chest

Elmin Redzepagic, a 24-year-old from Connecticut, is accused of defrauding crypto investors out of nearly a million dollars, which he allegedly gambled online. He faces multiple charges including wire fraud and money laundering.

user avatarZainab Kamara

Hackers Exploit Workforce Monitoring Tool for Ransomware Attacks

chest

Hackers exploit workforce monitoring tool Net Monitor for Employees Professional to deploy ransomware.

user avatarSon Min-ho

Important disclaimer: The information presented on the Dapp.Expert portal is intended solely for informational purposes and does not constitute an investment recommendation or a guide to action in the field of cryptocurrencies. The Dapp.Expert team is not responsible for any potential losses or missed profits associated with the use of materials published on the site. Before making investment decisions in cryptocurrencies, we recommend consulting a qualified financial advisor.