Showing Scammers Their Own CCTV Cameras On My Computer!

mrwn
26 May 202418:25

Summary

TLDRThis video exposes a scam call center in Mohali, Punjab, that impersonates printer companies like HP, Epson, and Canon. The host shows live CCTV footage of the scam center, reveals their tactics, and identifies key individuals involved. The scammers trick victims into buying expensive, useless firewall plans by creating fake printer issues. The video also demonstrates how the host infiltrated their systems, confronted the scammers, and provided evidence to the FBI. The video concludes with details on the scammers' lavish lifestyles funded by their fraudulent activities.

Takeaways

  • 🚨 The video script details an investigation into a scam call center operation.
  • 📍 The scam call center is located in Sector 74, Industrial Area, Moali, Punjab, on the fourth floor of the Stark Edge Tower.
  • 💻 The operation impersonates support for HP, Epson, and Canon, using CCTV to intimidate victims.
  • 💔 The scam involves selling expensive and useless firewall plans to victims under the guise of printer support.
  • 📞 The scammer uses a website to display issues with printers, regardless of the model input, to lead victims to call a number and get scammed.
  • 📈 The scammer has access to the computers of the call center, which they use to scam victims and manage operations.
  • 🔍 The investigation reveals the scammer's use of remote access to compromise the victim's computer and gain control.
  • 📊 The scammer has access to detailed sales data, attendance records, and personal information of victims.
  • 🏆 The scammer, identified as 'Vshell', is highlighted for scamming over 200 people in one year.
  • 📱 The scammer uses Skype and other communication tools to interact with victims, often during calls.
  • 🔗 The scammer has a network of devices in the United States, including laptops and servers, for managing operations and communication.

Q & A

  • What is the main objective of the video?

    -The main objective of the video is to expose a scam call center located in Mohali, Punjab, that impersonates support services for HP, Epson, and Canon.

  • How did the video creator initially discover the scam website?

    -The video creator discovered the scam website while googling for scam websites related to printer drivers.

  • What method did the creator use to gain access to the scammers' CCTV feed?

    -The creator allowed the scammers to connect to his computer, which was set up in a way that allowed him to connect back to their machines, leading to the discovery of their CCTV feed.

  • What tactics do the scammers use to convince victims to call them?

    -The scammers publish ads on Google and Microsoft Bing, then display false error messages related to printer drivers that prompt users to call their number or chat with a live agent.

  • What kind of 'services' do the scammers try to sell to their victims?

    -The scammers try to sell victims an expensive and useless 'firewall plan' by claiming there are security-related errors on their devices.

  • Who is identified as the mastermind behind the scam operation?

    -The mastermind behind the scam operation is identified as AE, the founder of Asoft Tech Solutions.

  • What measures did AE take after being confronted by the video creator?

    -AE made his Instagram account private, removed mentions of being the founder of Asoft Tech Solutions from his bio, and took down his LinkedIn page.

  • How does the video creator validate the scam call center's location?

    -The creator validates the scam call center's location by identifying it through CCTV feeds and mapping out the office layout and camera placements.

  • What evidence does the creator provide to prove the scam operation's revenue?

    -The creator provides evidence from the scammers' sales sheets, showing they made nearly $1,946,549.25 in a year.

  • What response did the scammers have when confronted with their own CCTV footage?

    -The scammers were visibly shocked and attempted to disable their internet and CCTV feeds to stop the creator from accessing their network and cameras.

Outlines

00:00

📹 Exposing a Scam Call Center with Live CCTV

The narrator provides a live CCTV feed of a scam call center located in Mohali, Punjab. They explain how the center impersonates HP, Epson, and Canon support, and detail their own process of discovering and infiltrating the scammers' network. They highlight the deceptive tactics used by the scammers, such as fake driver installation issues, and describe their ability to monitor the scammers via their own CCTV cameras. The segment ends with the narrator calling out the scammers by name and exposing their fraudulent operation.

05:01

📞 Scammer Frustrations and Inside Activities

This paragraph describes how scammers at the call center sometimes lose their temper when confronted by suspicious victims. It also gives a glimpse into the scammers' downtime activities, such as playing video games and socializing. The narrator mentions their access to certain agents' computers and the hierarchical structure within the scam operation. They reveal that key operations are managed remotely from the United States and discuss the involvement of a mastermind named AE, whose lavish lifestyle is funded by the scam proceeds.

10:04

💸 Unveiling the Scam's Financial Impact and Structure

The narrator delves into the financial details of the scam operation, revealing that it has generated nearly $2 million in fraudulent income. They discuss the organizational structure of the scam center and identify top scammers within the group. The narrator also highlights the difficulty of getting the mastermind arrested due to his connections with influential figures. The paragraph concludes with a dramatic confrontation where the narrator shows the scammers their own live CCTV feed, causing panic and attempts to disconnect the internet.

15:05

📱 Direct Confrontation and Aftermath

In this final paragraph, the narrator continues to confront the scammers directly through Skype and phone calls. Despite multiple attempts to speak with the mastermind AE, the scammers repeatedly hang up. The narrator spams their group chats and notices changes in the scammers' online presence, such as making social media accounts private. The paragraph ends with the narrator expressing hope that the scammers have stopped their activities, and they sign off by encouraging viewers to like and subscribe to their channel.

Mindmap

Keywords

💡Scam Call Center

A scam call center is a fraudulent operation where individuals are tricked into providing personal information or making payments under false pretenses. In the video, the call center impersonates legitimate printer support services like HP, Epson, and Canon to deceive victims and sell them unnecessary and expensive services.

💡Remote Access

Remote access refers to the ability to connect to and control a computer from a different location. In the video, the scam call center uses remote access to take control of the victim's computer under the guise of fixing printer issues, while the investigator uses it to access the scammers' systems and their CCTV feed.

💡CCTV Feed

Closed-circuit television (CCTV) feed is a video surveillance system used for monitoring activities within a specific area. The investigator gains access to the scam call center's CCTV feed, which allows him to observe and expose their fraudulent activities in real-time.

💡Impersonation

Impersonation involves pretending to be someone else to deceive others. The scam call center employees impersonate customer support agents from well-known printer companies like HP, Epson, and Canon to trick victims into believing they are receiving legitimate technical support.

💡Firewall Plan

A firewall plan is a service or software designed to protect a computer or network from unauthorized access. The scam call center fraudulently sells expensive and unnecessary firewall plans to their victims, claiming it will protect them from non-existent security threats.

💡Industrial Area Sector 74, Mohali

This is the physical location of the scam call center, situated in Stark Edge Tower, Sector 74, Mohali, Punjab. The video uses this information to pinpoint and expose the geographical base of the fraudulent operation.

💡Fake Website

A fake website is designed to look like a legitimate site but is used to deceive visitors. The investigator discovers a fake website that pretends to offer printer driver downloads but instead prompts users to call a scam number, leading to the call center's fraudulent operation.

💡AE

AE is identified as the mastermind behind the scam call center operation. He manages several fraudulent companies and uses the profits to fund a lavish lifestyle, as observed through his Instagram profile, which showcases luxurious travel and purchases.

💡Remote Device Management

Remote device management involves controlling devices over the internet from a different location. The scam call center uses remote devices located in Texas and California to manage advertisements and process payments, which are essential to their fraudulent activities.

💡Exposure

Exposure in this context refers to the act of revealing the fraudulent activities of the scam call center to the public. The investigator exposes the operation by accessing their CCTV, identifying the employees, and confronting them, which is intended to disrupt their scam and inform potential victims.

Highlights

Live CCTV feed of a scam call center in Stark Edge Tower, Mohali, Punjab.

The scam operation impersonates HP, Epson, and Canon support to sell useless firewall plans.

The call center uses fake printer driver websites to lure victims.

The scam involves showing fake errors to trick victims into buying expensive firewall plans.

The investigator's computer setup allows him to connect to the scammers' computers.

Collaborates with Pleasant Green, another scam investigator.

Exposes the scammers' activities, including playing games and socializing during downtime.

Identifies the call center's organizational structure and key personnel.

Finds that the call center's manager, AE, lives a lavish lifestyle funded by the scam.

Maps out the office layout and identifies camera locations within the call center.

Documents the daily routine and shifts of the call center agents.

Exposes the sales data, revealing nearly $2 million stolen in a year.

Confronts the scammers directly using their own CCTV feed.

Reveals the involvement of high-profile individuals connected to AE.

The investigator hacks into the scammers' Skype accounts and confronts them.

AE and his associates react by making their social media accounts private.

Reports the scam operation to the FBI and other authorities.

Transcripts

00:00

this is the live CCTV feed of a scam

00:02

call center and today I will show them

00:05

their cameras on my computer call them

00:07

by their real names and most importantly

00:10

expose their whole operation this group

00:12

is located in the industrial area sector

00:15

74 in moali Punjab on the fourth floor

00:19

in the Stark Edge Tower this group

00:22

impersonates HP Epson and Canon support

00:26

and I will explain this cam shortly but

00:29

first let me explain how I got here

00:31

while I was Googling for scammers

00:33

website I found this one which

00:36

apparently can help me install drivers

00:38

for my printer so I went ahead and typed

00:41

my printer model and what do you know

00:43

there's two issues that are only fixed

00:46

if you call the number below or chat

00:48

with a live agent of course it doesn't

00:51

really matter what you type as the

00:53

printer model as it will always show the

00:55

same result so I went ahead and called

00:58

the number and let them connect to my my

01:00

device but little did they know that my

01:02

computer is set up in a way where if

01:04

someone connects to me I can connect to

01:07

them as well once I compromised the

01:09

machine it didn't take me long to know

01:11

they have CCTV while I was doing all of

01:14

that I received a message from a friend

01:16

and fellow scamer Pleasant green that

01:19

he's also investigating this group and

01:22

made his own video about them so feel

01:24

free to check it out from the link below

01:25

now that we have their CCTV let's get

01:28

into this scam this group impersonate

01:31

multiple printer companies by publishing

01:33

ads on Google and Microsoft Bing and

01:36

when calling the number on their website

01:38

they won't really fix your printer but

01:40

rather sell you an expensive and useless

01:43

firewall plan let's see how this

01:48

goes

01:50

hello so tell me Miss how how can I help

01:53

you today my printer for one thing won't

01:56

turn off and my computer is not

02:00

communicating with it okay in that case

02:04

uh I can help you with the online fix

02:06

okay with the help of uh remote access

02:09

so click on allow okay yes any positive

02:13

option that you

02:14

see perfect here we go now we are

02:17

connected you see here remote control

02:19

started by

02:20

ronning so you are connected to me you

02:23

can sit back to legs let me go let me

02:25

check that out for you he then takes the

02:28

victim to their website which show those

02:30

two issues regardless of what you type

02:32

as the printer model Miss while

02:35

downloading the drivers uh we come up

02:37

with two different issues the first one

02:39

I can see that's a printer driver

02:42

installation fail can you please stop

02:45

moving the cursor

02:47

Miss I'm sorry thank you okay and the

02:52

other one that I can see there's a

02:54

network error this 0x

02:58

0079 and this network error this is a

03:01

security related error that you are

03:03

getting give me a moment let me check

03:04

out your network status why we getting

03:07

this security error

03:08

here but means what I can see over

03:12

here I'm looking for the network

03:16

status and it shows me the current

03:18

connection that is

03:20

24 and these foreign addresses they

03:23

could be your next door neighbor a

03:25

person from same city same state or they

03:28

could be a different part from the world

03:30

because they're connected online to your

03:32

IP

03:33

address I'm wondering how did that

03:36

happen me too yeah have you uh went to

03:40

any unsecured website clicked on any

03:43

unsecured link or open up a spam email

03:46

anything that you think that might have

03:48

give access to these

03:52

people not that I can

03:55

think and now at the bottom I can also

03:58

see the network error code

04:00

here you'll see it says there are some

04:03

troen M here that what we found okay and

04:08

95% your home local IP address is

04:11

infected and it says high risk that's

04:14

not good so basically you're facing

04:17

problem with the

04:18

Securities somebody tried to hack into

04:21

your network and some of the people they

04:23

have establish connection as well

04:25

obviously whatever he said is a bunch of

04:27

Lies even AI knows it it's a scam he

04:30

then tells the victim about their

04:32

useless firewall plans so she can choose

04:35

one of them and that will provide you an

04:37

anti-hacking Shield so no matter what

04:40

you do no one will be able to hack into

04:43

this okay anti-hacking Shield maybe

04:46

that's the thing you guys should have

04:47

got so I don't access your cameras and

04:50

then show them to you Karan

04:52

unfortunately the victim does make a

04:54

payment and get scammed but then Karan

04:57

curses her and sing happily bye for now

05:01

all right thank

05:15

you of course that doesn't always go as

05:18

planned and sometimes the scammers do

05:20

lose their temper this is Jennifer

05:23

calling from printer support how are you

05:26

today uh pretty good good sir this is

05:29

Jen calling from absent support I'm

05:32

going to be your technician who is going

05:34

to help you okay this

05:36

is how do I know that you are from Epson

05:40

I've been scammed this way so many

05:42

times that makes me

05:44

ill that's strange you call me yeah

05:48

because you gave your number that's why

05:50

I call you you don't give your number

05:52

then not all people are sitting here

05:56

scammers that's true but yeah if you

05:59

can't trust this then we can't do I need

06:01

trustworthy

06:04

customers I don't like that what you

06:07

don't like

06:17

that when the cold flow is slow we can

06:20

see them playing video games eating

06:22

crawling cigarettes socializing

06:25

practicing shooting with a Nerf gun and

06:27

then shooting each other with it I also

06:30

saw them playing hot potato with the

06:32

pillow ones and dancing wow it must be

06:35

so fun working in there right

06:38

unfortunately I don't have access to all

06:40

of their computers but what I do have

06:43

access to are some agents the floor

06:45

manager and that's prep jots which we

06:48

can see on the cameras and finally three

06:51

devices in the United States that are

06:53

used remotely two in Texas to manage the

06:55

Google and Microsoft adverts and one in

06:58

California and that's used to process

07:01

their payments on stripe log to their

07:03

business Banks and even more of course

07:06

the exact location of these devices as

07:08

well as the us llc's that are involved

07:11

and its owners are all reported to the

07:13

FBI with the help of the AA Outreach

07:16

group these three laptops are only

07:18

controlled by two people remotely and

07:21

they're online

07:22

24/7 who are these two it's big boy prop

07:26

and AE to whose AE you might ask he's

07:30

The Mastermind of this operation this

07:33

group goes by the name of asoft tech

07:35

Solutions which we can clearly see from

07:38

the cameras and this company's

07:40

registered since 2020 and in fact

07:43

registered under a and sahil and of

07:47

course the address registered is not the

07:49

same as the actual address that they

07:50

scan from now let's learn more about Mr

07:53

AE based on his Instagram profile that

07:56

has over 40,000 followers he's the

07:59

founder of asoft tech Solutions asoft

08:01

Tech Logistics asoft Tech Staffing and

08:04

click music wow what a successful person

08:08

and we can also see how he spends the

08:10

money he steals and that's by traveling

08:12

on business class to Tokyo London and

08:15

Australia traveling to Dubai and going

08:18

to Rolex and Gucci stores wow I kept

08:21

watching their CCTV and decided to map

08:24

out their office as well as locating and

08:26

numbering the cameras as the first

08:29

camera CER shows the main entrance to

08:31

the office and that can only be opened

08:33

if you have a registered fingerprint we

08:35

can also see a reception desk and two

08:38

doors the one on the left which leads to

08:40

ae's office and the one on the right

08:43

leads to the call center obviously both

08:45

doors are only opened with a fingerprint

08:48

scanner camera 2 covers ae's office

08:51

which sadly has no cameras in and the

08:54

balcony where the agents usually have

08:56

their smoke brakes at camera 3 covers

08:59

the second third fourth and part of the

09:02

fifth desk as well as the door which

09:04

leads to the kitchen and the bathroom on

09:07

the opposite side is camera 4 and it

09:09

covers the entrance to the call center

09:11

the storage room and the first desk

09:14

camera 5 covers the third fourth and

09:17

part of the fifth desk and Camera six

09:19

covers the first three desks as well as

09:22

PR's office and the dining room Camera 7

09:25

is the best in my opinion since it has

09:27

the best view of the call center and the

09:29

entrance and finally camera 8 which is

09:33

placed outside on the top of the

09:34

building covering the entrance to the

09:36

building and it's probably there to see

09:38

if the police is going to pay a visit

09:40

anytime soon usually the first one to

09:43

come to the office is the cleaner and he

09:45

starts cleaning the desks and vacuuming

09:48

then at around 7:50 p.m. the agent

09:51

slowly start coming in and by 9:00 p.m.

09:54

the center would be filled they then

09:56

would have a dinner break at 1:00 a.m.

09:58

and some te breaks where the cleaner

10:00

goes around carrying a tray full of mugs

10:03

then they would start leaving the office

10:05

at around 5:00 a.m. and of course the

10:07

last to leave the office is the cleaner

10:10

at 6:00 a.m. the agents didn't have any

10:12

interesting files and the computers in

10:14

the United States had a ton of invoices

10:18

however thanks to prop I can see all of

10:20

their sales from 2020 as well as the

10:23

attendance real names Skype chats and

10:26

even more I also went through the

10:29

camera's playback and got a picture of

10:31

each agent's face so here's the

10:34

organizational structure of asoft De

10:37

Solutions going back to the sales sheet

10:40

let's see how much AE made last year the

10:42

sales sheet has a ton of information

10:45

that is related to the victims as well

10:47

as their payment information all saved

10:49

in clear text however what I'm

10:51

interested in is the amount column and

10:53

by calculating their sales from the 2nd

10:56

of January until the 29th of December

10:58

this group stole

11:02

1,946

11:06

54925 that's insane even if we assume

11:09

that AE has $900,000 in expenses he

11:13

still makes $1 million in profit per

11:15

year that explains the lavish lifestyle

11:17

that he's living I also copied all of

11:20

the agent names to see who's the scammer

11:22

of the Year and that is the one and only

11:24

vshell this guy scammed over 200 people

11:27

in one year however he didn't really

11:29

seem proud of it when I confronted him

11:32

getting these guys arrested would be

11:33

amazing but looking at A's Instagram

11:36

again this guy has a picture with one of

11:38

the ex-ministers in India and the Indian

11:40

Ambassador in Japan so it's not going to

11:43

be easy getting him arrested so I

11:45

decided to give him and his agent a

11:47

scary memory by showing them their own

11:49

live CCTV and confronting AE by calling

11:53

him this call is being

11:56

recorded please hold while I try to

11:58

connect you thank for your call this is

12:00

Ronnie how can I help you are we

12:02

connected Can you see my screen now now

12:04

we are now we are connected is you hear

12:06

remote control started by Ronnie let me

12:08

just show you something uh yes sir take

12:12

the control and show I know you guys are

12:14

scammers do you recognize this

12:18

office

12:22

hey why are you having my access then do

12:27

you see do you see this office

12:29

I know where you guys are

12:31

located this is you can you this is live

12:34

this is live can you w up the camera bro

12:37

can you wave at the camera look at

12:39

behind you I'm looking at you

12:41

bro yeah why is everyone looking at the

12:43

cameras bro can can I speak to AE I know

12:47

ae's in the office today bro can you

12:49

call him can someone call AE

12:51

bro so who are you it doesn't matter who

12:55

I am bro I know I know where you guys

12:58

are located stop moving your mouse

13:04

man can you wave at the

13:06

camera just look behind you this camera

13:08

is just live by the way it's live so can

13:10

you like wave at the camera

13:13

please can you just turn off it turn off

13:17

the cameras

13:19

why why why do you want me to turn off

13:21

the camera why are you scared Karan

13:24

speak to me bro I know you guys are

13:26

scammers you said you're from HP but

13:28

you're not you're you're from asoft Tech

13:31

Solutions private limited your BS is

13:34

actually and your manager's Pro why did

13:37

you shut down the

13:40

computer he's running bro what the [ __ ]

13:45

he's running they then run to A's office

13:47

to tell them what happened and possibly

13:50

find a solution to their problem then Mr

13:52

pusack thinks it's smart to unplug the

13:54

internet so he tells Vell to do it of

13:57

course Vell run runs to that corner and

14:00

try but he fails miserably Vel comes

14:04

back but with support this time and it's

14:07

Mr pach again they run to the corner

14:10

trying to unplug the internet and kick

14:12

me out of their Network for some reason

14:15

this guy decides to come out of his

14:17

office and wave at the cameras so I see

14:20

you we can't what's up bro Pak then

14:22

realizes that the cameras are in A's

14:24

office so he goes back to that office to

14:27

possibly do something in the meantime I

14:30

decided to Spook shabnam a bit by

14:32

speaking through her computer even

14:35

though she was on a call let's see how

14:37

that went hello shabnam hello hello

14:41

shabnam I know you can hear me shabnam

14:44

come on speak to me why do you scam

14:45

people shabam why do you scam people

14:49

hello hello yo B Bell hello bro what's

14:52

up bro are you going to speak to me bro

14:56

hello I know you can hear me I know you

14:58

can hear me

15:01

me ah the cameras went off yeah the

15:04

cameras went

15:06

off yeah yeah they shut down the cameras

15:10

down they did shut down their cameras

15:13

and their computers yes but I didn't

15:16

have enough fun yet so I decided to log

15:18

into shabnam's Skype account and give

15:21

bra a call I think he didn't want to

15:23

speak to me

15:29

hello hello am I speaking to PR jot

15:33

sorry who is PR jot yo PR jot bro how do

15:36

you feel that I hacked your call center

15:38

bro tell me tell us your feelings bro

15:42

brother this is PR

15:45

J what do you mean I'm not proud John

15:48

this is your Skype don't lie I then

15:51

called The Man himself actually a couple

15:53

of times and we did speak but he kept

15:56

hanging up the line for some reason

16:00

[Music]

16:01

yo AE yo what's up my man what's up bro

16:04

so tell me bro how do you feel that I

16:06

hacked your call center man how do you

16:07

feel that I he your call

16:11

[Music]

16:14

center can you speak bro can you speak

16:17

okay tell me okay okay tell tell me what

16:19

you need I want to know why do you scam

16:22

people bro why do you scam people that's

16:24

what I want to know why do why do you do

16:25

that we are not scaming anyone what do

16:28

you mean bro you you guys sell fake

16:29

firewall plans you tell people that

16:31

there is hackers on their account and

16:33

you say that you're from HP man what do

16:35

you mean you don't scam people bro what

16:36

do you me see we we have nowhere mention

16:39

on our website wait bro did he hang up

16:43

call him again get

16:44

disconnected right I'm going to call I'm

16:46

going to

16:47

[Music]

16:50

call yo actually bro let's speak bro man

16:54

to man right let's speak don't hang up

16:56

don't disconnect the call please so tell

16:57

me man I just want to why do you scam M

17:01

so see you know on our website okay let

17:04

me tell you on our website we have

17:05

clearly mentioned that we are third

17:07

party support right bro bro that doesn't

17:10

matter I have recordings of your agent

17:13

saying hello this is HP support hello

17:15

this is Epson support hello this is did

17:18

this guy just

17:20

[Music]

17:23

disconnect at some point actually

17:25

stopped answering me so I decided to

17:28

spam him and and his group chat for a

17:30

bit until I got kicked out of shabnam's

17:32

account that didn't stop me though

17:34

because I logged in into props account

17:37

this time and I tried to speak to AE

17:39

again but he didn't answer me so I

17:41

spammed their chats again with some love

17:44

I even sent some messages to AE hoping

17:46

he would answer me or at least call me

17:49

but he didn't until I got kicked out

17:52

again the very next day ae's Instagram

17:55

account got changed to private and he

17:57

removed his bio which meant mentioned

17:59

that he's the founder of asoft tech

18:01

Solutions the account of asoft tech was

18:03

also changed to private and perhabs

18:05

account as well not only that but

18:08

actually decided to take down his

18:10

LinkedIn page for some reason I think

18:13

it's clear that this guy is scared and

18:15

hopefully they stopped scamming as I

18:17

never saw them online ever since I hope

18:19

you guys enjoyed the video please like

18:22

And subscribe for more content bye-bye

Rate This

5.0 / 5 (0 votes)

العلامات ذات الصلة
Tech ScamPrinter SupportCall CenterImpersonationCCTV ExposureOnline FraudRemote AccessSecurity BreachConfrontationInvestigation
هل تحتاج إلى ملخص باللغة العربية؟