Skip to main content

In just three working days, Crypto.com and ByteDance enabled criminals to steal £9,693.80 from me

Overview

 In my role as a tech speaker and professional with a background in software engineering and architecture, I advise others on how to avoid online risks.

However, none of that prepared me for what happened - since the scammers used more than a fake website or phishing email.

It was Crypto.com.

I started with a website called intlbtcs.uk on my phone

On my mobile device, I was able to access the platform. It looked clean, responsive, and professional. It did not look like a scam, and the people behind it claimed to be Crypto.com employees.

They mimicked the Crypto.com experience by sending fake transaction reports, dashboards, and confirmation messages using Crypto.com's name, branding, and terminology along with ByteDance.

Since I am a tech professional, I didn't notice any red flags at first, especially when they sent me small amounts of crypto.

I was contacted by scammers via Telegram usernames such as:

@Aisha89895, @Marchesi668, @Alexandria96888 and @TG06Carter via WhatsApp at a UK number: +44 7349 041315).

and their website https://www.intlbtcs.uk/

Moreover, these accounts pressed me to send funds and promised false assurances, which made it even more convincing.

Photos Of them

Username @Aisha89895 on Telegram















Username @Aisha89895 on Telegram and her QR Code

Username @Aisha89895 on Telegram and her QR Code

Username @Marchesi668 on Telegram

Username @Marchesi668 on Telegram

Username @Marchesi668 on Telegram and QR Code

Username @Marchesi668 on Telegram and QR Code


Username @Alexandria96888  on Telegram 

Username @Alexandria96888  on Telegram



Username @Alexandria96888  on Telegram and QR Code

Username @Alexandria96888  on Telegram and QR Code


Username @TG06Carter on Telegram 

Username @TG06Carter on Telegram


Username @TG06Carter on Telegram and QR Code

Username @TG06Carter on Telegram and QR Code











It escalated quickly after that.

As the days went on, I was pushed to send larger and larger sums via the Crypto.com app. The last payment, £4,555, was supposed to be the "final top-up." But it wasn't. The next day, I was told I needed to send more.

I sent a total of £9,693.80 through Crypto.com over the course of three working days.

Proof of the Amount taken on Crypto.com


ByteDance 字节跳动内容质量与用户体验平台___ByteDance proof

https://www.bytedance.com/en/









Crypto.com processed everything.

Let me say this clearly:

  • Crypto.com processed every single one of those payments.
  • Crypto.com allowed multiple high-value transfers to anonymous wallets.
  • Crypto.com took no action — no warnings, no holds, no questions.

After reporting the scam with full documentation - wallet addresses, chat logs, transaction evidence, Telegram usernames, and WhatsApp contact information - Crypto.com ignored the report.

I’m not inexperienced.

Despite my expertise in technology, I was unable to detect this fast-moving, socially engineered scam because Crypto.com gave it credibility and infrastructure.

They allowed the scammers to operate.
They allowed the money to move.
They failed to act when warned.

Crypto.com has a responsibility — and they failed.

Crypto.com’s brand was used.
Crypto.com’s app processed the theft.
Crypto.com failed to protect one of their own users.


From Crypto.com, I publicly request the following:

  1. Identify the wallet addresses and Telegram and WhatsApp accounts associated with the wallets.

  2. Any funds that are recoverable should be traced or frozen.

  3. The £9,693.80 should be refunded - or at least a significant portion of it.

  4. This type of suspicious activity needs to be flagged on the platform.

It only took three working days for Crypto.com to become the channel for a full-scale financial theft - while claiming to be a safe, secure platform.

By allowing this to continue, Crypto.com is not just negligent, they are complicit.

To every user of Crypto.com

  • Don’t assume you're protected.
  • Don’t assume a wallet address is safe.
  • Don’t trust anyone just because they use the name Crypto.com — even if the platform does nothing to stop it.

Crypto.com must act now — not just for me, but for every person using their platform under the illusion of safety.

 

On WhatsApp Commucation Log

























Telegram Messenger is proof of how they onboard to Crypto.com





Comments

Most Viewed Ziggy Rafiq Blog Posts

How to Truncate String in C#

  Overview In today’s post, I am writing about one of the fundamental aspects of C# and as programmers, we should use this approach I have realised throughout my life as a software engineer that not everyone knows the most basic approaches or how to use them efficiently. Truncating a string in C# means reducing the length of a string to a specified number of characters, typically by removing characters from the end of the string. This is often done when a string is too long to be displayed or used in a specific context and needs to be shortened to fit. Ley says if we have a string that is 100 characters long, but we only want to display the first 50 characters, we will truncate the string to a length of 50. There are several ways to truncate a string in C#, including using the Substring method, StringBuilder, and LINQ. A simple example of this is below, we're creating a longString variable with a long string value. We're also defining a maxLength variable with a value of 20...

A Complete Guide to Using GUIDs in C# with Code Examples

  Overview In this post, we are looking at GUIDs (Globally Unique Identifiers), which are widely used in C# for generating unique identifiers for objects, entities, and resources in a system. In this post, we'll explore the basics of GUIDs in C#, their advantages, and how to convert strings to GUIDs. In this post, we have used Guid Generator to create the GUID from the following URL Address https://guidgenerator.com/ What is GUID GUID (Globally Unique Identifier) in C# is a 128-bit value that is used to identify objects, entities, or resources in a unique manner across different systems and applications. It is also known as UUID (Universally Unique Identifier) in some other programming languages.   GUIDs are generated using a combination of unique factors such as the MAC address of the network adapter, the current time and date, and a random number. The resulting GUID is a string of 32 hexadecimal digits separated by hyphens, such as "b86f2096-237a-4059-8329-1bbcea72769b...

ASP.net Core Services Lifetime Differences Between Using AddTransient, AddScoped and AddSingleton Services

  ASP.net Core Services Lifetime Differences Between Using AddTransient, AddScoped and AddSingleton Services Overview In this blog post, I will be explaining to you the ASP.net core Service Lifetime and will be explaining to you what is the difference between them and which one can be a risk to a memory leak if used incorrectly. AddTransient, AddScoped, and AddSingleton are dependency injection services in ASP.NET Core. The differences between them are as follows below. AddTransient: A new instance of the service is created every time it is requested. AddScoped: A single instance of the service is created per request within the same scope. AddSingleton: A single instance of the service is created for the entire application lifetime. In general, it's recommended to use AddScoped for services that are stateful and AddTransient for services that are stateless or have a short lifetime. AddSingleton is usually used for services that are expensive to create or only need to be crea...