- https://www.reddit.com/r/discordapp/comments/smoh49/im_sending_fake_discord_sites_with_fake_user_data/
- https://www.reddit.com/r/discordapp/comments/smoh49/comment/hvy2twl/
I've been running this script for about 20 hours. Hopefully this will prevent some from getting their accounts stolen.
This was prompted after yet another compromised account started spamming in one of the Discord servers i'm in.
I figured that i should share what i've been doing to encourage others in obfuscating real user data on these scummy phishers.
This is done via Window's own built in sandbox (windows 10 pro feature) and VPN software (to send various IP addresses)
Currently using ChromeDriver with Selenium and Faker in Python. I'll be building my own database of fake usernames and passwords that look even more believable.
No need for threading or async code here. Single instance app.
More requests a second would be redundant.
See comment here: https://old.reddit.com/r/discordapp/comments/smoh49/im_sending_fake_discord_sites_with_fake_user_data/hvxwndd/
sync runs everything on one thread. multiprocessing would let you utilize multiple cpu cores to do work.
multiprocessing is a package that supports spawning processes using an API similar to the threading module. The multiprocessing package offers both local and remote concurrency, effectively side-stepping the Global Interpreter Lock by using subprocesses instead of threads. Due to this, the multiprocessing module allows the programmer to fully leverage multiple processors on a given machine.
wait till you realize you can automate all this!
For me it's a simple right mouse click, copy as Python-Requests. Pretty sure Chrome has a built in "copy as cURL" which can then be converted to Python using https://curlconverter.com/
VPN software (to send various IP addresses)
This isn't nearly as hard to stop as people think.
Like, for one, you can reverse lookup a lot of these addresses and see that its a VPN company that owns it, and then drop the records. I do this all the time with my company purchase form. Scammers think they're slick using VPN and server farms to hide their IP and then forget that half the addresses are owned by "Scummy VPN company" and none of our legitimate customers are purchasing products from "AWS".
Also, if you're rotating the IP addresses any less frequently than one-per, you can filter out pretty much all the posts that are using multiple accounts from the same IP.
Theres also a fuck ton of front end ways to detect this kind of thing, though thats not really going to help unless they've already implemented them. Things like monitoring typing speed, detecting chromedriver (Cloudflare does this) etc.
Honestly though, I think the biggest issue here is the data, since most of those records could be filtered out using a regex expression. Most people aren't using FirstLast email addresses IME and those password manager looking passwords are also a lot rarer IRL than most people would probably want to admit. Cross that with the fact that the UA on all of these posts is going to be the same and you've probably got a 99.99% filter on the data with minimal false positives right there.
Did you check to make sure you're not passing any session cookies over or anything?
This may be mildly annoying for anyone who isn't experienced in dealing with this sort of thing. Its worth a shot for some fun. Anyone with any real world experience though, this should be pretty easy to recover from with minimal effort.
ip spoofing
I'd say it was a while ago- But these days pretty much all network hardware has preventative measures:
https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/
Supposedly even verifying outgoing packets on consumer grade machines. Sorry if i framed it to never have been possible, or that it isnt possible. Was trying to frame it in a simpler light.
I literally spoofed an IP header last week. It is very much possible and it isn't even incredibly difficult if you know what you are doing. You can put whatever you want in the src field of a ip packet
Did you report to the company hosting the server, and https://www.cisa.gov/uscert/report-phishing ?
- https://www.reddit.com/r/learnpython/comments/otyosq/scraping_data_from_interative_web_charts_python/
- https://www.reddit.com/r/discordapp/comments/siuazn/everyone_still_hates_nfts_discord/
- https://www.reddit.com/r/discordapp/comments/sj2pq2/discord_seems_to_interpret_some_images_via_the/
- https://www.reddit.com/r/discordapp/comments/smg361/the_scpsl_devs_kicked_fredboat_due_to_the_owners/