- This topic is empty.
-
Topic
-
Type of Scam: Online Scam
URL of Scam: mainnetdappad.com
Calculated Amount Loss: $26,592.00Open-Source Intelligence Analysis: Preliminary Findings on Fraudulent Activities Associated with mainnetdappad.com
Current Website:
The website investigated is mainnetdappad.com, with a review conducted on August 7, 2024. The website presents itself ostensibly as a platform for decentralized applications but is involved in fraudulent activities. The site’s design and user experience are crafted to appear legitimate, disguising its malicious intent.Domain and Hosting Information:
Registrar: Internet Domain Service BS Corp
Nameservers: dns1.smoothdns.com, dns2.smoothdns.com – hosted by Internet Domain Service BS Corp.
MX Records: mainnetdappad.com (suggesting the domain itself handles email services directly)
ISP: Fastly (providing hosting services for the domain)
Geolocation Challenges:
The DNS addresses point to servers in the USA and Iceland, with indications of a Virtual Private Network (VPN) or proxy usage, which may skew accurate geolocation.Technical Analysis and Subpoena Recommendations:
Analytics and Tracking:Fastly: Subpoena for application performance analytics data.
Widgets:Font Awesome: Subpoena for access to font-related resources and usage logs.
Content Delivery Networks:UNPKG, AJAX Libraries API, jsDelivr, jQuery CDN: Subpoena these entities for logs and data that could reveal interaction with the site.
Mobile Compatibility:Apple Mobile Web Clips Icon, iPhone / Mobile Compatible: Review compatibility features that cater to mobile users, though subpoenas are not applicable.
JavaScript Libraries and Functions:jQuery, Google Hosted Libraries, SweetAlert, es6 promise, Vue, Polyglot.js, core-js: Subpoena for JavaScript libraries usage and modification data.
SSL Certificates:LetsEncrypt: Subpoena for certificate issuance and associated logs.
Web Hosting and Servers:Fastly Hosted, Fastly Load Balancer, GitHub Hosting, Varnish: Subpoena Fastly and GitHub for hosting details and server logs to trace the origin of network traffic and data handling.Key Observations:
The sophisticated use of multiple content delivery networks and JavaScript libraries highlights the site’s attempt to enhance user experience and engagement, all while hiding its scam operations behind a facade of legitimacy. The technical infrastructure involves prominent technology providers, complicating the tracing of malicious activities but also providing multiple points for legal intervention.Conclusion:
This analysis details the technical footprint and recommended legal actions to identify and dismantle the infrastructure supporting this fraudulent website. It is crucial to coordinate with hosting and technology service providers to uncover the depth of the scam activities.