Skip to main content

Blocksims ICO Uses Fake Identities One Is A Russian Serial Killer Must See!


Just a few more facts on the fraudulent efforts of the criminal, Shehar Yar of Blocksims, who is trying to justify his stolen ICO. I will be showing you how they have chosen the photograph of a prominent business person as their Bounty Manager and the photo of a Russian serial killer to troll the Mobilink-coin Telegram group.

I would like to give a shout out to FaceFirst, my personal favorite when it comes to facial recognition software.

Blocksims.io created a false identity on their Telegram account named “Maxine Layare”.

This user is Blocksims Bounty Manager.
Maxine Layare Blocksims
Blocksimstelegram

However I identified the image associated with this fraudulent Telegram Blocksims identity with a very respected business person named Janet Cowell.

Janet Cowell

We reached out to Janet and she is aware of her photographic identity being stolen by Blocksims.
Next we have a man named “Henry Layman” with an image of a bald guy who has been trolling the Mobilink-Coin Telegram page.

Aslan Gagiev Djako Blocksims
Aslan Gagiev Djako Shehar Yar
As it turns out, Henry is actually Russian serial killer, Aslan Gagiev, also known as Djako. Djako has killed over 60 people.
Shehar Yar Serial Killer
If it weren’t so sad, I would have to laugh at the felonious comedy team known as Blocksims, led by criminal ringleader Shehar Yar.

Are they just pulling images and identities out of their ass? Or was there a specific strategy to use an image of a respectable business person for their own company and the image of a Russian serial killer to troll Mobilink-coin? Time will tell of their failing fraudulent efforts as my investigative team and I uncover every rock looking for fraud.

Comments

Popular posts from this blog

Hackers Behind $530 Million Coincheck Heist Begin Moving Stolen Funds

The hackers behind last week’s $530 million Coincheck heist have once again begun moving the stolen XEM tokens, marking the beginning of what will likely be a cat-and-mouse game to launder the funds. Blockchain data demonstrates that the hackers made a litany of transfers from their primary address to a variety of other addresses on Jan. 30. Each transaction transferred 100 XEM, worth approximately $77 at the present exchange rate. Source: ournem.com That represents a small percentage of the 500 million XEM the hackers raked in during the theft , but it likely indicates that they are attempting to launder the stolen funds. “When people look to launder these types of funds, they sometimes spread it into smaller transactions because it’s less likely to trigger (exchanges’) anti-money laundering (mechanisms),” Tom Robinson, co-founder of Elliptic, a cryptocurrency security firm in London, told Reuters . Indeed, while the hackers are sitting on a fortune that is now sp...