Newsletter Subject

Teenage Mutant Crypto Hackers

From

paradigmpressgroup.com

Email Address

AltucherConfidential@mb.paradigmpressgroup.com

Sent On

Tue, Jul 9, 2024 09:30 PM

Email Preheader Text

🚨Protect yourself TODAY 🚨 July 09, 2024 | Without this simple device, your digital lif

🚨Protect yourself TODAY 🚨 July 09, 2024 [WEBSITE]( | [UNSUBSCRIBE]( Without this simple device, your digital life is a diamond in a public tuk-tuk. Teenage Mutant Crypto Hackers CHRIS CAMPBELL Dear Reader, With only 13 candles on his cake, Ellis Pinsky - now known as the "Baby Al Capone" - discovered the dark side of the internet. Like most other walking hormone factories, his natural habitats included dimly lit rooms and virtual battlefields. His résumé was a collage of button mashing and creative insult generation. Until, that is, a rival gamer sent him a chilling message after a heated match: "How's the weather in Irvington?" Ellis retreated, shutting down the game. Yet… As the screen darkened, and he got over the initial dread of a nemesis figuring out his physical location… Ellis got excited. A paradigm shift rattled open his young mind, unveiling a game with real-world consequences: hacking. Suddenly, Call of Duty seemed like child's play. Thus began one of the biggest crypto heists in history. Today, we’re going to talk about this wild story. We’ll talk about how it happened… why this attack is such a big problem… and, finally, the simple device you can use to protect yourself. Let’s begin at the utmost arc of every hero’s (or, in this case, antihero’s) journey: the mentor. The Mentor With a little digging, Ellis soon found a mentor in a hacker named "Ferno.” Under Ferno's guidance, he learned how to uncover hidden information about people online, trading passwords, emails, and Social Security numbers. It wasn't long before Ferno introduced Ellis to OGUsers, a forum where young hackers shared techniques. Determined to learn everything, Ellis quickly surpassed his mentor, gaining a reputation as a hardcore player. And, get this… By 14, Ellis had insiders at major wireless carriers working for him. Through this network, he could hack anyone’s phone and access virtually any account he wanted. Bank accounts. Social media profiles. Crypto accounts. The works. The world was now his virtual oyster. In January 2018, Ellis's abilities were put to the ultimate test when he was approached by a user named Harry. Urgent AI Wealth Window Update Not long ago, James Altucher broke down what he called the “AI wealth” window, a radical opportunity that a slew of everyday investors used to profit from AI stocks. Since then, AI stocks have gone on a tear, and now, James is making a new revelation about AI that could make early adopters extremely rich over the long term. He’s calling it the “AI Wealth Window: Final Chapter”, a NEW shift in AI that could have huge implications for your portfolio… and it’s just around the corner. [Get all the information here.]( The Big Heist Harry had a high-profile target in mind: Michael Terpin, founder of Match.com. Harry discovered that Terpin, a prominent figure in crypto at the time, owned millions of dollars worth of crypto. And he wanted Ellis's help to steal it. On January 7, 2018, while Terpin was at a conference in Vegas, Ellis and Harry executed their plan. An AT&T employee facilitated the SIM swap, giving Ellis and Harry access to Terpin's email. They ran a script to scan his emails for references to crypto passwords (private keys), eventually finding a file named "keys." Inside, they discovered keys to a few crypto wallets. When they unlocked the wallets, they discovered a gold mine: in all, the crypto was worth about $24 million. Ellis enlisted the help of friends from OGUsers to exchange the stolen funds for Bitcoin, paying them around $20,000 per batch. One of these friends was Nicholas Truglia, a fellow SIM swapper. BUT… there was a problem brewing in teenage millionaire paradise. Nicholas, known for his reckless behavior, continued to carry out hacks even after the Terpin heist. Unbeknownst to him, one user posing as a friend had been compiling evidence against him and sharing it with Terpin's lawyers. Law enforcement was closing in on Nicholas's paper trail, tracing hacked funds back to wallets on Coinbase. On November 13, 2018, Nicholas's apartment was raided. Investigators found incriminating messages in his iCloud backup from the day of the Terpin hack, revealing his newfound wealth and extravagant spending on escorts and Super Bowl tickets. In 2019, Terpin's lawyers filed a civil lawsuit under the RICO Act, demanding $72 million in restitution - three times the amount stolen. Nicholas was cooked. The Christmas Surprise Shortly after Christmas in 2018, Terpin's lawyers contacted Ellis's mother. They accused Ellis of being the mastermind behind the $24 million hack. Ellis's mother hired a lawyer, and he returned what he had: 562 BTC, a Patek Philippe watch, and $100,000 in cash. However, the value of the returned Bitcoin had fallen to $2 million. On his 18th birthday, Ellis received another lawsuit from Terpin, demanding the USD value at the time of the hack (over $10 million) plus $72 million in restitution. Two weeks after the news went public, four masked men broke into Ellis's house, likely expecting to find the money. But Ellis anticipated the attack, buying a shotgun months prior. His family barricaded themselves upstairs until the police arrived. The Aftermath After a drawn-out legal process, Nicholas pled guilty to several counts of wire fraud and was sentenced to 18 months in prison, ordered to pay $20 million in restitution to Terpin. He finished his sentence in 2023 but was arrested again for civil contempt after claiming he could not access the funds to pay restitution. He could be held indefinitely until the debt is paid off. Ellis, too young to serve time, was ordered to pay an additional $22 million in restitution on top of what he had already returned. He is currently enrolled at NYU, studying computer science and philosophy. The Rub Some frame this as a cautionary tale about the allure of easy money and the dark side of the internet. Sure, there’s that… But there’s an even bigger story: 14 year olds are coming not just for your crypto - but for your entire online life. Fortunately, there are easy ways to protect yourself. Simple Steps: - Never click on a link in an email: Always type the URL directly into your browser to ensure you're not falling for phishing scams. - Never call a number from an email: Scammers often use fake phone numbers. Verify numbers from official websites. - Back up your app-based authenticators: Store your authenticator codes on a separate, cheap phone that you can connect to WiFi if needed. - Don’t store your passwords or crypto keys on your device: Especially not in your email. Always write them down and put them in a safe place. Pro Tips: - Use a password manager: Tools like LastPass or 1Password can generate and store complex passwords, reducing the risk of password-related breaches. - Enable multi-factor authentication (MFA): This adds an extra layer of security. Even if someone steals your password, they can't access your account without the second factor. - Regularly update your passwords: Change your passwords periodically, especially for financial accounts. But even these pro tips can fail if your master password, SMS codes, or authentication app codes are compromised, as they can still be phished or intercepted. There’s one device that adds an unphishable, hardware-based layer of security that software solutions alone cannot match. The Yubikey The Yubikey is the BEST and EASIEST way to protect yourself. - What is it? A Yubikey is a physical security key that you plug into your device. It provides a hardware-based second factor of authentication. - Why use it? It’s virtually immune to phishing. Even if hackers get your password, they can’t get in without your physical Yubikey. How to Use Yubikey: - Set up the Yubikey with your accounts: Follow the instructions to pair your Yubikey with each account that supports it (most major platforms do). - Keep a backup key: Have a second Yubikey stored in a safe place in case you lose the primary one. - Use it regularly: Make it a habit to use your Yubikey every time you log in. By applying these steps, you can significantly reduce your vulnerability to hackers and safeguard your digital assets and personal information. Without this device, your digital life is a diamond in a public tuk-tuk. With it, it’s a diamond in a submarine vault. Choose wisely, Chris Campbell For Altucher Confidential Rate this email Like Dislike Thanks for rating this content! Looks like something went wrong. Please try to rate again. [CRITICAL] Announcing A Major Change To Your Subscription! I’m reaching out because I’ve just announced some exciting new changes to Altucher’s Investment Network. And as one of my readers, I wanted you to be one of the first to know, because this could impact your subscription in a major way. In short, I’m announcing 3 highly valuable new benefits for subscribers, along with an entirely new “Pro” level of service. For a limited time, because you’re one of my VIP subscribers, I’ve arranged to upgrade your subscription at no additional cost to you through this offer. [Click here now for the urgent details.]( You Might be Interested in... [The Scourge of Higher Education]( [US Dollar making big Currency moves. Your move next. Play to win.]( [This ONE Stock is my Inflation-Beating Secret Weapon - Zach Scheidt]( ☰ ⊗ [ARCHIVE]( [ABOUT]( [Contact Us]( © 2024 Paradigm Press, LLC. 1001 Cathedral Street, Baltimore, MD 21201. By submitting your email address, you consent to Paradigm Press, LLC. delivering daily email issues and advertisements. To end your Altucher Confidential e-mail subscription and associated external offers sent from Altucher Confidential, feel free to [click here.]( Please note: the mailbox associated with this email address is not monitored, so do not reply to this message. We welcome comments or suggestions at feedback@altucherconfidential.com. This address is for feedback only. For questions about your account or to speak with customer service, [contact us here]( or call (844)-731-0984. Although our employees may answer your general customer service questions, they are not licensed under securities laws to address your particular investment situation. No communication by our employees to you should be deemed as personalized financial advice. We allow the editors of our publications to recommend securities that they own themselves. However, our policy prohibits editors from exiting a personal trade while the recommendation to subscribers is open. In no circumstance may an editor sell a security before subscribers have a fair opportunity to exit. The length of time an editor must wait after subscribers have been advised to exit a play depends on the type of publication. All other employees and agents must wait 24 hours after on-line publication or 72 hours after the mailing of a printed-only publication prior to following an initial recommendation. Any investments recommended in this letter should be made only after consulting with your investment advisor and only after reviewing the prospectus or financial statements of the company. Altucher Confidential is committed to protecting and respecting your privacy. We do not rent or share your email address. Please read our [Privacy Statement.]( If you are having trouble receiving your Altucher Confidential subscription, you can ensure its arrival in your mailbox by [whitelisting Altucher Confidential.](

EDM Keywords (215)

yubikey young worth world works without win wifi weather wanted wallets vulnerability value use upstairs upgrade unlocked type top time terpin tear talk supports suggestions subscription subscribers submitting store still steps steal speak slew short sharing share service sentenced sentence security script scourge scan safeguard rub risk reviewing returned restitution respecting reputation reply rent references recommendation readers reaching rating rate ran questions put publications publication provides protecting protect prospectus profit privacy printed portfolio plug plan phone phished philosophy pay passwords password pair paid ordered open one ogusers number nicholas network needed mother monitored money might message mentor making mailing mailbox made lose long log link licensed letter let length learned lawyer known know keep journey james interested intercepted instructions insiders information however help happened hackers hack habit guidance got gone going get generate game funds friends friend frame forum following first finished find finally ferno feedback falling fallen fail exiting exit exchange even escorts ensure end employees emails email ellis editors drawn discovered diamond device deemed debt day crypto could cooked consulting consent connect conference compromised communication committed coming collage coinbase closing click claiming christmas case carry calling called browser best begin authentication attack arrival arrested arranged around approached applying apartment announced altucher allure allow ai aftermath advised advertisements adds address account access abilities 2023 1password

Marketing emails from paradigmpressgroup.com

View More
Sent On

19/10/2024

Sent On

19/10/2024

Sent On

19/10/2024

Sent On

18/10/2024

Sent On

18/10/2024

Sent On

17/10/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.