**Scam Campaign Report: FBI Impersonation and Relief Check Fraud Network** This cybersecurity investigation has identified a sophisticated fraud campaign that combines FBI impersonation tactics with fraudulent relief check schemes, operating through a network of 9 connected entities. The campaign centers around the domain usa.com, registered with Register.com Inc. in 1999, which serves as the infrastructure hub for multiple fraudulent operations. Phone number 862-955-2836 is directly connected ...
862-955-2836
Last reported Apr 21, 2026
- 2 community reports from users
Campaign Intelligence
This cluster centers on 2451 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include cdn.discordapp.com, 91.92.241.152, 91.92.240.222, 158.94.208.174, 178.16.52.44, 158.94.211.102, 158.94.210.93, 158.94.208.52, i.postimg.cc, s3.us-east-2.amazonaws.com, storage.googleapis.com, 178.16.52.18, 158.94.211.101, 158.94.211.100, local-host.life, dropmefiles.com, limewire.com, 62.60.226.159, id8965.com, valfanto.com and 2431 more. 633 of these domains have been flagged by threat int...
This cluster centers on 1486 connected domains tagged as AgentTesla, None, js. The domains include i.postimg.cc, cdn.discordapp.com, s3.us-east-2.amazonaws.com, pastes.io, dl.dropboxusercontent.com, ltcexchange.bitparking.com, bitcoin.sipa.be, litecoinpool.org, cryptocoincharts.com, sigaintevyh2rzvw.onion, toremail.net, lelantos.org, www.sigaint.org, epjhlyfgxenf2q4o.onion~~, inocncymyac2mufx.onion, torbox3uiot6wchz.onion, 344c6kbnjnljjzlz.onion, mailtor.net, bscscan.com, securitized.io and 1466...
This cluster centers on 2957 connected domains tagged as GuLoader, NorthKorea, censys. The domains include salelegalsteroids.com, 192.210.186.208, gharnt.com, cloflart.com, id3702579photo-image-docs.com, www.almacensantangel.com, 64.95.12.162, blue-oceans.net, sixmexicos.com, baritonclick.online, 185.252.24.15, un1rw11q4u.com, ameyiando.com, niril.sbs, bursaelektriktamir.com, blankeyeo.com, umxtxhub.za.com, sunchernical.com, 18.194.67.137, servecdn.my and 2937 more. 606 of these domains have bee...
This cluster centers on 2107 connected domains tagged as GuLoader, NorthKorea, censys. The domains include storage.googleapis.com, cdn.discordapp.com, pastes.io, s3.us-east-2.amazonaws.com, dl.dropboxusercontent.com, 188.137.230.45, touchskins.io, 158.94.208.7, 74.0.32.149, 74.0.32.141, api.touchskins.io, 80.89.237.190, 188.137.254.207, api.wewpwsw.su, 188.137.229.136, 196.251.107.24, 104.194.152.180, link.storjshare.io, s3.g.s4.mega.io, 62.60.226.159 and 2087 more. 562 of these domains have bee...
This cluster centers on 2121 connected domains tagged as GuLoader, NorthKorea, censys. The domains include 59.182.90.199, 178.50.166.61, 113.168.249.76, 123.209.193.86, 113.165.6.38, 120.157.72.234, 171.235.194.253, 120.157.159.171, 37.142.77.163, 46.124.33.133, 46.124.40.3, 83.224.151.243, 88.86.246.233, 41.146.1.154, 59.182.119.128, 14.236.247.68, 120.157.72.59, 95.127.248.192, 116.110.179.199, cdn.discordapp.com and 2101 more. 576 of these domains have been flagged by threat intelligence feed...
This cluster centers on 1630 connected domains tagged as BABADEDA, pw-2026, wsh. The domains include storage.googleapis.com, cdn.discordapp.com, implementing-theft-metal-justin.trycloudflare.com, staying-heavily-meaning-blowing.trycloudflare.com, creations-venture-traditional-stainless.trycloudflare.com, arilprivate.storexyz.web.id, 206.123.145.26, 103.125.219.204, 45.87.43.154, 10cricofficial.com, justwatch.life, 195.16.44.75, advise-visual-playstation-closer.trycloudflare.com, 91.92.241.197, 6...
This cluster centers on 2141 connected domains tagged as GuLoader, NorthKorea, censys. The domains include 59.182.90.199, 91.80.129.100, 123.28.175.23, 120.61.247.2, 178.50.166.61, 113.168.249.76, 123.209.193.86, 113.165.6.38, 120.157.72.234, 171.235.194.253, 120.157.159.171, 37.142.77.163, 171.241.208.124, 120.157.229.220, 171.117.30.233, 91.80.136.9, 46.124.33.133, 46.124.40.3, 83.224.151.243, 88.86.246.233 and 2121 more. 596 of these domains have been flagged by threat intelligence feeds incl...
This cluster centers on 2559 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include 83.224.148.34, 14.236.247.68, 120.157.72.59, 95.127.248.192, 116.110.179.199, 116.101.73.68, 95.127.250.241, 152.173.199.182, 91.80.129.100, 59.88.45.188, 117.216.5.20, 182.60.11.164, 41.146.14.165, 120.157.46.38, 59.182.90.199, 113.168.249.76, 78.132.114.25, 171.241.208.124, 120.157.229.220, 14.236.84.25 and 2539 more. 640 of these domains have been flagged by threat intelligence feeds inc...
Details
Linked Company Activity
Connected Entities
Linked Companies
Remit Corporation
reported togethercompanyUnited Group Inc.
reported togethercompanyPENTAGON FEDERAL CREDIT UNION
campaign co-membercompanyFIFTH THIRD FINANCIAL CORPORATION
campaign co-membercompanyCredit Services Corporation, LLC
campaign co-membercompanyIntegrity Group Inc
campaign co-membercompanyDirect, Inc
campaign co-membercompanyThe Bureaus, Inc.
campaign co-membercompanyEVERBANK, NATIONAL ASSOCIATION
campaign co-membercompanyTime Investment Corporation
campaign co-membercompanyCheckr, Inc
campaign co-membercompanyMOUNTAIN AMERICA FEDERAL CREDIT UNION
campaign co-memberRelated Phone Numbers
8553572202
campaign co-memberphone3186669555
campaign co-memberphone8667715844
campaign co-memberphone8339086865
campaign co-memberphone8009220204
campaign co-memberphone4097617631
campaign co-memberphone6789998212
campaign co-memberphone6512042449
campaign co-memberphone5187704680
campaign co-memberphone8887291403
campaign co-memberphone8889194623
campaign co-memberphone9805107108
campaign co-memberphone7712473445
campaign co-memberphone5858247925
campaign co-memberphone8009993355
campaign co-memberphone8007715361
campaign co-memberphone8009033637
campaign co-memberphone8884260179
campaign co-memberphone2025582508
campaign co-memberphone9297499563
campaign co-memberphone3025417253
campaign co-memberphone8887910954
campaign co-memberphone8334471291
campaign co-memberphone7656119812
campaign co-memberRelated Domains
usa.com
reported togetherdomain130.12.180.43
campaign co-memberdomainimplementing-theft-metal-justin.trycloudflare.com
campaign co-memberdomainstaying-heavily-meaning-blowing.trycloudflare.com
campaign co-memberdomaincreations-venture-traditional-stainless.trycloudflare.com
campaign co-memberdomain103.125.219.204
campaign co-memberdomain206.123.145.26
campaign co-memberdomainarilprivate.storexyz.web.id
campaign co-memberdomain14.236.182.73
campaign co-memberdomain83.224.162.132
campaign co-memberdomain123.31.81.229
campaign co-memberdomain120.157.56.105
campaign co-memberRelated Emails
fbi.gov0012@usa.com
reported togetheremaildiana@ierek.com
campaign co-memberemailcfjtfl@verxl.com
campaign co-memberemailcbx-df@ceszx.com
campaign co-memberemailj.thompson8822@ymail.com
campaign co-memberemailbb.adige@libero.it
campaign co-memberemailhr@teknfix.com
campaign co-memberemailpangmyiuhk@yahoo.co.jp
campaign co-memberemailmarydavis09@zoho.com
campaign co-memberemailidentity@varomoney.com
campaign co-memberemailservicename@nickname.tld
campaign co-memberemailxxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grupoaldama.com.mx
campaign co-memberCommunity Reports
FBI scam came in today. Info in post Go nuts FBI OFFICE <"fbi."@space.ocn.ne.jp> Federal Bureau Of Investigation Headquarters Washington Dc. Building 935 Pennsylvania Ave. NW WASHINGTON, D.C. 20535-0001 E-Mail: fbi.gov0012@usa.com NOTICE OF ONGOING INVESTIGATION Attn Recipient: This is agent Josh, we were sent by the Acting Director of Federal Bureau of Investigation (Andrew G. McCabe), and we are currently in Africa as an FBI / United States delegate that have been delegated to investigate foreign transactions going on in Africa. Be informed that during our investigations we found out that there is a total amount of $2.5 Million dollars that has been assigned in your name as the beneficiary but the office who are in position to remit your fund seized it for their own selfish interest, they are fraudsters who’s interest is to extort money from you in the name of the transfer, We have to inform you that we have arrested some men in respect of this delayed overdue fund. We have limited time to stay here so we advise your urgent response Do not disclose this development to anyone to avoid jeopardizing with our investigation because we want to arrest most of these fraudsters and bring them to law. I will be expecting your swift respond as we have instructed the bank where your fund was deposited to issue a certified check once we reconfirm your full details to them; you are to reply back with below details. Full Name: Address: Country: State: Zip code: Cell Phone: Age: Occupation: In future if you receive any email/text massage or if you are already in communication with any person in regard to this kindly forward their details to us for proper investigation. In case if found this message in spam folder, it could be due to your Internet Service Provider, ISP. So kindly move to your inbox before replying. Regards, Jackson Josh International Banking Unit 862 955-2836
FBI scam came in today. Info in post Go nuts FBI OFFICE <"fbi."@space.ocn.ne.jp> Federal Bureau Of Investigation Headquarters Washington Dc. Building 935 Pennsylvania Ave. NW WASHINGTON, D.C. 20535-0001 E-Mail: fbi.gov0012@usa.com NOTICE OF ONGOING INVESTIGATION Attn Recipient: This is agent Josh, we were sent by the Acting Director of Federal Bureau of Investigation (Andrew G. McCabe), and we are currently in Africa as an FBI / United States delegate that have been delegated to investigate foreign transactions going on in Africa. Be informed that during our investigations we found out that there is a total amount of $2.5 Million dollars that has been assigned in your name as the beneficiary but the office who are in position to remit your fund seized it for their own selfish interest, they are fraudsters who’s interest is to extort money from you in the name of the transfer, We have to inform you that we have arrested some men in respect of this delayed overdue fund. We have limited time to stay here so we advise your urgent response Do not disclose this development to anyone to avoid jeopardizing with our investigation because we want to arrest most of these fraudsters and bring them to law. I will be expecting your swift respond as we have instructed the bank where your fund was deposited to issue a certified check once we reconfirm your full details to them; you are to reply back with below details. Full Name: Address: Country: State: Zip code: Cell Phone: Age: Occupation: In future if you receive any email/text massage or if you are already in communication with any person in regard to this kindly forward their details to us for proper investigation. In case if found this message in spam folder, it could be due to your Internet Service Provider, ISP. So kindly move to your inbox before replying. Regards, Jackson Josh International Banking Unit 862 955-2836
Share Your Experience
What's Your Exposure?
Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.