I feel now that I have the necessary proof to out the wickedfire member who has been logging into my PPV accounts and spent $xxxx of my money sending traffic to maliscious urls which download and install some kind of trojan on the visitors PC.
On May 10th I discovered I was getting some notifications for deposits into my Traffic Vance account being made with credit cards I didn't recognise. So I logged into my Traffic Vance account and immediately noticed that about $500 of my spend had been depleted sending traffic to a maliscious url. I immediately contacted Jonathan Vogel over at TV and showed them what I was seeing at my end and they suspended my account pending an investigation into who had done it.
Seems the person slipped up and used an IP address they had also used to access their legit account and so TV were able to let me know exactly who the person was. Heres the email I recieved
Hello
My techs have run an investigation and it looks like James Pardoe from Zen Tech media logged into your account.
Do you know him? Why would he have your password.
There have been no hacks in Trafficvance outside of this claim.
Best,
[removed contact information -- however it has been verified by us to be legitimate]
FUTURE ADS LLC
This person is also known as the user xentech on this forum. About a year ago I asked this person, who I also know from another forum to build me a script, he asked for server access for my hosting and the password was the same as the password for all my traffic accounts (my bad). We also spoke about the fact I was driving traffic via the above sources so I guessed he thought he'd try his luck and see if the same passwords worked for my traffic accounts. Obviously they did and this cunt has caused me no end of trouble in costs and hasstle.
When I confronted him over it he stronly denied it saying his computer has been hacked also and his traffic accounts had been hacked also.... BULLSHIT. Funny how the hacker managed to get my username and passwords and then use your PC with your ip address to access my account?
I suggest anyone that works with this person on any kind of project where he has access to your servers, beware.
On May 10th I discovered I was getting some notifications for deposits into my Traffic Vance account being made with credit cards I didn't recognise. So I logged into my Traffic Vance account and immediately noticed that about $500 of my spend had been depleted sending traffic to a maliscious url. I immediately contacted Jonathan Vogel over at TV and showed them what I was seeing at my end and they suspended my account pending an investigation into who had done it.
Seems the person slipped up and used an IP address they had also used to access their legit account and so TV were able to let me know exactly who the person was. Heres the email I recieved
Hello
My techs have run an investigation and it looks like James Pardoe from Zen Tech media logged into your account.
Do you know him? Why would he have your password.
There have been no hacks in Trafficvance outside of this claim.
Best,
[removed contact information -- however it has been verified by us to be legitimate]
FUTURE ADS LLC
This person is also known as the user xentech on this forum. About a year ago I asked this person, who I also know from another forum to build me a script, he asked for server access for my hosting and the password was the same as the password for all my traffic accounts (my bad). We also spoke about the fact I was driving traffic via the above sources so I guessed he thought he'd try his luck and see if the same passwords worked for my traffic accounts. Obviously they did and this cunt has caused me no end of trouble in costs and hasstle.
When I confronted him over it he stronly denied it saying his computer has been hacked also and his traffic accounts had been hacked also.... BULLSHIT. Funny how the hacker managed to get my username and passwords and then use your PC with your ip address to access my account?
I suggest anyone that works with this person on any kind of project where he has access to your servers, beware.
Last edited by a moderator: