LIKE THE POST TO UNLOCK
[ Hidden Content! ]
1. Obtaining UK Business Email Leads
To begin, acquire UK business email leads from target sectors such as export, manufacturing, wholesale, production, and suppliers. The first goal is to obtain these leads without disclosing the true intent behind the request. Ask discreetly for industry-specific business leads in selected countries, without revealing your ultimate purpose.
2. Sending Generic Emails
Craft a generic email to be sent to the acquired leads. The email should express interest in using their company in the near future and request more information regarding pricing. Use the following template:
Subject: Inquiry Regarding Pricing
Good Afternoon,
I have been examining your company and I am interested in potentially utilizing your services. Could you kindly provide more information about your pricing? It would be helpful to receive a brochure or a list of pricing options for clarity.
Thank you, and I look forward to hearing from you soon.
Kind regards,
[Your Name] (Director)
[Your Company Name] LTD Website: http://www.website.com
[Insert Logo]
Note: Basic knowledge of spamming techniques is required for this step. Ensure that you do not use cracked accounts, as it is important to maintain open communication with the suppliers.
Once replies are received, respond with a thank you message:
Subject: Appreciation for Your Response
Good morning,
Thank you for your swift response. I will be in touch shortly and look forward to the possibility of working together.
Best regards,
[Your Name] (Director)
[Your Company Name] LTD Website: http://www.website.com
[Insert Logo]
Move on to the next step once all replies have been acknowledged.
3. Social Engineering
Wait for 2-3 working days and send a follow-up message to the suppliers who were promised a response:
Subject: Purchase Order Confirmation
Good afternoon,
After reviewing your pricing and products, I am pleased to inform you that I will be sending a purchase order shortly, once I confirm with my team.
Warm regards,
[Your Name] (Director)
[Your Company Name] LTD Website: http://www.website.com
[Insert Logo]
4. Sending a Purchase Order
After an additional waiting period of one to two days, send a purchase order (PO). At this stage, there are two methods to consider:
Method A: Attach a .doc or .pdf file as a "SILENT FUD EXPLOIT." This file contains a botnet virus designed to steal passwords and logins. Expert coding skills are required to create a fresh silent FUD exploit.
Method B: Create an Excel or Word scampage that requests an Office365 login to view the PO. To implement this method, you will need a cPanel, dedicated hosting, and coding expertise. Ensure that the scampage has antibots features and is undetectable. Test its detectability on https://mxtoolbox.com/blacklists.aspx.
Inform the suppliers that you have sent the purchase order and eagerly await their response.
5. Monitoring Emails and Spoofing Payment Requests
Now that you have access to their emails, monitor their communications, particularly payment requests (PR). Wait for a substantial order of Β£100k or more. Respond to their emails using the same practices that the company would typically employ, but include the details of your drop account. Delete the emails from their system and follow up with a spoof email.
6. Cashing Out
After successfully receiving payment, cash out the funds. Due to the nature of this method, you may have more time to complete the cash-out process compared to a regular account hijacking job. It is crucial to execute the cash-out process properly to avoid detection. To cash out, refer to my previous tutorial on opening UK Business Banking Accounts, which should be linked to a crypto exchange.
https://paste.link/kingdom
To begin, acquire UK business email leads from target sectors such as export, manufacturing, wholesale, production, and suppliers. The first goal is to obtain these leads without disclosing the true intent behind the request. Ask discreetly for industry-specific business leads in selected countries, without revealing your ultimate purpose.
2. Sending Generic Emails
Craft a generic email to be sent to the acquired leads. The email should express interest in using their company in the near future and request more information regarding pricing. Use the following template:
Subject: Inquiry Regarding Pricing
Good Afternoon,
I have been examining your company and I am interested in potentially utilizing your services. Could you kindly provide more information about your pricing? It would be helpful to receive a brochure or a list of pricing options for clarity.
Thank you, and I look forward to hearing from you soon.
Kind regards,
[Your Name] (Director)
[Your Company Name] LTD Website: http://www.website.com
[Insert Logo]
Note: Basic knowledge of spamming techniques is required for this step. Ensure that you do not use cracked accounts, as it is important to maintain open communication with the suppliers.
Once replies are received, respond with a thank you message:
Subject: Appreciation for Your Response
Good morning,
Thank you for your swift response. I will be in touch shortly and look forward to the possibility of working together.
Best regards,
[Your Name] (Director)
[Your Company Name] LTD Website: http://www.website.com
[Insert Logo]
Move on to the next step once all replies have been acknowledged.
3. Social Engineering
Wait for 2-3 working days and send a follow-up message to the suppliers who were promised a response:
Subject: Purchase Order Confirmation
Good afternoon,
After reviewing your pricing and products, I am pleased to inform you that I will be sending a purchase order shortly, once I confirm with my team.
Warm regards,
[Your Name] (Director)
[Your Company Name] LTD Website: http://www.website.com
[Insert Logo]
4. Sending a Purchase Order
After an additional waiting period of one to two days, send a purchase order (PO). At this stage, there are two methods to consider:
Method A: Attach a .doc or .pdf file as a "SILENT FUD EXPLOIT." This file contains a botnet virus designed to steal passwords and logins. Expert coding skills are required to create a fresh silent FUD exploit.
Method B: Create an Excel or Word scampage that requests an Office365 login to view the PO. To implement this method, you will need a cPanel, dedicated hosting, and coding expertise. Ensure that the scampage has antibots features and is undetectable. Test its detectability on https://mxtoolbox.com/blacklists.aspx.
Inform the suppliers that you have sent the purchase order and eagerly await their response.
5. Monitoring Emails and Spoofing Payment Requests
Now that you have access to their emails, monitor their communications, particularly payment requests (PR). Wait for a substantial order of Β£100k or more. Respond to their emails using the same practices that the company would typically employ, but include the details of your drop account. Delete the emails from their system and follow up with a spoof email.
6. Cashing Out
After successfully receiving payment, cash out the funds. Due to the nature of this method, you may have more time to complete the cash-out process compared to a regular account hijacking job. It is crucial to execute the cash-out process properly to avoid detection. To cash out, refer to my previous tutorial on opening UK Business Banking Accounts, which should be linked to a crypto exchange.
https://paste.link/kingdom
Please consider supporting me by liking the post π
Not ratedThis leak has not been rated yet, be careful when downloading.
π
ββββββββ