You are on page 1of 14

CASE INVESTIGATION REPORT

POLICE
DEPARTMENT
Complainant : Bagus Jatmiko
Address : 2017 Leidig Rd,
Monterey, CA, 93940,
United States
Date : 11-03-2023

PREPARED BY:
Claim Justice
Cybercrime & Crypto Investigation Dept.

US: +1 888-316-1175 IL: +972 3-763-0987


CA: +1 855-951-2884 AU: +61 2-5601-9018
UK: +44 808-258-0027 SW: +46 20 12 76 40

Carlebach 7, Tel Aviv-Yafo, Israel


www.claim-justice.com
URGENT REQUEST
These wallet addresses in the below-named exchanges have been identified as
being part of a fraud against myself, therefore I urgently request that you
identify the criminal/s that the listed addresses belong to. These cyber-criminals
completed the required KYC process when onboarding the platform where they
ultimately hid my stolen cryptocurrency.

We urgently require that you request from the below listed exchanges to
immediately freeze the funds in these accounts by warrant or subpoena. The
source of these funds is connected to this fraud case as shown above making
this an attempt to money launder the stolen funds or in the worst-case scenario
to assist terrorism.

We also expect that you identify and freeze any other account belonging to
these criminals until your investigation proves that the stolen funds should be
returned to me

2
CASE SUMMARY
My name is Bagus Jatmiko. I know the perp2 from a chat group in the
Discord Apps, we chat and then she told me about having a financial freedom
in the volatile Crypto investment, and she told me about a platform that can
get the interest of lending crypto without the fund being transferred outside of
the personal wallet. Shen then introduced me to the Defi-loan.net platform, at
first, I tried deposit minimum of 1,000 USDT and gain small amount of ETH
every day in accordance to the percentage. What made me believe that the
fund cannot be taken without the 12 secret phrase of the wallet, so that is why
I feel more secure with this type. And then since I am starting to be convinced
with the security, I begun to add the fund within to get bigger interest until
the point of 10,000USDT. At that point in the platform suddenly it shows a
button saying ETH Bonus, I press the button thinking that the button is the
beginner bonus that they always distributed if a beginner reached certain level
in the investment. And I saw that the standard is still manageable by my fund
which is 9,898 USDT while my fund is 10,000 USDT. So I think I can get the
bonus. When I pressed the button, it takes time to process the apply. The next
day suddenly, all of my fund in the wallet is swiped out to another account
which they said as a liquidity pool that similar to a staking pools with a 7
days’ period. The standard then changed to 30,000 USDT which is much
higher than the time I pressed the ETH bonus button. I can’t afford to pay that
amount since I don’t have any more money in my wallet nor in my real bank
account. I asked them if I don’t fill the standard within the period of 7 days.
They answered after that period I will be charged of a breach of the ‘smart’
contract of 1% per day out of the fund which is about 100 USDT per day or
approximately $100 per day which is very high for me. From there I am
convinced that this is just another scam that luring people into a perceived
real investment, but it turned out to be another type of Fraud. It lets people
seems to enjoy their daily profit until one point they think they can get bonus
that looks like a staking profit, but then it gets you to very high standard to
reach. It is 3 times the fund that we have in the wallet. And they can breach
the wallet without any notification. They said by connecting the wallet to the
platform, it means that I already approved their access to the wallet. Which is
never said earlier.

I know the perp1 from a chat group in the Kwik Brain Apps, we chat and then
she told me about having a financial freedom, and she contacted me in
Telegram Apps (all conversation are downloaded and attached). She then
promoted the first platform (CFSL) and ask me to try the platform, and then I
tried to invest small amount in which leads me to invest more amount for the

3
reason of the high return of the investment. I, in fact, get to the highest pack
before suddenly they just disappeared. From the big group then I found that
they have changed the management and new ownership therefore they have to
move all of the accounts to the new platform. There is where I contacted the
admin of the group (telegram chat attached of Admin 1 and 2). The new
Platform said was located in Australia which was in the UK before. Hence,
they has to follow Australian tax regulation for crypto in which I have to pay
some amount of taxes to avoid fine within time limit. When I finally paid for
the tax (exceeding their mentioned time limit – I think it was 3 days’ time
limit). I have to pay another fee to re-activate the account and to put the
account back into rolling for an administrative reason. After that point I just
fed up and abandon the platform. Since I did not know how to claim or
recover the crypto fund. I just submit an anonymous report to the FTC (Free
Trade Commission) website but not to the law enforcement.

Event timeline
DESCRIPTION DATE
First date of Transaction 02/27/2022
Last date of Transaction 10/25/2022
Client onboard with Claim Justice 10/28/2022

OBJECTIVES

 Identification, tracking and recovery of stolen digital assets conspired and

unlawfully acquired by cybercriminals.

4
INCIDENT INFORMATION
Name Scam 1 - CFSL - Cairo Miners - Alliance growth
miners & Scam 2 - Defi-loan.net
Exchange used Scam1 - Coinbase, Trustwallet. Scam-2 -
Trustwallet
Website
Cryptocurrency BTC, USDT
Lost cryptocurrency Approx. BTC 0.41377088, USDT 13421.65816
Lost amount (USD) $ 23000.00

METHODOLOGIES USED
TRACKING STOLEN CRYPTO CURRENCY AND IDENTIFYING CYBER
CRIMINALS

Our crypto-forensic investigations tracing solution is also used by law

enforcement to investigate suspects of cyber-crime in the crypto economy and

track stolen funds.

We track specific crypto addresses, transactions, and entities, and investigate

links to real-world bad actors.

Claim Justice’s crypto forensics investigators are savvy at scrupulously tracing

and mapping activity on blockchains and figuring out.

5
In some cases, we use de-anonymization tools to identify and trace criminals.

who attempt to use these stolen cryptocurrencies —the leading cryptocurrencies

including ER20s.

In this way, we were able to tracked and traced funds being transferred to other

exchanges and wallets.

6
OPEN-SOURCE INTELLIGENCE (If
applicable)
In efforts to address crypto currency crime, we examine the intersection of illicit

crypto activity and online publicly available information. By deploying open-

source intelligence to collect and analyze data across the broadest data set

possible, we developed a complete picture of crypto currency crime, threat

actors and their networks.

Open-source intelligence is uniquely placed to support crypto investigations,

providing valuable insights into hidden sources of data, situational awareness

and anticipatory intelligence and can be deployed to automatically filter and

analyze masses of data to uncover:

 Mentions of public crypto keys

 Threat actors including either organized criminal groups or extremist

groups

 Transitions from online platform to platform and crypto exchange to

crypto exchange

Claim Justice leverages AI-enabled risk analytics alongside advanced data

collection capabilities to help intelligence teams rapidly identify the most

relevant data and uncover valuable insights.

7
 Email Address/Business Email :
 Phone Number/Virtual phone number :
 Website/Link/URL :
 Crypto addresses :
 IP Address :
 Any Social Media platform profile :
 Deep web/dark web URL :
 Company/Organization :

8
FINDINGS
LIST OF EXCHANGES WHERE SUSPECTED CRIMINAL HID THE STOLLEN
FUNDS
Below are the list of addresses traced and tracked to be storing my stolen funds
in specific exchange which is also provided herein:
Bitkub
Whitebit
Binance
UNISWAP
Obiex.com
Cli Tran Sca Tran Wa Tran Wa Tran Wa Tran Wa Tran Wa Tran Wa Tran Wa Tran Wa
ent sacti m sacti llet sacti llet sacti llet sacti llet sacti llet sacti llet sacti llet sacti llet
Fu on ID me on on on on on on on on
nds r ID ID ID ID ID ID ID ID
Wa
llet
(s)
Tru 0x6d 0x1 0x19 0x 0x6fa 0x3 0x3d 0xf 0xdc 0x3 0xf65 0x7 0x22 0xa
stw 81f10 055 18ef0 D0 347f5 416 551c e50 72d6f 416 1d26 a0E 60e2 972
alle b985 39f 44a7 A6 cf7a3 cF6 a38a 1e0 c444 cF6 9027 4d 9915 231
t 370ca 3a2 8752 65d 82f31 C70 8cf00 dd0 4da3a C70 212a AA e561 e2b
2553 539 2685 5a9 daf4a 8Da f85c2 a22 ac280 8Da bf4f6 Fb4 2b0f9 87c
aa5f8 1C 84b6 76E a301 44 f9dcd Be5 5922f 44 6e36 66e 027f8 218
407fd 613 af7c4 Ec5 9674 DB 1a06 0b6 b527 DB 8a53 9f7 c8c8b 650
d677 507 dc07 375 a720 262 3a03 322 6702 262 86a7e B14 9ab7 281
b2bbf 010 26f84 f3d a257 4D 722c 8f0 8191 4D eff30 cc9 55d9 A6
5db2 513 800a b40 88dd 63e 79c8 5D 0ffb0 63e e45f1 365 1c4a5 B9
8ae9a ebE 2ee59 F11 e887 a0A e5ac9 467 ac05e a0A ce450 eD7 5b99 46
28da 017 89cb 6A 1c0e Aef 77c4 4E2 7223 Aef d1def 04C c9a02 A1
1850 15 2a4e2 EB bd6f9 711 5c97 481 08b1 711 0733 18f 2c27 C3
0328 Ea5 f1244 417 eaef9 352 86fb5 6EF 33c4 352 7e15 e8b 46f07 628
4ad0 f3 efb2 94E 9d8 7C6 ee80 4 336a 7C6 d60 06 35bb FA
13 8 867

9
0x 10.24 10.25 10.25 UN 10.28 10.25 UN 10.25 10.25 Bin
A1 .2022 .22 .22 IS .22 .22 IS .22 .22 anc
309 WA WA e
F83 P P
892
01d
09
B2
A4
924
bd0
95a
2a8
c79
79E
3e
1007 2072 2072 swa 300,0 2500 swa 2000 1000
8.501 04 00 ppe 00 00 ppe 00 00
68 USD USD d USD USD d USD USD
USD T T US C C US T T
T DT DC
for for
US US
DC DT
0x4dd 0xD
85c9f 8f04
bf16d 0d1
7dbb1 e31
7de3f 706
21c68 829
07522 016
a880d 505
1fcee5 253
cf3f54 31c
090f7 AA
5185f 92C
0fc7 99A
852
11.7.2 Whi
2 tebit

10
Tru 0x77 0x1 0x21 0x 0x3b 0x7 0x9e 0x2 0xa7a 0xf 0xdc 0x3 0xb6 0xF 0xeb 0xf 0xa3 0xE
stw 348ec 055 a251 D0 e0be 858 0096 F68 a051 e50 72d6f 416 b658 ff6 93bf5 1b3 d544f Cc5
alle 003a 39f 4b5ac A6 03de E59 33c5 27f df6e6 1e0 c444 cF6 310fb b39 e85d De2 a376 70f
t 4768 3a2 89a5 65d 4a90 e0C ea05 a26 0042 dd0 4da3a C70 08cc7 77 548ea aBf 16ca0 06F
3847 539 28c4e 5a9 d614 01E 1fdd3 b3B c7d8c a22 ac280 8Da 088ac C8c 3f336 7c8 92c6f a2
b501 1C c25fc 76E 2b5a A0 f6959 221 a6bc1 Be5 5922f 44 5e02 4d 60b7 d53 09a3 A6
2571 613 701c Ec5 68c8 6Df c9c2 30 be5a7 0b6 b527 DB 8d0ca D9 b9ed C14 5ab6 a74
b2b5 507 d9bd 375 5f1e0 3aF 0eb6 A6 36f1f 322 6702 262 1860 697 589b C4 5fa5d 52F
79fa1 010 b5ac2 f3d 9af09 3D aaf17 2d4 a19b 8f0 8191 4D 9821 faB 78fc0 EF 9c8d 952
2a3f2 513 3e31 b40 c3dfd 20a 8ab5 d5E 814a 5D 0ffb0 63e c0c09 7B 080f1 FD 2ee7e B9
6b49 ebE 8e43 F11 ad68 C7 2940 420 0e5b 467 ac05e a0A 4e52a F01 7d79 C8 9d35 667
3485f 017 5eab6 6A e81f9 B00 a6be A1 8945 4E2 7223 Aef 57f40 0fE e8d0 B3 4947 BF
dfacb 15 aaf70 EB fdf1b 032 d914 73 c543 481 08b1 711 f69a3 6D b74ee C3 3188 104
951d Ea5 0e5ad 417 f7b63 75 ce61 A7 3444 6EF 33c4 352 3fdc2 0ae 9e75 C6 651b 35e
529e f3 b55 94E 6fd0 D4 3acba D6 0bf3 4 336a 7C6 b 412 5adc F65 27f37 14e
d 13 Bf b3 0A f7 d7e A
4 A
0x 10.26 10.26 UN 10.28 10.29 10.28 UN 10.28 10.29 10.30 Bit
A1 .2022 .22 IS .22 .22 .22 IS .22 .22 .22 kub
309 WA WA
F83 P P
892
01d
09
B2
A4
924
bd0
95a
2a8
c79
79E
3e
3343. 1943 swa 20000 30000 25000 swa 1000 1780 5600
1564 60 ppe 0 0 0 ppe 00 00 0
76 USD d USD USD USD d USD USD USD
US C C C US
USD T T T T
DT DC
T
for for
US US
DC DT

11
Total
of
96k
went
there
in
separ
ate
transa
ctions

Coi e55a2 bc1 3b33 bc1 12ce 3Qt


nba 8445 qg4 e112f qmf 86ed 9H
se 8f655 0l9 9070 t76r 9584 qu
f00b2 qhh 37ef7 9sl4 64dd NT
c464f lscc fd5fd 60q c05b UN
8ec7c 74c c692 q0v 3a54 qbti
801d cw 92ed 008 690c 82J
0761 cas b69e 5cw 8372 Yb
7fb6a hnj 35b9 36d 4994 EJa
718e enk 9848 65f 045b bk4
1e99 xsa a428 s8p 1138 Aq
70f4a tzm 5412f 9kk 034e 5z
60f54 l03 ddd3 w0j 8b0e Mp
354b f0d ed70a 6 1ca7 on
192 d935
b3bc
bc1 2.28.2 2.28.2 10.6.2 Obi
q44 2 2 2 ex.c
uqg om
nam
9fja
xw2
kw4
6c9
5c2
3px
rkq
xc5
m63
48

12
0.052 0.017 0.009
8 1 8
BTC BTC BTC
4526 16p
ec262 qZ2
c627 SA
7598 Tpr
9c9fd Bo6
1bd0 HS
ac51e 7vv
4f70a Bx
0994 Pne
baf29 wt
03fe1 Du
3ab0 vds
6a2e6 sp6
7fa35
3.1.2 Bin
2 anc
e
0.008
BTC

13
DOCUMENTATION
I have attached the necessary documentation that shows the path used by the
scammer/s as proof of the fraud perpetrated that caused the loss of my funds.

Addendum:
● Graphic mapping of the path used by the criminal that tried to hide the
stolen crypto currency.
● Clickable list of all the addresses and Hash transactions used by the
criminal.

SINCERELY,

Name : Bagus Jatmiko


EMAIL : gusmiko4701@gmail.com

14

You might also like