RECRUITMENT OF EMPLOYEES FOR REMOTE TASKS, EXPERIENCE IN THE FIELD OF SCAMS, AND SOCIAL ENGINEERING.

LukeKoke

Member
Messages
6
Reaction score
0
Points
1
58e22682-adc7-49b7-8f17-bd8b27a4233a.jpeg

A SET OF OPERATORS FOR REMOTE ENVIRONMENT MONITORING TASKS (ANDROID 13+)We are a technical group specializing in automating monitoring and data collection processes in specific environments. Due to the expansion of our business, we need disciplined operators to perform clear tasks on Android devices (version 13 and above).The essence of the work:You act as the "installer" and "primary integration supervisor". We provide you with a specialized tool (an artifact .apk), which you deliver and activate in the target environment at a strictly designated time. Next, you confirm the success of the implementation, after which our tool begins to perform its inherent functions of analyzing the environment and collecting information.Requirements for the candidate:• The ability to provide direct physical or remote (through social engineering) access to the target device for a one-time file installation.• Punctuality, ability to follow the terms of reference clearly.1. Your key task is to implement:You deliver the file to the target system and ensure its installation. The method of delivery (message, mail, or other) remains at your discretion and falls within your area of responsibility.2. Confirmation and getting started:After installation, you inform us. We check the status of the instrument's connection to our control panel (the "tapped/did not tap" tell-tale) and provide you with a report on the initial integration.Next, the tool automatically performs a sequence of actions to obtain stable access: bypassing screen locks, obtaining the necessary system permissions, temporarily neutralizing the built-in protective mechanisms to maintain viability.After that, the phase of passive monitoring of user activity in target applications begins for subsequent automated data collection.We offer a clear work plan, technical support at the implementation stage, and payment for successfully completed tasks. If you understand the essence of the work, appreciate accuracy and are looking for an opportunity for remote technical earnings, leave a response.Contact: TOX, Jabber, Telegram.
There is a rep on the neighboring forums.
 
Last edited:
16da1d54-7ecb-4995-aa59-2f917f601faf.jpeg
THE SET IS OPEN
We need hands. Not brains. The victim's phone (android 13+) The bottom line: we install a one-time loader, get a remote VNC, wait for the trigger (opening a bank / crypto wallet), and dump the session.What we give:— A custom APK generator for your case (name, icon, HTML decoy).— A panel for monitoring online bots (tracking: installed/not, VNC access, action log).— Auto-scripts to bypass the lock screen and Google Protect (requires manual confirmation on the device).What do you give:— Access to an unlocked phone. The exact data to generate (apk name, link to the phishing page).— A communication channel (no one likes mutes).Finance: the percentage of the successful automatic collection after the trigger. No advances. Input: two words about previous experience (enough of "setting RAT's") and your TG to check. Next, a briefing and a test assignment.We don't read the lyrics.Dump is also available to make your work easier. DON'T WASTE YOUR TIME, IT'S TIME TO EARN!
 
Top