- 1
- Messages
- 0
- Threads
-
0
- Rep
4 Years of Service
Anyone try this yet? This can't be real
- 9
- Messages
- 1
- Threads
-
0
- Rep
4 Years of Service
it worked! thanks a lot man!!!!! hopefully they won't patch it
- 9
- Messages
- 1
- Threads
-
0
- Rep
4 Years of Service
it worked! thanks a lot man!!!!! hopefully they won't patch it
- 9
- Messages
- 1
- Threads
-
0
- Rep
4 Years of Service
it worked! thanks a lot man!!!!! hopefully they won't patch it
- 36
- Messages
- 0
- Threads
-
0
- Rep
4 Years of Service
:NotStonks: :NotStonks: :NotStonks: :NotStonks: :CatRee: :CatRee: :CatRee: :CatRee:
- 9
- Messages
- 1
- Threads
-
0
- Rep
4 Years of Service
:NotStonks: :NotStonks: :NotStonks: :NotStonks: :CatRee: :CatRee: :CatRee: :CatRee:
- 5
- Messages
- 0
- Threads
-
0
- Rep
4 Years of Service
In reality,the Tampermonkey script changes the Bitpay wallet address on the G2A checkout page with the BTC address of the creator of that script(the scammer).The victim sends BTC to the scammers address and expect an automatic refund from G2A,but such refund never happens and the BTC are gone...
I don't want to post links here,but you can search Youtube for "G2A refund" and there are a bunch of videos about this "exploit". Usually the videos have more likes than dislikes and lots of fake sounding bot comments,about the script "working perfectly".
The Tampermonkey scam script has several names- "G2A refund glitch","timezone exploit","G2A exploit".
BEWARE PEOPLE, IT'S SCAM!