40 Crypto Platforms, One Script? Suspected Telegram-Driven Scam Network Built on Cloned Brands and Rotating Domains
FinTelegram has received a whistleblower tip alleging a coordinated network of roughly 40 crypto/investment platforms using Telegram and WhatsApp “mentors” to recruit victims, simulate profits, and then block withdrawals through escalating fee demands. Our initial review found multiple clusters of domains with strikingly similar structures, recycled narratives, and near-identical content—raising serious questions about a centralized operation behind rotating brands.
The Whistleblower’s Alert
A whistleblower recently contacted FinTelegram, providing an extensive Excel list of approximately 40 crypto trading platforms allegedly operating under the exact same fraudulent structure. According to the informant, these are not isolated cases but rather a highly organized syndicate designed to systematically drain victims’ funds while maintaining continuity through rapid domain changes.
Our preliminary checks into platforms on the list—such as Prometheus Investment Alliance, ProfitShock Investment Alliance (link), LEXINOVA Trading Center, and Quantum Vault Trading Center—immediately triggered massive red flags. The websites share near-identical texts, backend structures, and operational behaviors.
Key Findings: The Anatomy of a Mass Deception
Based on the whistleblower’s data and our initial research, this network operates on a strict, ruthless playbook:
Social Engineering via Messengers: Recruitment happens exclusively in private Telegram and WhatsApp groups that disguise themselves as “professional trading communities” or “investment alliances.”
The “Mentor” Trap: Fraudsters pose as experienced “analysts” or “professors,” guiding victims through staged trades and urging them to deposit into affiliated platforms.
Artificial Dashboards: The platforms project the illusion of high returns. The rapid, artificial profits displayed on internal dashboards are nothing but manipulated numbers designed to build false trust.
Escalating Deposits & Extortion: Once initial trust is established, the pressure to deposit more escalates. When victims attempt to withdraw funds, they face sudden hurdles.
The Advance Fee Fraud Exit: Withdrawals are blocked until the victim pays arbitrary “verification fees,” “tax obligations,” “compliance deposits,” or “VIP account upgrades.” Even if paid, the funds are never released.
SEO Reputation Scrubbing: The network deploys coordinated reputation management, flooding search engines with automated spam pages (e.g., heavily manipulated “B1 Reviews” found on hijacked domains) to bury negative feedback and serve as “proof of legitimacy” in their chat groups.
A large sub-group (many web. subdomains) loads the same JavaScript-only shell page with the same fallback text, including “Loading resources” and “Please wait patiently.”
Several “Investment Alliance” domains (e.g., ProfitShock, Miqesia, Eramls, Acenix, Searel, Atrish, Scatil) show near-identical page structures and text blocks, including the same menu pattern and “Super Brain Lifeform” language.
Analysis & Interpretation: The “Scam-as-a-Service” Model
Our research strongly supports the hypothesis that this is a highly organized, heavily industrialized fraud network. The use of dozens of nearly identical websites indicates the deployment of “White Label” scam templates.
These platforms act as digital Potemkin Villages. The trading charts, rising candles, and accumulated wealth are entirely fictitious. The “Mentors” act as psychological handlers, utilizing a technique commonly known as “Pig Butchering”—fattening the victim with fake profits and trust over weeks before the final slaughter, where the account is frozen.
The most insidious element is their sophisticated use of SEO manipulation. By spamming search results with fake positive reviews and “guides,” the scammers successfully trick novice investors who try to perform due diligence. Furthermore, the constant rotation of branding and domain registrations (from Alliance to Center to Exchange) shows a calculated effort to outrun law enforcement and regulatory warnings. Already, platforms like Prometheus Investment Alliance are surfacing in fraud alerts in Europe, confirming the whistleblower’s urgent warnings.
Domains Grouped by Suspected Template Cluster
Suspected ClusterIndicative Pattern / NotesDomains (from Excel list)A. JS Loader / Web Subdomain “Exchange Shell” ClusterMany web. subdomains with similar JS-heavy loading screens (“Loading resources / Please wait patiently”), likely front-end shell or gated app entry points.web.pulsesun.com, web.liexs.com, web.beuce.com, web.ksaok.com, web.chobes.org, web.ktrowe.com, web.zeaks.org, web.lexinova.com, web.emeraldwisdom.com, web.hightitan.com, web.duralumen.com, web.qvtcoinese.com, web.wellingtonharborcap.cc, web.aixebit.com, web.yeahchain.comB. “Investment Alliance” Clone ClusterRepeated “Investment Alliance” branding logic, similar navigation/page architecture, near-identical marketing text blocks (including AI/brain/super-intelligence style wording).profitshock.com, miqesia.com, eramls.com, acenix.com, searel.com, atrish.com, scatil.comC. German-Language “Alliance” Variants (Probable Related Family)German-facing alliance sites with overlapping AI/quant/community framing; may be localized variants or adjacent template family.prometheus-alliance.de, tethys-alliance.deD. “Society / Academy / Community” ClusterEducation/community façade with institutional-style branding, AI/finance learning language, rewards/sweepstakes features, “society” naming.boilingpointsociety.com, harborstonesociety.com, oakstonesociety.comE. “Prosperity / Institutional Edition / Rewards” ClusterSimilar “Athena Institutional Edition / Personal Edition” menu logic and “white paper / participation / rewards” style trust framing.goldmanre.com, elitepalace.com, nalera.comF. “LucyAI / AI Trading / Global Markets” Promo ClusterSimilar hero messaging and AI-trading promo copy (“Driving Innovation in Global Financial Markets” / LucyAI-style narratives).eramix.com, mindzo.com, welcomeville.comG. Standalone / Unclear / Needs Deeper ReviewDomains not yet confidently mapped to a cluster from public landing-page checks alone; may be related through backend, payment rails, recruiter scripts, or shared assets.hjccoins.cc, gcgcgc.com, neoster.com, inningz.com, novacollfdn.com (listed twice in Excel), dualheart.com
This clustering reflects observable front-end similarities only (design, wording, page structure, and navigation logic). It does not yet prove common ownership or operator identity. FinTelegram’s next investigative steps will focus on recruitment channels (Telegram/WhatsApp), payment instructions, wallet clustering, support contacts, and withdrawal-obstruction scripts to determine whether these domains form a coordinated fraud network.
Extended Analysis
The most important finding is not merely visual similarity—it is operational similarity at the presentation layer. Several domain groups appear to be built around reusable trust-conversion templates: institutional-sounding names, white-paper references, “academy” or “alliance” branding, rewards framing, and AI-themed language designed to signal sophistication.
This matters because rotating domains and re-skinned brands are common risk indicators in organized online investment scams. If one domain becomes exposed, another can replace it while preserving the recruitment funnel, the script, and the psychological onboarding process. The whistleblower’s allegations about coordinated reputation management (e.g., strategically placed positive forum threads used as “proof” inside messaging groups) are also plausible within this framework and deserve deeper evidence-based investigation.
At this stage, FinTelegram is not making final attribution to specific beneficial owners or legal entities. However, the website-level similarities are strong enough to justify a public alert and a structured evidence call. The key next step is to connect the front-end brands to payment rails, wallet addresses, Telegram recruiters, and withdrawal obstruction patterns.
WARNING: Protect Your Assets
If you are currently participating in a WhatsApp or Telegram group where a “mentor” or “analyst” is directing you to trade on an unfamiliar platform—STOP ALL ACTIVITY IMMEDIATELY. Do not deposit any further funds. Under no circumstances should you pay any “taxes,” “compliance fees,” or “withdrawal deposits.” Legitimate financial institutions and exchanges simply deduct necessary fees directly from your account balance; they will never ask you to send fresh crypto to unlock your existing funds. Any demand for an upfront fee is the final stage of the scam.
Call to Action: We Need Your Information!
The scale of this operation suggests millions of dollars are being laundered through this network. To disrupt this syndicate and help authorities trace the stolen funds, FinTelegram requires more data.
If you are an investor, a victim, or even an insider with knowledge of this network, please come forward. We need:
Wallet Addresses: Where were you instructed to send your USDT/BTC?
Chat Logs & Screenshots: Evidence of the “Mentors,” their phone numbers, and their instructions.
New Domain Names: Any new platforms that look or act similarly to the ones mentioned above.
Please submit your information, documents, and experiences anonymously via our whistleblower platform, Whistle42. Your information is crucial to mapping this network, issuing targeted warnings, and assisting law enforcement in tracking down the operators behind the curtain. Don’t let them move on to their next victim—report them today.
Share Information via Whistle42
Read More