...

Deep Code

contact@decodecybercrime.com

From Social Engineering to Solana Drains: Tracking a Polish Crypto Scammer

From Social Engineering to Solana Drains: Tracking a Polish Crypto Scammer

A Polish crypto scammer has stolen over $2M since 2022 using a mix of social engineering, fake identities, and wallet-draining tactics.

  • Modus Operandi: Pretends to be a confused crypto beginner with a gambling problem, offering 20–50 SOL upfront to victims for help setting up wallets. During live calls (Discord, Zoom, Telegram), he tricks them into exposing credentials or granting remote access, then instantly drains their wallets.
  • Aliases: Operates under multiple names including Filip Weiner, Igor Werner, Darek Velten, Gregor Wersen, and Vlad Cervantes.
  • Platforms Abused: Discord, Telegram, X.com, Twitch, Zoom, and crypto betting sites such as Shuffle.com.
  • OSINT Findings: Dozens of linked accounts were uncovered. Disposable phone numbers in Poland, Germany, and Turkey were tied to the fake personas. Reverse image searches and social media traces connect the scammer to a Polish national named Piotr Huk, aged 32, based in Poznań.
  • Crypto Analysis: On-chain investigation reveals three main Solana addresses handling over $3.9M in inflows. Funds were funneled to Shuffle.com, Binance, Bybit, Circle.com, and KuCoin. Some wallets maintain direct links to igortrading.sol, strongly tying the aliases together.
  • Red Flags for Investigators:
    • Victims lured with upfront payments or job offers
    • Requests for screen sharing or remote access
    • Frequent switching between aliases and platforms

This case highlights how OSINT + blockchain forensics can expose elaborate scammer personas, link disposable identities, and trace illicit funds across multiple platforms.

OSINT 4 Bad: Tactics, Techniques, and Procedures

The suspect is a skilled social engineer who has perfected the art of manipulating victims during live interactions. His typical method involves asking someone to show him how to set up an Axiom wallet via Discord screen sharing. To gain trust, he even pays 20–50 SOL upfront.

His psychological manipulation is striking: he pretends to be confused, feigns fear of being hacked, and insists that the victim take extra precautions so that he cannot see their sensitive information.

Despite this performance, while the victim is screen sharing, he captures the Axiom wallet password. Once the victim connects a trading wallet, he drains it instantly.

Operating under multiple Discord, X, and Telegram aliases, this individual has drained numerous Solana wallets in recent weeks. His criminal activities date back to at least 2022, with over $2M+ stolen to date.

His typical persona is that of a crypto newbie with a gambling problem. He builds trust, then tricks victims into granting remote access through Zoom, Discord, or Telegram. Known aliases include:

  • Filip Weiner
  • Igor Werner
  • Darek Velten
  • Gregor Wersen
  • Vlad Cervantes

Observed Tactics

  • Offers free Solana or small payments (e.g., 5 SOL) to “learn trading”
  • Uses Zoom/Discord to obtain remote access
  • Installs malware or directly transfers funds
  • Use fake personas to build credibility
  • Targets crypto professionals with fake job offers or investment pitches

OPSEC Model: Tracking the Fake Accounts

Through analysis of X.com posts and reports by researchers and victims, multiple linked accounts were uncovered across platforms.

Platform Username / ID Notable Details
Discord gregormayer Not identified; inactive
Telegram GregormayerDE Not identified; inactive

Linked Phone number:

+49-15781447867

Discord Huko7618 Not identified; inactive

Registered: 19 January 2016

Telegram Filipweiner97 / 8007727943 Name: Filip Weiner – Active
X.com filipweiner Not identified; inactive

Name: Filip Weiner

Twitch filipweiner1997 / filipweiner Name: Filip Weiner – Active
Discord filipweiner1997 Not identified; inactive
Telegram iwerner97 / 7226305834 Active; member of @MoriChatEng ($MORI COIN ENG CHAT)
Telegram Iwerner1997 / 7223007824 Active
X.com IWerner1997 Not identified; inactive
Telegram darekvelten Not identified; inactive
Telegram webpander Not identified; inactive

Name: Igi I

Linked Phone number:

+90-5369383042 (Turkey; Turkcell)

Telegram gregorwersen Not identified; inactive
X.com GWersen88745 /

1750850324959809536

Name: Gregor Wersen – Active

Registered: January 2024

Registered Email: gr****************@gmail.com

X.com GWersen52146 / 1725940753451401216 Name: Gregor Wersen – Active

Registered: November 2023

Bio: Gregor Welten

197 ( 26) years Velten 15km close to Berlin Capital Germany Car Mechnaic eraning 4500 almost 5000 euro if work with Saturdays

Linked Telegram: WersenGregor (Inactive)

Following: Gamdom.com (online casino)

X.com Gregorwersen /

1800210404045369344

Registered: June 2024

Following: Shuffle.com (crypto betting platform)

Active

X.com GregorWersen97 /

1706058216885669888

Registered: September 2023

Active

YouTube Gregorwersen /

UCR1lR_O3d4P1GvwWvfxhIDw

Registered: 6 May 2024

Short Bio: Gregorwersen 97

(27) years Berlin’s mechanic maestro in Velten.

2 subscribers

Active

Steam gregor97wersen /

76561199572148653

Name: Gregor Wersen – Active
GitHub GregorWersen / 140273857 Registered: 22 July 2023

Active

Twitch Gregorwersen / 1223664258 Active
Twitch gwersen1997 / 1239852398 Active
Discord gwersen1997 Not identified; inactive
Instagram Gregorwersen / 66188807294 Name: Gregor Wersen – Active

Registered: May 2024

Registered Email: *@hotmail.com

Instagram Gregor_0_3 / 60851432613 Name: Gregor Wersen – Active

Bio: July 2023

Bio: 25, Berlin

Instagram Gregorwersen8 / 66373516968 Name: Gregor Wersen – Active

Registered: May 2024

Bio: Car enthusiast, 27, Velten, Germany

Facebook ID: 122102453006449481 Name: Gregor Wersen – Active

Claimed Location: Velten, Germany

Chat Intelligence: Telegram Activity

User iwerner97 (ID: 7226305834) → low activity overall, but on 29 June 2025 was identified attempting to acquire $MORI coins in @MoriChatEng.

User Filipweiner97 (ID: 8007727943) → active across 13+ crypto Telegram groups.

  • On 22 Feb 2025, posted about social engineering scams in @solanamoneyglitch.

  • In the same group, sought partners for a memecoin trading project.

Linking Disposable Phone Numbers

Linked Fake Name Phone Number Notable Details
Gregor Wersen +48-459078293 (mobile; Poland; Mobiledata Sp. z o.o.) Registered on Wise under the name “Amina Merdaci”; on Zepeto (“mx2jlou”)
Filip Werner +48-782076129 (mobile; Poland; Polkomtel Sp. z o.o. – Plus) Linked to @Filipweiner97 on Telegram
Igor Werner +48-695872471 (mobile; Poland; Polkomtel Sp. z o.o. – Plus) Linked to @iwerner97 on Telegram; registered on OK.ru (ID: 910177156457) and Facebook
Gregor Mayer +49-15781447867 (mobile; Germany; Telefonica Germany GmbH & Co. OHG) Linked to GregormayerDE on Telegram

Registered on Facebook, WhatsApp

OSINT 4 Good: Behind the Fake Personas

A reverse image search of the “Gregor Wersen” profile photo revealed it belonged to Piotr, a Polish national. On 4 March 2018, Piotr posted on erasmusu.com while seeking accommodation in Ancona, Italy as part of an Erasmus scholarship.

Further research into Piotr Huk connected multiple dots:

  • Instagram: piotr_huk (since March 2014) → Liverpool fan, lives in Poznań, travels frequently (noted in Javea, Spain, 15th Aug 2025). Born June 1993 in Ostrów Wielkopolski (age 32).
  • Education: Studied at Marche Polytechnic University, Faculty of Economics.
  • Facebook: Last active Feb 2024 (ski trip in the Alps). Family in Poland.
  • LinkedIn: Senior Business Analyst at ADM (pet and animal nutrition company) since March 2023.
  • Connection: The alias “Huko7618” (used in Discord campaigns) matches his surname “Huk”.

Crypto Analysis: On-Chain Insights

The following crypto addresses were reported as linked to the scammer:

Crypto Address Notable Details
76iXe9yKFDjGv3HicUVVy8AYxHLC71L1wYa12zaZzHHp Shuffle.com account
CLxa36UNggvUbUASqinuHxUFtXXoEx3UoHKKEEGEdL2j Incoming and outgoing transactions to Shuffle.com; outgoing transactions to a Binance account
7epx39b8g3rbkYaoTnb5NaaW1AC3CDEqevySNkrzJHGw Incoming and outgoing transactions to igortrading.sol; outgoing transactions to a KuCoin deposit address
0x2bd923b4496c779B67B957131e1f8fb4e56F1220 ~$19 received
AvLhqqnDk8QTwKFeYR9epTBTTEgEurQVwXjcemuAEeEW Deposit for igortrading.sol; outgoing transactions conducted with a Bybit deposit address, a Shuffle.com deposit address, Circle.com addresses
  1. Scammer’s SOL Address I: CLxa36UNggvUbUAS[…]
  • Received $1.4M+ total.
  • Withdrawals: ~$160K → Shuffle.com, ~$4K → Binance, ~$100 → Gamdom.com.

A transaction flowchart for Scammer’s SOL Address I is provided below via Arkham Intelligence.

  1. Scammer’s SOL Address II: 7epx39b8g3rbkYao[…]
  • Received $1.2M+ total.
  • Withdrawals: ~$23K → KuCoin, ~$63K → Jupiter, unlabelled 6ga7g32Qrm (later → Bybit.com).
  • Strong link with igortrading.sol.

A transaction flowchart for Scammer’s SOL Address II is provided below via Arkham Intelligence.

  1. Scammer’s SOL Address III: igortrading.sol [AvLhqqnDk8QT]
  • Received $1.3M+ stolen assets.
  • Transactions: with Pump.fun account [4gde58vrD96u], Bybit, Shuffle.com, Circle.com.
  • On 10 July 2025, transferred stolen funds to DjNvLj85ZVLv → Binance wallet (potential subpoena target).
  • Cross-linked with Scammer’s SOL Address II (~$23K).

A transaction flowchart for Scammer’s SOL Address III is provided below via Arkham Intelligence.

Recommended Actions

This case underscores how well-crafted social engineering combined with multi-platform identity hopping can still evade casual detection. Investigators, researchers, and crypto professionals can take the following steps to mitigate risk and strengthen attribution:

  • For Investigators & Researchers
    • Use OSINT platforms such as Osint.industries, osint.lolarchiver.com, and Arkham Intelligence to cross-reference fake profiles, identify linked assets, and map transaction flows.
    • Apply AMLBot and other blockchain compliance tools to assess counterparties, monitor risky addresses, and trace stolen funds through exchanges and mixers.
    • Correlate disposable phone numbers, usernames, and images across platforms to uncover real-world links.
    • Preserve screenshots and chat logs as evidence — scammers frequently delete or rebrand their accounts.
  • For Crypto Professionals & Victims
    • Never share screens or allow remote access when handling wallets.
    • Treat offers of “free crypto” or upfront SOL payments as red flags.
    • Use hardware wallets and secure password managers to minimize exposure.
    • Report suspicious activity and wallet addresses to exchanges and platforms for blacklisting.

Disclaimer

This is an ongoing investigation. The information presented here reflects findings available at the time of publication. Further evidence, linked accounts, or transaction details may surface in the future, which could refine or expand upon the conclusions outlined in this brief report.

 

administrator

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.