ZachXBT Profile picture
Feb 16, 2022 16 tweets 11 min read Read on X
1/ Examining how @ashwsbreal has mislead thousands of people to build up an 8 figure crypto portfolio.
2/ Our story begins with Ash’s Telegram group.

Well what’s wrong with the TG group?

a) pumping & dumping lowcaps on CEXs.
b) Insider paid group to receive picks before main TG channel.
c) Undisclosed IDO promotions
d) Links to a sketchy VC
3/ All messages of pumping & dumping lowcaps have been deleted but I’ve recovered a few instances from people on Twitter complaining.
4/ Here’s two other instances:
5/ Ash claimed it wasn’t intentional and they would refund people.

Yet there’s people complaining on Twitter they never were reimbursed for the P&D.

There’s also zero mention of the VIDT P&D either.
6/ Here’s a breakdown of the paid group:

In the public TG group Ash would market a paid private group to its members.

-Blatantly saying they get buy signals & insider info before the main public channel

-I’ve attached the payment address courtesy of a former member
7/ On 03/06/21 a buy signal was made in the paid group to buy $ROYA

Guess what? The address in the photo above (0X43) was making large buys a few days prior.

The paid group is told it will be shilled shortly in the public group.
8/ As of now all is going well and it gets posted in the public group.

Immediately after Ash says in the paid group “who the f is selling”

*hint it’s the address from above sending to a different wallet to sell*

Ash acts mad saying everyone messed up the pump (the irony).
9/ Here are all the undisclosed shills that tie between the public Telegram & Twitter account:

AIOZ is down 93%
GS is down 97%
10/ Most shills in the Public Telegram get deleted. Here are a couple more Twitter ones.

BLES down 99%
EQZ down 97%
KPAD down 99%
MNY down 94%

Just a quick scroll through Ash’s feed shows all the undisclosed shills. It’s clear they will promote any IDO.
11/ Here’s where things get even more interesting I messaged the same account to try and join the “paid TG group” and now instead of Ash the account says Jazz @EverseHQ
12/ What remains unclear is if the Ash account is ran by that VC or they are just working together.

The fact the TG account matches the Public TG leads me to believe Ash is owned by Everse.

You can see all the cash grabs they work with & on their Twitter
cypherhunter.com/en/p/everse-ca…
13/ I glanced over all the related addresses (giveaways, dumping, paid group).

Both show a transaction history filled with IDO allocations with outflows to the main wallets (don’t appear to be CEXs)

Also further leads me to believe Ash is Everse.
14/ It’s interesting to see how large this operation is and how they have no morals to disclose to followers.

Hopefully some more information about this relationship can come to light. It’s clear whatever is happening is making these people millions at the expense of others.
Update: I’ve received multiple DMs from people that in fact confirm Ash & Everse Capital are ran by the same person
This article also states Ash leads Everse
medium.com/portal-finance…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with ZachXBT

ZachXBT Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @zachxbt

Mar 23
1/ I uncovered a coordinated network of 10+ accounts manufacturing viral panic about war and politics to drive traffic to crypto scams.

Strategy:
>Purchase accounts with followers
>Doompost multiple times per day
>Repost content from alt accounts
>Promote fake giveaway or scam
>Change usernameImage
2/ Example: @wanglaurentceo

They started by purchasing an account with followers and use AI to create a fake Asian version of Mario Nawfal.

(User ID 1804235884826333184) Image
Image
Image
3/ Here’s related accounts reposting to boost the reach of posts about exaggerated or fake news.

This causes them to go viral each day with millions of views and thousands of likes / replies. Image
Image
Image
Read 7 tweets
Feb 26
1/ Meet @WheresBroox (Broox Bauer), one of the multiple @AxiomExchange employees allegedly abusing the lack of access controls for internal tools to lookup sensitive user details to insider trade by tracking private wallet activity since early 2025. Image
Image
Image
2/ Axiom is a crypto trading platform founded by Mist & Cal in 2024. After going through Y-Combinator's Winter 2025 batch, it quickly became one of the most profitable companies in the space, generating $390M+ in revenue to date.

I was retained to investigate allegations of misconduct at Axiom after receiving reports.Image
Image
3/ Broox is a current Axiom senior BD employee based in New York.

In the clip Broox states he can track any Axiom user via ref code, wallet, or UID and claims he can "find out anything to do with that person".

He also describe researching 10-20 wallets initially and slowly increasing over time "so it does not look that suspicious"

In a separate clip from the same recording, Broox sets ground rules for how to request lookups from him and then says he'll send the full list of wallets.

The full recording is a private call of the group members strategizing.
Read 10 tweets
Jan 25
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses.

John’s dad owns CMDSS, which currently has an active IT government contract in Virginia.

CMMDS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets.

It still remains unclear at this point how John obtained access from his dad.Image
Image
Image
Update: The CMDSS company X account, website, & LinkedIn were all just deactivated Image
Image
Image
Update: John Daghita (Lick) began trolling again on Telegram shortly after my post Image
Image
Read 4 tweets
Jan 23
1/ Meet the threat actor John (Lick), who was caught flexing $23M in a wallet address directly tied to $90M+ in suspected thefts from the US Government in 2024 and multiple other unidentified victims from Nov 2025 to Dec 2025. Image
Image
Image
2/ Earlier today John got into a heated argument with another threat actor known as Dritan Kapplani Jr. in a group chat to see who had more funds in crypto wallets.

In 'The Com' this is known as a band for band (b4b).

However the entire interaction was fully recorded.

Image
3/ In part 1 of the recording Dritan mocks John however John screenshares Exodus Wallet which shows the Tron address below with $2.3M:
TMrWCLMS3ibDbKLcnNYhLggohRuLUSoHJg
Read 13 tweets
Dec 29, 2025
1/ Meet Haby (Havard), a Canadian threat actor who has stolen $2M+ via Coinbase support impersonation social engineering scams in the past year blowing the funds on rare social media usernames, bottle service, & gambling. Image
Image
2/ On Dec 30, 2024 Haby posted a screenshot in a group chat showing off a 21K XRP ($44K) theft from a Coinbase user.

rN7ddvk4DrGHZUrBfNARJEEAbPkky9Mwcz Image
Image
3/ On Jan 3, 2025 Haby posted a screenshot from his Exodus wallet showing his Telegram & IG accounts.

I matched up the historical balances to the screenshot and found the XRP address linked to two other Coinbase user thefts for ~$500K total.

rfA8MiWkRb6xjveQGKfJpdr8h1Kb4c83Rb Image
Image
Read 12 tweets
Oct 19, 2025
1/ A video went viral on YT this week after a US based victim lost $3.05M (1.2M XRP) from their Ellipal wallet.

Here’s the tracing of where the stolen funds ended up and the biggest takeaways for similar thefts. Image
2/ Although the victim did not directly share the theft address after watching the video I found it by reviewing the date and amount.

r3cf5mgj5qEcj9n4Th28Es7NVRnXGJjkzc

The victim seems inexperienced and does not provide enough details to determine how the Ellipal wallet became compromised besides it being user error.
3/ The attacker created 120+ Ripple -> Tron orders via Bridgers on Oct 12, 2025.

On block explorers the transactions show as Binance since Bridgers (formerly SWFT) uses them for liquidity. Image
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(