A UK-based scammer, operating under the Twitter handles @ape_31 and @60711, has stolen more than $650,000 from more than 250 unsuspecting Twitter users (X) in the past year.

Investigations by blockchain investigator ZachXBT show that the scammer lured victims by posting fake Profit and Loss (PNL) screenshots from a Bybit demo account and used a fake news account to trick victims into paying for fake services.

Once the scammers receive the payment, they immediately block their victims, cutting off all contact.

Ape 31 targeted users by responding to large accounts and regularly posting PNL screenshots to fake the engagement.

The scam involved offering paid copy trading services, where users were tricked into paying fees ranging from $250 to $500.

After receiving the payment, the scammer requests additional funds under the guise of managing it, claiming that the process is risk-free.

Victims were banned on Telegram and Twitter after sending their money.

Victims are lured into fake deals and scams.

One victim paid Ape 31 $500 for copy trading services. Ape 31 then demanded $20,000, promising to trade at a “zero liquidation price” on their behalf.

The victim sent the requested amount to the Ape 31 wallet address. To make it look legitimate, the scammer provided the victim with an API key to monitor the supposed transactions.

But it was all fake. Monkey 31 then pressured the victim to send another $20,000, claiming that the winnings could only be claimed after the additional funds were sent.

After this of course, the victim was blocked, and all communication stopped.

In another case, a victim who sent $3,000 was fooled into believing that his investment would grow from $10,000 to $100,000 within days. This victim was also ignored after the money was transferred.

In a third case, a victim reported losing $500. This person was able to gather more information about the scammer, stating that Ape 31 logged into his TradingView account using a UK Telecom IP address (81.78. 179.107).

The scammer, who frequently changes deposit addresses, has used more than 16 different wallets.

According to Zach, these addresses received over $650,000 in just one year, and it's likely that more money was stolen.

Multiple attempts and fake identities

The gang also tried to scam another person with a fake OTC drug deal. They convinced the target to join a video call, which was later recorded.

The victim confirmed that the voice in the recording matched the scammer's. Zach revealed the details of this conversation, as well as the recording.

Investigations reveal a long list of centralized exchanges used by the scammer, including KuCoin, Kraken, Bitget, OKX, MEXC, and Poloniex.

Zac also discovered that Ape 31 is based in the UK, not Singapore as he claims. Its IP address, 81.78.179.107, is registered in Ealing under the name of Vodafone Limited.

Ape 31 also used a UK-based phone number, +44-7466-727122. The scammer changed his name and location several times to mislead his victims and cover his tracks.

At several points, they used the name Omar and pretended to be based in Singapore. On Twitter, Ape 31 used several usernames, including apethirtyone, apenumeral, and ape31111.

On Telegram, the scammer runs a channel called CHLMPS, where he continues to target new victims. His current Telegram username is APE131, although he has previously used names such as APE313, APE3331, FD_331, and FD3_D.

But right after Zach posted his post, all of his Twitter accounts were disabled.