Web InfoTech, LLC/WeConnect Soft Solutions Pvt Ltd/Garage2Global Ventures Pvt Ltd

Here’s a site using the typical Web Infotech infrastructure and list of impersonated brand names to inject a virus script into the victim’s Windows computer!

[color=#FF00]Link (Dangerous): https://ustechnio70.com/activate.uhc.com/ [/color]

Linked from UHC Card Guide - How to Log In to Your UHC Card Account Online

via redirector site https://us6.my/?aHR0cHM6Ly9zaXRlcy5nb29nbGUuY29tL3ZpZXcvdWhjLWNhcmQtZ3VpZGU=

\\\ I’m trying to paste the javascript in this quote block but I keep getting “403 error”

Extra Info: Seems like it tries to insert a recurring background task, that will download and execute a payload from breachsaver.com .

A new one (for me):

Dillard's Online Bill Pay links to the redirector site Verification Required , which redirects to https://us960.my/dillards.com/log-in.php

error page https://us960.my/dillards.com/contact-service.php

New toll-free number! 855-684-9971.

On March 28, 2026, our good friend Nanobaiter uploaded a video to his YouTube channel exposing a group of Turbotax tech support scammers and even infecting one of their computers with trojans like Bonzify.

The call center identified in this particular video is WeConnect Soft Solutions Private Limited out of * 2-Kha-6, Deep Shree Tower, Vigyan Nagar, Kota, Rajasthan, India.

The company is listed on ZaubaCorp as operating under the leadership of

These individuals also serve as directors for Garage2Global Ventures Private Limited, and Mansoori also serves as a director for Pakiza Soft Solutions

How their scam worked was

  • The scammers will operate the website installturbotax.net to trick victims into going to a faje activation form (at the time of writing: ts.activatetax.pro) which is designed to trick users into calling a dedicated “suppoat” line to “activate their license.”
  • The scammers will then gain remote access to their victims’ computer through programs like QuickAssist, TeamViewer and UltraViewer before running the “netstat” command in the Command Prompt so they can falsely claim their victims’ network was compromised by multiple foreign hackers.
  • The scammers will then offer their victims’ a “suppoat” package for as little as $299.99 for a two-year plan, though in one instance, they had an elderly female withdraw $10,700 from her bank account and deposit the cash at a Bitcoin ATM.

The scammers have also been on our radar since January 6, 2021 for facilitating activation scams under the false personation of Amazon representatives. Back then, they operated under the name if iConnect Soft Solutions, Ltd.

Associated Facebook Accounts:

Associated Instagram Accounts:

Associated LinkedIn Accounts:

Associated Threads Account - https://www.threads.com/@garage2global

Associated WhatsApp - Share on WhatsApp

Associated X Accounts:

Associated Phone Numbers:

  • +91 9351793519
  • +91 7442430000
  • +91 8441998877
  • (888) 784-4456 (Twilio)
  • (855) 419-2900 (Twilio, answers as WebInfoTech)

Associated Email Addresses:

2 polubienia

I wonder if Snell Cunningham is still their USA front man.

1 polubienie