⚠️ Caution: This post contains excerpts from a scammer chat. I’ve removed explicit material and personal details, and for privacy reasons, the full transcript of the chat will not be published. What follows are selected highlights that show how the scam works. Note: I am not always telling the truth in these exchanges — I deliberately craft stories to bait the scammer and draw them out.
First a word from our sponsor! Remember, collect hard! Nerd HARDER! At Nerdibles.

The chat with “Sweet Baby Girl” is a textbook case of a romance scammer’s playbook.
It began with simple greetings and photo sharing, but within hours the conversation escalated into declarations of love, plans for relocation, and promises of marriage. Along the way, I shared a lot about my life — intentionally — to give her rope to hang herself with.
Red Flags in Action
Here are some excerpts (lightly anonymized) that highlight the manipulation at work:
- Rapid escalation:
“I think I like your personality… I’m beginning to love you.”
“I swear by the Bible I will never cheat on you.” - Exclusivity and control:
“I want you to delete the app too and let me have your full attention.” - Future faking:
“When you deleted the app, I knew we are going to be together.”
“Let’s plan our first meeting, I’ll seek leave from my superiors.” - Financial probing:
“You make about how much money in a month?”
“Who do you bank with?” - Luxury hooks:
“Santorini, Greece… I love luxury lifestyle with my babe.”
“Christian Louboutin — that’s my favorite heels.” - Suspicious military claims:
Having served myself, I knew her story didn’t add up. She said she’d been in the U.S. Army for 10 years yet was still living in the barracks — which is highly unusual for a service member with that much time in. When I asked for her MOS (Military Occupational Specialty), she gave an answer that amounted to a junior-level role, not one consistent with her supposed experience. That contradiction was one of the earliest and clearest signs something was wrong.

The Car Bill Setup
The real pivot point came when she brought up her car troubles.
She described owning a Chevrolet Silverado 2021 — a flashy truck meant to sound impressive — and then started complaining about bills related to it. The conversation steered toward how expensive it was to keep up with, and finally she asked if I could help pay her car bill.
This is a standard scammer move: the “luxury car” detail gives the appearance of independence and success, while the sudden financial need sets up the victim to “prove their love” by sending money.
The HackLoop Connection
The car bill request was the surface-level red flag. But the real smoking gun came when she provided me with an email address.
I won’t share the address here, but it matched the pattern of HackLoop, a scam group that has been active since at least 2017. They advertise themselves as “crypto recovery experts” or “hackers for hire,” but in reality, they’re a fraud ring that lures in victims with fake promises of recovering stolen cryptocurrency, hacking accounts, or improving credit scores.
My research confirmed that HackLoop uses free Gmail accounts, disposable WhatsApp numbers, and rotating fake personas like “Jameson.” They’ve been caught spamming forums, Trustpilot reviews, and even Nigerian message boards with offers for blatantly illegal services.
That email gave her away.
Sidebar: How HackLoop’s Emails Expose Them
HackLoop’s email practices are a dead giveaway. Here’s what I learned in my investigation:
- Odd domains: They stick to free Gmail addresses instead of professional domains.
- Reused aliases: Variants like Hackloop606 and HackloopJameson show up across scam reports.
- Fake personas: Names like “Jameson” are invented to sound trustworthy, but have no real-world identity behind them.
- Contact channels: They always push Gmail and WhatsApp, never verifiable business accounts.
- Unrealistic promises: Their ads boast about “recovering lost Bitcoin,” “hacking bank accounts,” or even “selling counterfeit money” — services no legitimate business offers.
- Willingness to sext:
At one point, she was very quick to engage in sexting. While I won’t share the content here, this is another hallmark of scam operations — using sexual conversation to build false intimacy and keep the target emotionally hooked.
These are the fingerprints of HackLoop. If you see them, you’re dealing with fraud.
Lessons Learned
- Real relationships don’t escalate at warp speed.
- Love bombing + money talk = scam.
- Luxury cars, exotic vacations, and financial “emergencies” are props.
- The car bill ask is the tell.
- HackLoop’s email patterns betray them. Even if the story is polished, the infrastructure gives them away.
What You Can Do
If you receive emails, messages, or chats from anyone claiming to be with HackLoop — or any “crypto recovery” or “romance partner” who asks for money — report it.
- In the U.S.: File a complaint with the FTC or the FBI’s Internet Crime Complaint Center (IC3).
- Outside the U.S.: Contact your national fraud reporting center or consumer protection agency.
- On platforms: Report the profile or email through the app or service you were contacted on.
Every report helps shut down these scammers and warn others before they fall victim.
What looks like a whirlwind romance is really just a trap. And the second you’re asked to “help out” with a bill — especially when paired with a shady email — you can be sure it’s not love. It’s HackLoop.
🛑 5 Signs of HackLoop
1. Love Bombing
💬 Over-the-top romance in hours: “I’ll never cheat on you,” “We’re meant to be.”
2. Future Faking
🌍 Instant talk of relocation, marriage, or luxury vacations before trust is built.
3. Money Probing
💰 Direct questions: “How much do you make?” “Who do you bank with?”
4. The Ask
🚗 Always ends with a bill or “emergency” — car payment, medical expense, crypto recovery fee.
5. Shady Emails
📧 Free Gmail addresses with odd names like Hackloop606 or HackloopJameson. Always paired with WhatsApp numbers.
🔎 Rule of Thumb: If it’s fast, intense, and asks for money, it’s a scam.
📢 Action: Report to FTC (US), IC3, or your local fraud authority.
Member discussion: