Beyond the high interest, many "customers" found their identities stolen weeks later. The information provided in the loan application was sold on the dark web.
Understanding how the Loan4k shark almost got "c" (caught/caged) requires looking at the red flags that users ignored:
Legitimate lenders have physical addresses, NMLS licenses, and do not conduct business via DMs. loan4k andrea pervy loan shark almost got c
Never enter your SSN or banking info on a site that looks like it was built in an hour.
The incident reportedly began when a borrower, who happened to be a cybersecurity professional, noticed suspicious metadata in the "contracts" sent by Pervy. Instead of paying the ballooning interest, the borrower tracked the IP addresses and digital footprints associated with the Loan4k payment portals. Beyond the high interest, many "customers" found their
Borrowers reported APRs exceeding 1,000%.
Local law enforcement, working in tandem with fraud departments from major payment apps, tracked a series of withdrawals to a physical location in the suburbs. Surveillance was established, and for a moment, it appeared the "Loan4k" operation was about to be dismantled. Never enter your SSN or banking info on
The pitch was simple: small-dollar loans (ranging from $500 to $4,000) delivered via CashApp, Zelle, or Bitcoin within minutes. However, behind the professional-looking graphics and "verified" testimonials lay the classic mechanics of a loan sharking operation:
Utilizing "doxxing" (releasing private info) as a primary method of debt collection. The Turning Point: The "Almost" Capture