Skip to main content

Catch - User Guide

🎯 Catch Feature - Report Suspected Hackers​

https://kim.fun/catch

The Catch feature allows users to submit detailed reports of suspected North Korean hackers with evidence. Community members can stake KIM tokens on submissions to validate and rank them.

Prerequisites​

  1. NEAR Wallet Connection: Required for all submissions
  2. Minimum Balance: 5 KIM tokens to submit a catch
  3. Evidence Files: At least one piece of evidence required

Step-by-Step Submission Process​

Step 1: Prepare Your Investigation​

Before starting, gather:

  • Target Information: Profile URLs, usernames, or contact details
  • Evidence Files: Screenshots, videos, documents, transaction records
  • Investigation Notes: Tools used and methodology
  • Background Research: How you discovered this threat

Step 2: Enter Suspect Profile Information​

  1. Profile Link Input:

    • Enter social media profile, website, phone, or email
    • System auto-detects platform type
    • For usernames only: Select platform from dropdown
    • For phone numbers: Choose "Phone Number" or "WhatsApp Number"
  2. Link Processing:

    • Click the "Send" button or press Enter
    • System validates and processes the link
    • Preview shows detected profile information
    • Platform badges indicate social media type
  3. Supported Platforms:

    • Social Media: X (Twitter), GitHub, LinkedIn, Telegram, Discord, Instagram, Facebook
    • Communication: WhatsApp, Phone numbers, Email addresses
    • Websites: Any domain or URL

Step 3: Provide Investigation Details​

  1. Short Description (Required, max 100 chars):

    • Brief summary of the threat or suspicious activity
    • Example: "Fake crypto expert targeting investors with phishing links"
  2. Tools Used (Required, max 100 chars):

    • List investigation tools and methods
    • Example: "OSINT tools, blockchain analysis, social engineering detection"
  3. Investigation Process (Required, max 100 chars):

    • Explain your methodology and discovery process
    • Example: "Traced wallet addresses, analyzed posting patterns, verified fake credentials"

Step 4: Upload Evidence Files​

  1. Add Evidence Sections:

    • Each evidence file gets its own section
    • Click "Add New" to create additional evidence slots
    • Remove unwanted sections with "Remove" button
  2. Evidence Types:

    • Image: Screenshots, photos, diagrams
    • Video: Screen recordings, video evidence
    • Audio: Voice recordings, audio evidence
    • Document: PDFs, text files, reports
    • Transaction: Blockchain records, payment evidence
  3. File Upload Process:

    • Select evidence type from dropdown
    • Click "Choose File" to browse your device
    • Supported formats vary by type
    • Files are uploaded to IPFS for permanent storage
    • Image previews shown for visual evidence

Step 5: Review and Submit​

  1. Final Review:

    • Verify all information is accurate
    • Ensure evidence files are properly uploaded
    • Check character limits on text fields
    • Confirm you have sufficient KIM balance (5 KIM required)
  2. Submission Process:

    • Click "Submit Catch" button
    • 5 KIM tokens automatically staked on your submission
    • Files uploaded to IPFS with permanent links
    • Submission added to community feed for validation

After Submission​

Community Validation​

  • Public Display: Your catch appears in the community feed
  • Staking System: Other users can stake KIM tokens on your submission
  • Verification Process: Community and admin verification possible
  • Ranking System: Higher-staked catches rank higher in feed

Tracking Your Submissions​

  • Feed Visibility: Monitor your catch in the recent submissions
  • Stake Tracking: See how many KIM tokens are staked on your catch
  • Verification Status: Track admin and community verification
  • Performance Metrics: View in leaderboard section

Best Practices​

  1. Evidence Quality:

    • Use high-resolution screenshots
    • Include timestamps when possible
    • Provide multiple angles/sources
    • Document the investigation trail
  2. Description Writing:

    • Be specific and factual
    • Avoid speculation without evidence
    • Include key identifying information
    • Use clear, professional language
  3. Investigation Methodology:

    • Document your process step-by-step
    • Use reputable OSINT tools
    • Cross-reference multiple sources
    • Maintain investigation notes