Infographic for Bprotrade Scam Review: Milton Group & AK Group Links, showing network connections and fraud tactics.
An investigation into the Bprotrade Scam Review: Milton Group & AK Group Links, revealing how shared infrastructure and IP clusters connect this platform to a global fraud syndicate responsible for over $250 million in losses.

Verdict: Bprotrade (bprotrade.io) is a confirmed “fraud factory” linked to the multi-billion dollar Milton Group and AK Group scam syndicates. Forensic evidence confirms they utilize manipulated software and shared server clusters to defraud investors under the guise of an elite trading platform.

Technical Summary

Technical Category Entity Information & Connections 
Scam Trading Platform Bprotrade 
Live / Active Domain bprotrade.io 
Previous Domains bprotrade.com, bprotrade.cc, bprotrade.net, bprotrade.org, bprotrade.info, client.bprotrade.io 
Group Affiliation Part of the Limited AK Group, a subsidiary of the Milton Group syndicate
Verified Sister Entities Solo Capitals, EverFX, CryptoMB, BProFX, CoinEvo (Lilac Group LLC), LPL Invest, Vetoro Banc, and MelbourneFX
Evidence of Linkage Shared Puma TS software suite, geographical/personnel overlap, unified IP/Server/VOIP infrastructure, and the “Clone Effect” in website architecture 
Table 1: Technical Profile and Syndicate Affiliation of the Bprotrade Ecosystem

The Architecture of Deception: Bprotrade and the Milton Group

Bprotrade (bprotrade.io) is a confirmed scam. It operates as a strategic arm of the AK Group, mirroring the tactics of known fraudulent entities like Stonebridge Ventures(stonebridgeventures.net). Historically, bprotrade.com served as the primary landing page before regulatory pressure rendered it unreachable, forcing the operation to migrate to its current io domain and several mirrors.

The AK Group functions as a high-volume subsidiary of the Milton Group Scam Empire. This network is responsible for global financial losses exceeding $250 million, according to recent 2026 investigative reports. The severity of this operation was cemented in March 2026, when a German court sentenced Mikheil Biniashvili, a key figure in the AK Group, to seven-and-a-half years in prison.

Technical Infrastructure: The “Scam-in-a-Box” System

The technical architecture of Bprotrade and its sister brands, including BProFX, EverFX, and Vetoro Banc, serves as a direct bridge to the Milton Group ecosystem. They all share a proprietary “fraud stack” designed to manipulate victims.

1. Solo Capitals

  • Primary Domains: solocapitals.net, solocapitals.com, solocapitals.cc, solocapitals.io
  • Context: Based in Georgia, this brand was the centerpiece of the BBC investigation, “On the Hunt for the Businessmen Behind a Billion-Dollar Scam.” The investigation proved that branding and technology were funneled through private servers linked directly to the Milton Group.

2. EverFX

  • Primary Domains: everfx.com, everfxglobal.com, everfx.pro
  • Context: Known for high-profile sponsorships like Sevilla FC, EverFX defrauded over 170,000 people. While it used a CySEC-regulated front (ICC Intercertus Capital Ltd), it functioned as a massive “boiler room.”
  • Rebrands: After UK (FCA) bans, traffic moved to axiance.com—which is still actively scamming in 2026—and axiance-eu.com.

3. CryptoMB

  • Primary Domains: cryptomb.cc, cryptomb.io, cryptomb.com
  • Context: Linked to Columbia Capital Group Ltd, this entity operated alongside cryptoeu.com and euro-crypto.com. While these specific domains are inactive in 2026, they remain part of the broader recovery investigation.

4. BProFX

  • Primary Domains: bprofx.com, bprofx.cc, bprofx.net
  • Context: BProFX acts as the “second-stage” trap. When victims at EverFX became suspicious, they were often moved to BProFX under the guise of an “elite platform” with better algorithms. It is registered as an unregulated shell in Dominica via Dynamics Solution Ltd.

5. CoinEvo (Lilac Group LLC)

  • Primary Domains: coinevo.io, coinevo.pro
  • Context: Flagged by Italy’s CONSOB, CoinEvo utilizes the same high-pressure sales tactics and falsified trading interfaces as the Tbilisi call centers.

6. LPL Invest

  • Primary Domains: lplinvest.com,lplfinances.eu, and lpleurope.eu
  • Context: This is a recovery scam. It mimics the legitimate US-based LPL Financial (lpl.com) to target people who have already lost money, pretending to help them trace and recover funds while actually extracting a second “fee.”

7. Vetoro Banc

  • Primary Domains: vetoro.io, vetoro.cc, vetorobank.com
  • Context: Specifically flagged by the UK’s FCA. This “fraud factory” specialized in convincing victims to “upgrade” accounts based on fake analyst reports.

8. MelbourneFX

  • Primary Domains: mlbfx.io, melbourne-fx.io, melbournefx.io
  • Context: Newly flagged in April 2026 by the Australian government. This entity demands an astronomical minimum deposit of $5,500 AUD/USD, whereas legitimate brokers allow starts at $100. Currently, only mlbfx.io remains active.

Forensic Evidence: How Bprotrade is Linked to the Syndicate

Investigative findings from 2024 through early 2026 prove these brands are not independent, but “skins” on a singular infrastructure.

1. The Puma TS Software Suite

Bprotrade is built on the Puma Trading System, a proprietary “fraud stack” developed by the Milton Group.

  • Bespoke Illegality: Unlike MetaTrader, Puma is not a commercial product. It is an illegal package provided only to “franchisees” of the network.
  • Manipulation: The backend allows agents to see victim credentials and manually manipulate charts to show fabricated profits, encouraging further deposits.

2. IP and Server Clusters

Forensic analysis reveals that Bprotrade shares IP addresses and server clusters with CryptoMB and Vetoro Banc. These are often hosted on “bulletproof” servers in Bulgaria and Cyprus to avoid takedowns. Many sites contain code snippets from “Project Partners LLC,” a known Milton-linked development entity.

3. Remote Access Exploitation

Following the standard Milton Group manual, Bprotrade agents insist victims install AnyDesk or TeamViewer. This allows scammers to:

  1. Access online banking portals directly.
  2. Install malicious extensions to intercept 2FA codes.
  3. Execute unauthorized transfers from the victim’s local machine.

4. Payment Gateway Obfuscation

The money trail for Bprotrade utilizes a mesh of shell companies in the UK, Marshall Islands, and St. Vincent and the Grenadines. Deposit addresses for Bitcoin and Ethereum are frequently linked to “parent wallets” used by the wider Milton Group to mix stolen crypto.

Comparison Table: Bprotrade vs. Milton Group Assets

FeatureTechnical SimilarityStatus (2026)
Trading PlatformPumaTS (Proprietary)Identical
Backend CRMMilton/Morgan Internal CRMIdentical
Server HostingShared IP Clusters (Bulgaria/Cyprus)Highly Linked
Remote AccessAnyDesk/TeamViewer ExploitationStandard Operating Procedure
Source Code“Project Partners LLC” snippetsConfirmed
Table 2: Technical Infrastructure Overlap Between Bprotrade and Known Milton Group Assets (2026 Analysis)

Take Action Against Bprotrade

If you have lost money to Bprotrade or any of its sister entities listed above, you are a victim of a coordinated international syndicate. Despite many domains being unreachable, investigative trails remain warm.

Report your case and provide any correspondence through our Reporting Page to assist in the ongoing 2026 recovery efforts.

By Errolle Collins

Errolle Collins is a seasoned finance expert and the founder of ScamReader.info. With a specialized academic background in accountancy (CPA) from Strathmore University, Errolle transitioned his analytical rigors into the world of financial journalism. Over the past decade, he has served as a strategic voice for leading global finance publications, accumulating over 10 years of experience in market analysis and investigative writing. Errolle’s deep-seated passion for online trading, specifically Forex and Cryptocurrency, led him to uncover the sophisticated "dark patterns" used by offshore brokers to defraud investors. After years of witnessing the devastating impact of financial fraud, he founded ScamReader.info in 2023. His mission is twofold: to provide traders with forensic-level broker analysis and to offer a clear, actionable roadmap for victims to report scams, file claims, and pursue fund recovery. Connect with me on LinkedIn to verify my professional background and 10+ years of financial investigative experience.

Leave a Reply

Your email address will not be published. Required fields are marked *