<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CodeAIntel: Darknet and Hacking Forums]]></title><description><![CDATA[Uncover the hidden world of the darknet and hacking forums, where cybercriminals operate in secrecy. This section dives into the underbelly of the internet, exploring the latest trends, emerging threats, and tactics used by hackers. Learn how these underground networks function, what drives illicit activities, and how cybersecurity professionals can combat these evolving threats.]]></description><link>https://www.codeaintel.com/s/darknet-and-hacking-forums</link><image><url>https://substackcdn.com/image/fetch/$s_!kBBb!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd94d629d-2720-4f24-a8bf-c3f5d1a4200f_500x500.png</url><title>CodeAIntel: Darknet and Hacking Forums</title><link>https://www.codeaintel.com/s/darknet-and-hacking-forums</link></image><generator>Substack</generator><lastBuildDate>Fri, 15 May 2026 16:23:55 GMT</lastBuildDate><atom:link href="https://www.codeaintel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Tom]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[CodeAIntel@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[CodeAIntel@substack.com]]></itunes:email><itunes:name><![CDATA[Tom]]></itunes:name></itunes:owner><itunes:author><![CDATA[Tom]]></itunes:author><googleplay:owner><![CDATA[CodeAIntel@substack.com]]></googleplay:owner><googleplay:email><![CDATA[CodeAIntel@substack.com]]></googleplay:email><googleplay:author><![CDATA[Tom]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Disrupted Trust, How Scattered Lapsus$ Hunters Breached Betterment and Turned Customer Data Into a Weapon]]></title><description><![CDATA[In early January 2026, one of the largest automated investment platforms in the United States found itself exposed not by a software flaw or a zero-day exploit, but by a far more familiar weakness...]]></description><link>https://www.codeaintel.com/p/disrupted-trust-how-scattered-lapsus</link><guid isPermaLink="false">https://www.codeaintel.com/p/disrupted-trust-how-scattered-lapsus</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Thu, 05 Feb 2026 19:58:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Bekg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bekg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bekg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Bekg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Bekg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Bekg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bekg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2479526,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/187015108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bekg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Bekg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Bekg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Bekg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e92d587-74b6-4dce-8899-fd65a5c3af83_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>In early January 2026, one of the largest automated investment platforms in the United States found itself exposed not by a software flaw or a zero-day exploit, but by a far more familiar weakness, trust. <strong>Betterment suffered a data breach that exposed sensitive customer information after attackers abused a trusted third-party platform, rapidly converting stolen access into a large-scale crypto scam.<br></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xD7k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xD7k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 424w, https://substackcdn.com/image/fetch/$s_!xD7k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 848w, https://substackcdn.com/image/fetch/$s_!xD7k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 1272w, https://substackcdn.com/image/fetch/$s_!xD7k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xD7k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png" width="310" height="348" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:348,&quot;width&quot;:310,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:34214,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/187015108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xD7k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 424w, https://substackcdn.com/image/fetch/$s_!xD7k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 848w, https://substackcdn.com/image/fetch/$s_!xD7k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 1272w, https://substackcdn.com/image/fetch/$s_!xD7k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5d76ce2-1029-4fc0-9674-1681d02a462b_310x348.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Screenshot from SLSH Blog hosted on Tor,</figcaption></figure></div><p><strong><br></strong></p><p>This incident was not accidental, opportunistic, or novel. It was the deliberate work of <strong>Scattered Lapsus$ Hunters</strong>, a cybercriminal ecosystem that has refined identity abuse into a repeatable intrusion model. The breach highlights a growing reality for fintech and beyond, attackers no longer need to break systems when they can convincingly impersonate them.</p><h2>A Quiet Breach With Loud Consequences</h2><p>On January 9, attackers gained access to third-party software used by Betterment for customer communications through social engineering. Rather than targeting core financial systems, the operation focused on exploiting the implicit trust embedded in outsourced platforms, a tactic increasingly favored by modern threat actors.</p><p>Once access was secured, fraudulent messages were sent to Betterment customers, disguised as legitimate company notifications. The messages promoted a classic crypto giveaway scam, promising to triple cryptocurrency deposits sent to attacker-controlled wallets. Because the messages originated from a trusted communication channel, the scam carried a level of legitimacy that would have been difficult for many recipients to immediately question.</p><p>Betterment quickly disabled the compromised access and warned customers through official channels. The company stated that no passwords, Social Security numbers, or investment accounts were directly accessed. However, the damage had already been done.</p><h2>The Data That Slipped Through the Cracks</h2><p>The attackers exfiltrated <strong>personally identifiable information</strong>, including:</p><ul><li><p>Full names</p></li><li><p>Email addresses</p></li><li><p>Physical addresses</p></li><li><p>Phone numbers</p></li><li><p>Dates of birth</p></li></ul><p>Subsequent analysis indicated that more than <strong>1.4 million unique customer records</strong> were exposed. While this data does not enable immediate account takeover, its value lies elsewhere. Aggregated PII fuels identity fraud, targeted phishing, SIM swapping, and high-confidence impersonation campaigns.</p><p>This reflects a broader shift in attacker priorities. Instead of going after transactional control, adversaries increasingly harvest data that enables scalable deception. The financial impact may not be immediate, but the downstream risk persists long after breach notifications fade.</p><h2>Anatomy of the Attack, Identity Over Exploitation</h2><p>This intrusion did not rely on advanced malware, zero-days, or persistence mechanisms.</p><ul><li><p>No core banking systems were compromised</p></li><li><p>No vulnerabilities were publicly disclosed</p></li><li><p>Access was gained through deception, not exploitation</p></li></ul><p>A third-party SaaS platform became the entry point, demonstrating how communication and marketing systems now function as <strong>trust delivery mechanisms</strong>, not peripheral tools. Once compromised, they allow attackers to speak with the full authority of the brand.</p><p>This model bypasses many traditional security controls. MFA, EDR, and network segmentation offer limited protection when an attacker successfully convinces a system, or a human, that they belong.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-I6S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-I6S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-I6S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-I6S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-I6S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-I6S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2497785,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/187015108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-I6S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-I6S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-I6S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-I6S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb61bfd6-da8a-4753-8a75-c74c3f9be916_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2>Attribution, Scattered Lapsus$ Hunters Behind the Breach</h2><p>The Betterment breach was carried out by <strong>Scattered Lapsus$ Hunters</strong>, a federated cybercriminal brand that has emerged as one of the most disruptive forces in recent years.</p><p>Scattered Lapsus$ Hunters is not a single hierarchical group. It is a <strong>loosely connected ecosystem of operators</strong> that consolidated reputational and operational elements from <strong>Scattered Spider, ShinyHunters, and LAPSUS$</strong>. Rather than merging infrastructure, the cluster operates as a shared brand, amplifying visibility, credibility, and intimidation across campaigns.</p><p>This federated model allows multiple actors to collaborate, imitate, or operate independently while benefiting from a common identity. The result is a threat actor that behaves less like a gang and more like a franchise.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4Ksd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4Ksd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 424w, https://substackcdn.com/image/fetch/$s_!4Ksd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 848w, https://substackcdn.com/image/fetch/$s_!4Ksd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 1272w, https://substackcdn.com/image/fetch/$s_!4Ksd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4Ksd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png" width="1118" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:1118,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:257243,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/187015108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4Ksd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 424w, https://substackcdn.com/image/fetch/$s_!4Ksd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 848w, https://substackcdn.com/image/fetch/$s_!4Ksd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 1272w, https://substackcdn.com/image/fetch/$s_!4Ksd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ef164de-3e82-4de5-9d42-0505e0b0bec8_1118x844.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Screenshot from SLSH Blog hosted on Tor,</figcaption></figure></div><p><br></p><h2>A Brand Built on Identity Abuse and Visibility</h2><p>According to threat intelligence reporting, Scattered Lapsus$ Hunters prioritizes <strong>social engineering and trust exploitation</strong> over technical sophistication. Their operations consistently feature:</p><ul><li><p>Impersonation of internal IT staff, vendors, or partners</p></li><li><p>Social engineering of employees and third parties</p></li><li><p>Abuse of SaaS platforms and identity workflows</p></li><li><p>Rapid data exfiltration followed by immediate monetization or extortion</p></li><li><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tQo4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tQo4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 424w, https://substackcdn.com/image/fetch/$s_!tQo4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 848w, https://substackcdn.com/image/fetch/$s_!tQo4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 1272w, https://substackcdn.com/image/fetch/$s_!tQo4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tQo4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png" width="951" height="791" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:791,&quot;width&quot;:951,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:138971,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/187015108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tQo4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 424w, https://substackcdn.com/image/fetch/$s_!tQo4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 848w, https://substackcdn.com/image/fetch/$s_!tQo4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 1272w, https://substackcdn.com/image/fetch/$s_!tQo4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53059ef3-1a2e-4e48-bb83-6f87c3dc08a3_951x791.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Screenshot from SLSH Blog hosted on Tor,</figcaption></figure></div><p><br></p></li></ul><p>Unlike traditional ransomware groups, Scattered Lapsus$ Hunters favors speed and impact over stealth. Access is obtained, leveraged, and discarded quickly. Data is weaponized immediately, either for extortion, resale, or follow-on fraud.</p><p>The Betterment operation fits this pattern precisely. Stolen access was used within hours. Data was repurposed for scam delivery rather than long-term persistence. The objective was not infrastructure control, but <strong>trust hijacking at scale</strong>.</p><h2>Strategic Implications for Fintech</h2><p>The breach underscores several uncomfortable truths for financial platforms:</p><ol><li><p><strong>Third-party platforms expand the attack surface.</strong> Any system that communicates with customers inherits brand authority, and therefore risk.</p></li><li><p><strong>PII is now a primary objective.</strong> Data that enables impersonation is more scalable than direct theft.</p></li><li><p><strong>Attribution models are changing.</strong> Federated threat brands blur traditional group boundaries, complicating defense and response.</p></li></ol><p>Regulatory scrutiny around third-party risk, data protection, and disclosure is likely to intensify as incidents like this continue.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kvho!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kvho!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kvho!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kvho!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kvho!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kvho!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2605809,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/187015108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kvho!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kvho!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kvho!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kvho!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e52d17e-bc23-4501-8d12-f9d3af087dbc_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[From Propaganda to Prison: Serial Hacker Gets 20 Months After NCA Takedown]]></title><description><![CDATA[His banners screamed ideology across government sites in Israel and the US&#8212;but investigators uncovered the real prize: a massive credential theft operation.]]></description><link>https://www.codeaintel.com/p/from-propaganda-to-prison-serial</link><guid isPermaLink="false">https://www.codeaintel.com/p/from-propaganda-to-prison-serial</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Sat, 16 Aug 2025 17:39:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BG7C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BG7C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BG7C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!BG7C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!BG7C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!BG7C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BG7C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BG7C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!BG7C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!BG7C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!BG7C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa133d39-9c3a-4dc2-8443-ba61cda86afa_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong><br>The Show Ends in Rotherham</strong></h3><p>The curtain dropped in an unremarkable flat in Rotherham. Inside: laptops, hard drives, and one man who fancied himself both digital warrior and cyber-rockstar.</p><p><strong>Al-Tahery Al-Mashriky, 26</strong>, wasn&#8217;t new to the stage. For years, he&#8217;d carved his name into the internet with defacements plastered across government domains, faith-based organizations, and even critical infrastructure. His favorite calling cards? Political slogans, ideological manifestos, banners screaming into the void. NCA investigators were able to link Al-Mashriky to the Yemen Cyber Army through social media and email accounts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qDl_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qDl_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qDl_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qDl_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qDl_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qDl_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg" width="387" height="511.9465828750982" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1684,&quot;width&quot;:1273,&quot;resizeWidth&quot;:387,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Al Tahery AL MASHRIKY&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Al Tahery AL MASHRIKY" title="Al Tahery AL MASHRIKY" srcset="https://substackcdn.com/image/fetch/$s_!qDl_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qDl_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qDl_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qDl_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e43c2b5-c0b2-478b-b40f-2cfb3c01b764_1273x1684.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Al-Tahery Al-Mashriky - NCA</strong></figcaption></figure></div><p>But when the National Crime Agency came knocking, they didn&#8217;t just find a graffiti artist in the digital alley. They found <strong>millions of stolen credentials</strong>&#8212;Facebook, Netflix, PayPal, entire swathes of everyday life siphoned off and stashed away like trophies.</p><p>The &#8220;hacktivist&#8221; label was theater. The <strong>credential thief</strong> was the truth.</p><h3><strong>Hacktivism as Stage Prop</strong></h3><p>Defacements are the oldest cyber trick in the book. They&#8217;re cheap, they&#8217;re loud, they get headlines. They also distract.</p><p>Al-Mashriky&#8217;s game wasn&#8217;t advanced exploitation&#8212;it was repetition. He didn&#8217;t need zero-days or bespoke implants. He preyed on the weak, the misconfigured, the forgotten. Each compromised site was another billboard for ideology, another performance to prove he mattered.</p><p>But behind the flashing banners, another show was running:</p><ul><li><p>Harvested credentials spilling out of his devices.</p></li><li><p>Millions of logins sitting in neat little lists ready for resale or reuse.</p></li><li><p>Access turned into currency, traded in the dark corners where digital chatter never stops.</p></li></ul><p>This wasn&#8217;t hacktivism. This was <strong>fraud draped in politics</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vKVu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vKVu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!vKVu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!vKVu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!vKVu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vKVu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vKVu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!vKVu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!vKVu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!vKVu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5de5af2-45f9-4ab3-9b98-aea834a10021_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>The Ego Economy</strong></h3><p>Cybercrime has its own economy, and ego is the tax you can&#8217;t avoid.</p><p>Al-Mashriky didn&#8217;t just hack&#8212;he bragged. On forums and in groups, he claimed <strong>3,000 websites in three months</strong>. Not for money, not even for ideology&#8212;but for recognition.</p><p>Every boast was an IOU to investigators. Every defacement a breadcrumb. Every credential dump another nail in his digital coffin.</p><p>And in the end, it wasn&#8217;t the millions of stolen logins that brought him down. It was the performance. The need to be seen. The compulsive <em>posting of proof</em>.</p><p></p><h3><strong>Why the Sentence Matters (and Why It Doesn&#8217;t)</strong></h3><p>On <strong>August 15, 2025</strong>, the UK court handed him <strong>20 months in prison</strong>. For some, that sounds light. For others, it&#8217;s symbolic: a line in the sand that hacktivism isn&#8217;t harmless vandalism&#8212;it&#8217;s data theft, fraud, and operational disruption wrapped in a slogan.</p><p>But here&#8217;s the uncomfortable truth: while Al-Mashriky serves time, the tactics don&#8217;t. Defacement will remain a smokescreen. Credentials will remain currency. And the next ego-driven operator is already warming up backstage.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4E7L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4E7L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!4E7L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!4E7L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!4E7L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4E7L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4E7L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!4E7L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!4E7L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!4E7L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F104d7686-cc74-494c-9ea9-ae89b23e43a4_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>The CodeAIntel Breakdown</strong></h3><ul><li><p><strong>Defacement is theater.</strong> It grabs headlines, it confuses responders, but it&#8217;s never the real play.</p></li><li><p><strong>The real payload is identity.</strong> Stolen logins fuel fraud, social engineering, and resale markets. That&#8217;s where the money&#8212;and the damage&#8212;lives.</p></li><li><p><strong>Ego is the investigator&#8217;s ally.</strong> Bragging rights on forums accelerate investigations faster than malware signatures ever will.</p></li><li><p><strong>Sentences are signals, not solutions.</strong> Punishment sets precedent, but the cycle persists until credentials stop being the weakest link.</p></li></ul><p></p><h3><strong>What To Do (Before You&#8217;re the Next Stage)</strong></h3><ol><li><p><strong>Audit and isolate.</strong> Stop assuming your public-facing site is &#8220;too small&#8221; to matter. If it can be defaced, it can be used.</p></li><li><p><strong>Credential hygiene isn&#8217;t optional.</strong> Weak or reused passwords are still the number-one breach vector. Kill them before they kill you.</p></li><li><p><strong>Monitor your name in the underground.</strong> If your org pops up in a dump, you&#8217;re not the first to know&#8212;you&#8217;re the last.</p></li><li><p><strong>Don&#8217;t chase graffiti.</strong> If your SOC is consumed by web banners, the real damage&#8212;the credential theft&#8212;has already passed you by.</p></li></ol><p></p><h3><strong>Final Word</strong></h3><p>Al-Mashriky thought he was scripting ideology into cyberspace. In reality, he was a middle-tier credential broker with a flair for banners and a desperate need for clout. The NCA closed his act, but the stage is never empty.</p><p>Somewhere else, another defacer is polishing their slogans, another ego is counting breached sites, and another organization is about to mistake propaganda for the real payload.</p><p>At CodeAIntel, we don&#8217;t watch the slogans. We watch the trade. Because in cybercrime, <strong>the show is never on stage&#8212;it&#8217;s always in the backroom.<br><br>Soruce: https://www.nationalcrimeagency.gov.uk/news/serial-hacker-who-defaced-official-websites-is-sentenced </strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/from-propaganda-to-prison-serial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/from-propaganda-to-prison-serial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.codeaintel.com/p/from-propaganda-to-prison-serial?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Hoops & Hash: When Your Threat Actor Also Plays Pro Ball]]></title><description><![CDATA[Imagine showing up to watch your local Russian basketball team and not knowing the guy draining threes just helped drain your bank account too.That&#8217;s exactly what just played out in France.]]></description><link>https://www.codeaintel.com/p/hoops-and-hash-when-your-threat-actor</link><guid isPermaLink="false">https://www.codeaintel.com/p/hoops-and-hash-when-your-threat-actor</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Fri, 11 Jul 2025 12:34:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aQaf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aQaf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aQaf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!aQaf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!aQaf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!aQaf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aQaf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aQaf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!aQaf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!aQaf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!aQaf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fc0d727-cb3e-48c4-ae5a-c93dca5e3092_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><br>What Actually Happened</h3><p>On July 9, French police picked up <strong>Stanislav Makshantsev</strong>, a 32-year-old Russian pro basketball player, in Provence.<br>They grabbed him on a U.S. extradition request.<br>Why?<br>He&#8217;s accused of helping the <strong>Hive ransomware gang</strong> wash their ransom cash.<br>At least $200,000 in victim payments tracked so far, but prosecutors say that&#8217;s just the tip.</p><p></p><h3>The Real Charges</h3><p>He didn&#8217;t run the ransomware, he didn&#8217;t code it, he didn&#8217;t pop the boxes.<br>He laundered the profits, according to U.S. charges.<br>Multiple bank accounts, crypto swaps, shell companies, all the usual tricks.<br>Hive was one of the nastiest crews around, hitting hospitals, schools, critical infrastructure until the FBI knocked them over in early 2023.<br>Without a launderer, none of that ransom money sticks.<br>Simple math.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RNSt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RNSt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!RNSt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!RNSt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!RNSt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RNSt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RNSt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!RNSt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!RNSt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!RNSt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97076b86-626e-4e21-a819-c6a71d249459_1536x1024.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The Double Life</h3><p>Day job? Semi-pro hoops, Russian national youth team vet, local club contract in France.<br>Night gig? Allegedly moving dirty crypto, turning extorted Bitcoin into clean money.<br>He lived in France for years, nobody blinked.<br>No hoodies in a basement, just a sports jersey and a side hustle that paid more than any mid-tier court ever could.</p><p></p><h3>Why It Actually Matters</h3><p>Everyone thinks ransomware is just the code.<br>It&#8217;s not.<br>The real choke point is the cash out.<br>No mules, no accounts, no shell companies?<br>No payday.<br>Crews like Hive live and die by their launderers.<br>They don&#8217;t wear ski masks, they blend in.<br>Athletes, influencers, gig workers with clean credit &#8212; anyone who can slip big payments past nosey banks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6nbo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6nbo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6nbo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6nbo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6nbo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6nbo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6nbo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6nbo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6nbo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6nbo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd813f285-2166-4dc8-85df-0b7452a35d94_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>What&#8217;s Next</h3><p>Makshantsev&#8217;s lawyers say it&#8217;s all political, but the U.S. wants him on a plane.<br>He&#8217;s stuck in French detention fighting the warrant.<br>Either way, he&#8217;s now the face of an old lesson: ransomware isn&#8217;t just code, it&#8217;s people.<br>Your real risk might be playing pick-up ball while moving millions for someone else&#8217;s extortion ring.</p><h2>The CodeAIntel Take</h2><p>People keep looking for threat actors in basements, but your real threat actor might be draining your account, then draining three-pointers the next day.<br>This is hybrid crime at its cheapest.<br>Take away the money guys and the whole ecosystem starves.<br>Watch the money, watch the mules, and stop assuming everyone with a clean record is really clean.<br>Stay loud, stay paranoid, keep your eyes on the cash.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/hoops-and-hash-when-your-threat-actor?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/hoops-and-hash-when-your-threat-actor?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.codeaintel.com/p/hoops-and-hash-when-your-threat-actor?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Fall of BreachForums: When Hackers Get Hunted]]></title><description><![CDATA[ShinyHunters. Hollow. Noct. Depressed. IntelBroker. Behind every major breach? Them. Behind their fall? A coordinated strike in Europe.]]></description><link>https://www.codeaintel.com/p/the-fall-of-breachforums-when-hackers</link><guid isPermaLink="false">https://www.codeaintel.com/p/the-fall-of-breachforums-when-hackers</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Wed, 25 Jun 2025 17:40:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SGwP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SGwP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SGwP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!SGwP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!SGwP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!SGwP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SGwP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png" width="549" height="823.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:549,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SGwP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!SGwP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!SGwP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!SGwP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9c2a282-f484-4ada-8be1-3805c54f448e_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><br>The Forum That Wouldn&#8217;t Die</h3><p>BreachForums (the V2 version) rose from the ashes of RaidForums and the original BreachForums, both dismantled in high-profile takedowns. But like malware with persistence mode, it came back.</p><p>This wasn&#8217;t just another forum. It was a full-blown marketplace, coordination hub, and PR machine for cybercriminals. And its cast of characters? Top-tier:</p><ul><li><p><strong>ShinyHunters</strong> &#8211; Known for high-volume credential leaks. Think Ticketmaster, AT&amp;T, and dozens more.</p></li><li><p><strong>IntelBroker</strong> &#8211; Credited (or blamed) for leaks targeting U.S. agencies, including the DC Health Link (which manages data for members of Congress).</p></li><li><p><strong>Hollow, Noct, Depressed</strong> &#8211; Moderators, orchestrators, facilitators. The infrastructure layer.</p></li></ul><p>Together, they didn&#8217;t just post data&#8212;they ran a platform that industrialized cybercrime.<br></p><div><hr></div><h3>The French Connection</h3><p>These weren&#8217;t distant arrests from a faceless country. French authorities went hard: coordinated raids in Paris, Normandy, and even R&#233;union Island. Why? Because the forum had been directly tied to breaches of French organizations like SFR and France Travail (ex-P&#244;le Emploi). That&#8217;s millions of French citizens&#8217; data burned&#8212;an attack on national infrastructure.</p><p>And yes, they were reportedly operating under the BreachForums banner until at least April.<br></p><div><hr></div><h3>Why It Matters (More Than You Think)</h3><p>This isn&#8217;t just about shutting down another .onion domain. It&#8217;s about cutting the head off the hydra.</p><ul><li><p><strong>Leadership matters.</strong> These weren&#8217;t low-level posters. This was the command structure.</p></li><li><p><strong>They weren&#8217;t anonymous.</strong> Despite all the opsec memes, these actors had fingerprints. Digital and physical.</p></li><li><p><strong>BreachForums was infrastructure.</strong> Without it, affiliate leaks, ransomware proof-packs, and data resale pipelines stall.</p></li></ul><p>Also: it proves that coordinated law enforcement still works when it hits the right targets.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cC43!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cC43!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!cC43!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!cC43!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!cC43!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cC43!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png" width="538" height="807" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:538,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cC43!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!cC43!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!cC43!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!cC43!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3a23e39-6770-4862-bb89-06781c7458b0_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br></p><div><hr></div><h3>But Don&#8217;t Celebrate Too Soon</h3><p>Forums like this don&#8217;t die. They mutate.</p><p>ShinyHunters goes down? Someone else will copy the brand. IntelBroker disappears? Another persona will emerge with the same tone and tools.</p><p>The <em>idea</em> of BreachForums&#8212;a scalable, moderated data crime platform&#8212;is harder to kill than the admins who built it.</p><p>What&#8217;s next:</p><ul><li><p>A diaspora of members moving to alt forums and Telegram</p></li><li><p>Clones, rebrands, and phoenix domains</p></li><li><p>Law enforcement lurking in places we haven&#8217;t seen yet</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EFyJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EFyJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!EFyJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!EFyJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!EFyJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EFyJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png" width="591" height="886.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:591,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EFyJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!EFyJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!EFyJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!EFyJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d74dfdd-a063-4a5e-a3e0-0d057162960e_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The CodeAIntel Take</h3><p>This takedown is a tactical win. But we&#8217;re in a long war.</p><p>Criminal forums today aren&#8217;t just message boards. They&#8217;re logistics chains. They run on crypto, they enforce refunds, they manage disputes, and they move at the speed of startup culture.<br></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Your SSN Is Worth Less Than Coffee — and Russian Hackers Know It.]]></title><description><![CDATA[Russian cybercriminals are selling verified U.S. Social Security numbers, VINs, DLs, even your mother&#8217;s maiden name. all happening in broad daylight, paid in crypto, and clocked by Moscow time.]]></description><link>https://www.codeaintel.com/p/your-ssn-is-worth-less-than-coffee</link><guid isPermaLink="false">https://www.codeaintel.com/p/your-ssn-is-worth-less-than-coffee</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Wed, 11 Jun 2025 16:01:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eHdy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eHdy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eHdy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!eHdy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!eHdy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!eHdy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eHdy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eHdy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!eHdy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!eHdy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!eHdy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3c5da28-9d99-4b84-9a0a-2f3a917e496a_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>In dark corners of Russian-run cyber marketplaces, that chilling pitch isn't hyperbole, it&#8217;s the daily reality. What feels like a minor revelation is actually a full-blown violation: Russian hackers are trading detailed profiles of American citizens, drawn from active U.S. databases. And they&#8217;re doing it with the audacity of open markets, crypto wallets in hand.</p><div><hr></div><h2>The Digital Bazaar: How It Works</h2><p>On underground forums (many multilingual in Russian and English), vendors publish menus that look disturbingly benign:</p><ul><li><p><strong>SSN + DOB</strong>:&#8239;$7</p></li><li><p><strong>SSN last 4 + DOB</strong>:&#8239;$4</p></li><li><p><strong>Reverse SSN lookups</strong>:&#8239;$8</p></li><li><p><strong>Driver&#8217;s license info</strong>:&#8239;$8</p></li><li><p><strong>Mother&#8217;s maiden name</strong>:&#8239;$15</p></li><li><p><strong>Address, phone number, VIN</strong>:&#8239;$2 each</p></li></ul><p>These aren&#8217;t scraps, they&#8217;re pulled straight from leaked U.S. databases. Each entry is carefully packaged: full names, birth dates, license info, even credit histories, all ready-to-use for identity theft, fraudulent loan applications, or covert espionage.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1kc6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1kc6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 424w, https://substackcdn.com/image/fetch/$s_!1kc6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 848w, https://substackcdn.com/image/fetch/$s_!1kc6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 1272w, https://substackcdn.com/image/fetch/$s_!1kc6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1kc6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png" width="1406" height="885" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:885,&quot;width&quot;:1406,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:47545,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/165714108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!1kc6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 424w, https://substackcdn.com/image/fetch/$s_!1kc6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 848w, https://substackcdn.com/image/fetch/$s_!1kc6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 1272w, https://substackcdn.com/image/fetch/$s_!1kc6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98acb1d3-ca71-4c9c-881d-eee6ed12acdc_1406x885.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Crypto Payments &amp; Moscow Time Shifts the Blame</h2><p>Yes, payments are anonymous, primarily in Bitcoin (BTC) or Tether (USDT), and support is &#8220;respectful&#8221; and professional (their words, not ours). The entire operation runs like a legitimate business: wholesale orders handled individually, 100% upfront payments, refunds if the data&#8217;s invalid, and a service window aligned to &#8220;12:00&#8211;00:00 Moscow time.&#8221;</p><p>It&#8217;s a chilling normalization of cybercrime, no red flags, no reservations, just cold, transactional logic shrouded in digital deniability.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4-8z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4-8z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 424w, https://substackcdn.com/image/fetch/$s_!4-8z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 848w, https://substackcdn.com/image/fetch/$s_!4-8z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 1272w, https://substackcdn.com/image/fetch/$s_!4-8z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4-8z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png" width="780" height="896" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:896,&quot;width&quot;:780,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1392941,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.codeaintel.com/i/165714108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!4-8z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 424w, https://substackcdn.com/image/fetch/$s_!4-8z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 848w, https://substackcdn.com/image/fetch/$s_!4-8z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 1272w, https://substackcdn.com/image/fetch/$s_!4-8z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2abf5751-8c9e-4bb3-9ca5-d7a8970d4792_780x896.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Why This Is More Than Just Identity Theft</h2><p>Let&#8217;s unpack the far-reaching implications:</p><ul><li><p><strong>High precision tools for mass deception</strong><br>Hackers aren&#8217;t randomly guessing identities, they&#8217;re deploying complete dossiers. Imagine someone using stolen SSN and DOB paired with driver&#8217;s license info to open lines of credit in minutes.</p></li><li><p><strong>State-enabled infrastructure, state-enabled reach</strong><br>The tone, language, and timing suggest these actors are embedded somewhere within Russian-aligned cyber ecosystems, part of infrastructure orchestrated for geopolitical advantage.</p></li><li><p><strong>Psychological warfare on the U.S. public</strong><br>It&#8217;s not just data, it&#8217;s a message: &#8220;We&#8217;re inside your databases, and we know your identity.&#8221; Undermining trust in systems is subtle but destabilizing.</p></li></ul><div><hr></div><h2>The Underlying Threat: Digital Sovereignty at Risk</h2><p>This isn&#8217;t just about credit card theft, it&#8217;s about erosion of digital sovereignty. U.S. citizens are waking up to cold, hard proof that their lives are on sale in foreign cyber marketplaces. Where once we worried about traditional hacking and ransomware, now <strong>our identities are commodities.</strong></p><p>As transactional data becomes more granular and accessible, these markets could fuel everything from deepfakes to targeted political influence campaigns.</p><div><hr></div><h3>Final Thought</h3><p>The next time you hear that identity theft is &#8220;just a minor inconvenience,&#8221; remember this: Russian hackers are actively selling your identity, SSNs, driver licenses, phone numbers, as if they were spare keys. And it&#8217;s not happening in some hidden corner of the internet, it&#8217;s on display, near-globally accessible, and frighteningly well-structured.</p><p>Americans need to wake up. Our digital selves are under siege, and above all, we must treat them as assets worth defending.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[OmniGPT’s Massive Data Leak: 30,000 Emails, 34 Million Messages]]></title><description><![CDATA[While OpenAI&#8217;s systems remain uncompromised, a new breach has surfaced, affecting OmniGPT.co&#8212;a lesser-known ChatGPT alternative.]]></description><link>https://www.codeaintel.com/p/omnigpts-massive-data-leak-30000</link><guid isPermaLink="false">https://www.codeaintel.com/p/omnigpts-massive-data-leak-30000</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Wed, 12 Feb 2025 16:12:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EsY2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EsY2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EsY2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!EsY2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!EsY2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!EsY2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EsY2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A realistic cybercrime operation in progress: a dark room filled with multiple computer monitors displaying stolen user data. A hacker wearing a black hoodie and mask types rapidly, while another figure stands in the shadows observing. The atmosphere is tense, with dim lighting and reflections of data streams flashing across their faces.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A realistic cybercrime operation in progress: a dark room filled with multiple computer monitors displaying stolen user data. A hacker wearing a black hoodie and mask types rapidly, while another figure stands in the shadows observing. The atmosphere is tense, with dim lighting and reflections of data streams flashing across their faces." title="A realistic cybercrime operation in progress: a dark room filled with multiple computer monitors displaying stolen user data. A hacker wearing a black hoodie and mask types rapidly, while another figure stands in the shadows observing. The atmosphere is tense, with dim lighting and reflections of data streams flashing across their faces." srcset="https://substackcdn.com/image/fetch/$s_!EsY2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!EsY2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!EsY2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!EsY2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a91b1d-0de6-4eca-b725-cc63c42a7b79_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><br>The Truth Behind the "ChatGPT Hack" Claims</h2><p>In the last days, the cybersecurity community has been buzzing with alarming headlines about a so-called "ChatGPT data breach." A widely circulated post on underground forums claimed that a threat actor had stolen 20 million OpenAI account credentials, offering them for sale at a nominal price. However, as is often the case in the cybercrime ecosystem, the reality is far different from the sensationalized claims.</p><p>The alleged "breach" was, in fact, another case of stealer logs being marketed as a large-scale compromise. Instead of a direct breach of OpenAI&#8217;s systems, these credentials were most likely harvested through infostealer malware deployed on compromised devices. Infostealers like RedLine, Raccoon, and Vidar are commonly used by cybercriminals to extract saved credentials from infected systems, later repackaging and reselling them under the guise of a large-scale hack. This pattern has been seen before, with previous "hacks" of platforms such as Netflix, Facebook, and LinkedIn often being nothing more than aggregated logs from compromised users.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FQrL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FQrL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 424w, https://substackcdn.com/image/fetch/$s_!FQrL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 848w, https://substackcdn.com/image/fetch/$s_!FQrL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 1272w, https://substackcdn.com/image/fetch/$s_!FQrL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FQrL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png" width="615" height="815" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:815,&quot;width&quot;:615,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:353813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FQrL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 424w, https://substackcdn.com/image/fetch/$s_!FQrL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 848w, https://substackcdn.com/image/fetch/$s_!FQrL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 1272w, https://substackcdn.com/image/fetch/$s_!FQrL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58f767af-e085-4ded-a0ab-ba5c6d9040fc_615x815.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Fake News.</figcaption></figure></div><p></p><h2>The Difference Between a Breach and Stealer Logs</h2><p>A genuine data breach occurs when an attacker successfully infiltrates a system, extracting sensitive information directly from the target&#8217;s infrastructure. This often results from security misconfigurations, zero-day vulnerabilities, or credential stuffing attacks. On the other hand, stealer logs contain credentials stolen from individual users&#8217; devices, often obtained through phishing campaigns, malicious browser extensions, or Trojanized software downloads. While both pose security risks, the implications of a direct database breach are far more severe, as they indicate flaws in the organization&#8217;s security posture.</p><p>Unlike a stealer log dump, a direct database breach means the attacker had access to user communications, stored information, and potentially proprietary data&#8212;something far more damaging than a simple credential theft. And that brings us to the latest, more concerning case: OmniGPT.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EEa8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EEa8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!EEa8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!EEa8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!EEa8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EEa8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A realistic dark web marketplace where cybercriminals are trading stolen AI user data. Individuals wearing hoodies and masks sit at dimly lit desks, working on encrypted laptops. Screens show lists of stolen credentials and payment transactions in cryptocurrency. The atmosphere is secretive, with faint neon lights reflecting off the equipment.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A realistic dark web marketplace where cybercriminals are trading stolen AI user data. Individuals wearing hoodies and masks sit at dimly lit desks, working on encrypted laptops. Screens show lists of stolen credentials and payment transactions in cryptocurrency. The atmosphere is secretive, with faint neon lights reflecting off the equipment." title="A realistic dark web marketplace where cybercriminals are trading stolen AI user data. Individuals wearing hoodies and masks sit at dimly lit desks, working on encrypted laptops. Screens show lists of stolen credentials and payment transactions in cryptocurrency. The atmosphere is secretive, with faint neon lights reflecting off the equipment." srcset="https://substackcdn.com/image/fetch/$s_!EEa8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!EEa8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!EEa8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!EEa8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ede0f1a-932b-42be-abee-83456c87b90c_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>OmniGPT&#8217;s Massive Data Leak: 30,000 Emails, 34 Million Messages</h2><p>While OpenAI&#8217;s systems remain uncompromised, a new breach has surfaced, affecting OmniGPT.co&#8212;a lesser-known ChatGPT alternative. A hacker operating under the alias "Gloomer" recently posted on a cybercrime forum, offering a database containing:</p><ul><li><p>30,000 user emails and phone numbers</p></li><li><p>34 million messages exchanged between users and the chatbot</p></li><li><p>Files uploaded by users, potentially containing sensitive information</p></li></ul><p>The leaked messages, according to the threat actor, may contain API keys, credentials, and billing information&#8212;an alarming prospect considering the growing reliance on AI chatbots for professional and personal use.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wmz5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wmz5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 424w, https://substackcdn.com/image/fetch/$s_!Wmz5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 848w, https://substackcdn.com/image/fetch/$s_!Wmz5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 1272w, https://substackcdn.com/image/fetch/$s_!Wmz5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wmz5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png" width="1456" height="538" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:538,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:313129,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wmz5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 424w, https://substackcdn.com/image/fetch/$s_!Wmz5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 848w, https://substackcdn.com/image/fetch/$s_!Wmz5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 1272w, https://substackcdn.com/image/fetch/$s_!Wmz5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4dcfced-b9f0-4cd2-a24b-fbc2d4a37f9d_1719x635.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br></p><p>Unlike the misleading OpenAI breach claims, this OmniGPT leak appears to be legitimate. However, the exact method of compromise remains unknown. Possible explanations include a misconfigured database, an exposed API endpoint, or an insider threat. Given that the breach contains both user communications and metadata, it is likely that the attacker gained full access to OmniGPT&#8217;s backend systems.</p><h2>Implications and Lessons</h2><p>This breach serves as yet another reminder that AI-driven platforms, particularly third-party alternatives to mainstream models, are becoming attractive targets for cybercriminals. Users should be especially cautious when entering sensitive information into these platforms, as their security standards may not match those of established companies like OpenAI or Google.</p><p>Additionally, organizations must enforce strict data protection measures, including:</p><ul><li><p>Proper encryption of stored user data</p></li><li><p>Regular security audits and penetration testing</p></li><li><p>Restricting API access to authorized users</p></li><li><p>Implementing multi-factor authentication (MFA) for administrative access<br></p></li></ul><p>While OpenAI users can breathe easy knowing the recent claims were exaggerated, OmniGPT users should take immediate precautions, such as changing associated credentials and reviewing any sensitive data they may have shared.</p><p>As AI adoption continues to accelerate, so too will the cybersecurity threats against these platforms. Staying informed and vigilant is no longer optional&#8212;it&#8217;s a necessity.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gDU1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gDU1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!gDU1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!gDU1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!gDU1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gDU1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A realistic data center breach: security guards rushing into a high-tech server room where hackers have infiltrated. The scene is filled with blue and red alarm lights flashing, a laptop on a desk showing &#8216;DATA BREACH DETECTED,&#8217; and a hacker escaping through the emergency exit.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A realistic data center breach: security guards rushing into a high-tech server room where hackers have infiltrated. The scene is filled with blue and red alarm lights flashing, a laptop on a desk showing &#8216;DATA BREACH DETECTED,&#8217; and a hacker escaping through the emergency exit." title="A realistic data center breach: security guards rushing into a high-tech server room where hackers have infiltrated. The scene is filled with blue and red alarm lights flashing, a laptop on a desk showing &#8216;DATA BREACH DETECTED,&#8217; and a hacker escaping through the emergency exit." srcset="https://substackcdn.com/image/fetch/$s_!gDU1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!gDU1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!gDU1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!gDU1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e7781b0-67e3-45e1-8b7d-b489f4239c64_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/omnigpts-massive-data-leak-30000?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/omnigpts-massive-data-leak-30000?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.codeaintel.com/p/omnigpts-massive-data-leak-30000?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware]]></title><description><![CDATA[A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams designed to deceive victims into installing malware such as StealC, Atomic macOS Stealer...]]></description><link>https://www.codeaintel.com/p/crazy-evil-gang-targets-crypto-with</link><guid isPermaLink="false">https://www.codeaintel.com/p/crazy-evil-gang-targets-crypto-with</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Wed, 05 Feb 2025 14:31:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rtbX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rtbX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rtbX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!rtbX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!rtbX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!rtbX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rtbX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A futuristic and visually striking representation of a cyber heist, with a masked hacker draining cryptocurrency from multiple wallets. The image should showcase digital assets disappearing in a neon-glowing blockchain network, with hacker tools and phishing links on the screens. The aesthetic should be dark, cinematic, and attention-grabbing.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A futuristic and visually striking representation of a cyber heist, with a masked hacker draining cryptocurrency from multiple wallets. The image should showcase digital assets disappearing in a neon-glowing blockchain network, with hacker tools and phishing links on the screens. The aesthetic should be dark, cinematic, and attention-grabbing." title="A futuristic and visually striking representation of a cyber heist, with a masked hacker draining cryptocurrency from multiple wallets. The image should showcase digital assets disappearing in a neon-glowing blockchain network, with hacker tools and phishing links on the screens. The aesthetic should be dark, cinematic, and attention-grabbing." srcset="https://substackcdn.com/image/fetch/$s_!rtbX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!rtbX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!rtbX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!rtbX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d1a145-faec-467d-ad74-ac2fd38c9163_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><br><strong>What Happened?</strong></h2><p>Crazy Evil operates as a well-coordinated traffer network, specializing in <strong>identity fraud, cryptocurrency theft, and malware distribution.</strong> The gang relies on traffers&#8212;social engineering experts&#8212;who redirect legitimate traffic to malicious phishing pages. These traffers exploit platforms like Telegram, where their network operates under the alias <strong>@c,</strong> boasting over <strong>4,800 subscribers.</strong></p><p>Since at least <strong>2021,</strong> Crazy Evil has acted as an intermediary, directing traffic to botnet operators who compromise users based on region, operating system, or specific targeting needs. According to researchers, their model closely resembles <strong>lead generation</strong>, but instead of selling products, they deliver victims to cybercriminal groups.</p><p>Unlike typical e-commerce scams, <strong>Crazy Evil specializes in digital asset theft</strong>, targeting non-fungible tokens (NFTs), cryptocurrencies, payment cards, and online banking accounts. Their operations have generated over <strong>$5 million in illicit revenue</strong> and compromised <strong>tens of thousands of devices worldwide.<br></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l7Ew!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l7Ew!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!l7Ew!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!l7Ew!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!l7Ew!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l7Ew!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-impact, visually striking digital illustration of a cybercriminal group operating through Telegram. The image should depict a shadowy figure overseeing multiple computer screens displaying cryptocurrency transactions, phishing scams, and malware distribution. The aesthetic should be dark, high-tech, and cinematic, designed to grab attention and intrigue viewers.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-impact, visually striking digital illustration of a cybercriminal group operating through Telegram. The image should depict a shadowy figure overseeing multiple computer screens displaying cryptocurrency transactions, phishing scams, and malware distribution. The aesthetic should be dark, high-tech, and cinematic, designed to grab attention and intrigue viewers." title="A high-impact, visually striking digital illustration of a cybercriminal group operating through Telegram. The image should depict a shadowy figure overseeing multiple computer screens displaying cryptocurrency transactions, phishing scams, and malware distribution. The aesthetic should be dark, high-tech, and cinematic, designed to grab attention and intrigue viewers." srcset="https://substackcdn.com/image/fetch/$s_!l7Ew!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!l7Ew!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!l7Ew!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!l7Ew!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7640e16-ade8-4d26-848f-576cd47c3b4c_1024x1024.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Why This Matters</strong></h2><p>While many scam groups operate within narrow silos, Crazy Evil&#8217;s <strong>malware arsenal spans both Windows and macOS,</strong> broadening their attack surface. Their campaigns are <strong>highly targeted</strong>, with traffers spending days or weeks conducting reconnaissance before launching attacks.</p><p>Recent <strong>exit scams</strong> involving cybercrime groups <strong>Markopolo and CryptoLove</strong> have left a gap in the black market, and Crazy Evil has <strong>stepped in to fill the void</strong>. Their tactics have evolved into a <strong>fully structured affiliate program,</strong> offering instruction manuals, crypter services, and operational support to traffers.</p><h3><strong>Crypto Drainer Malware Operations</strong></h3><p>Crazy Evil operates through multiple sub-teams, each managing a specific scam to spread malware under the guise of legitimate services:</p><ul><li><p><strong>AVLAND (AVS | RG or AVENGE)</strong> &#8211; Uses fake job offers and investment scams to distribute <strong>StealC and AMOS</strong> via a fake Web3 tool called Voxium.</p></li><li><p><strong>TYPED</strong> &#8211; Propagates <strong>AMOS stealer</strong> disguised as an AI software named TyperDex.</p></li><li><p><strong>DELAND</strong> &#8211; Spreads <strong>AMOS stealer</strong> under the pretense of a community development platform called DeMeet.</p></li><li><p><strong>ZOOMLAND</strong> &#8211; Uses phishing pages impersonating <strong>Zoom and WeChat</strong> to infect users with AMOS stealer.</p></li><li><p><strong>DEFI</strong> &#8211; Distributes <strong>AMOS stealer</strong> via a fake digital asset management service named Selenium Finance.</p></li><li><p><strong>KEVLAND</strong> &#8211; Spreads <strong>AMOS stealer</strong> disguised as AI-powered virtual meeting software called Gatherum.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M5qJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M5qJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!M5qJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!M5qJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!M5qJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M5qJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;An artistic, cinematic-style depiction of a hacker using a stolen cryptocurrency wallet. The image should feature a dark, futuristic setting with a glowing laptop screen displaying a drained crypto wallet, red warning messages, and a masked figure typing on a keyboard. The composition should be intense, with a focus on digital crime and financial loss.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An artistic, cinematic-style depiction of a hacker using a stolen cryptocurrency wallet. The image should feature a dark, futuristic setting with a glowing laptop screen displaying a drained crypto wallet, red warning messages, and a masked figure typing on a keyboard. The composition should be intense, with a focus on digital crime and financial loss." title="An artistic, cinematic-style depiction of a hacker using a stolen cryptocurrency wallet. The image should feature a dark, futuristic setting with a glowing laptop screen displaying a drained crypto wallet, red warning messages, and a masked figure typing on a keyboard. The composition should be intense, with a focus on digital crime and financial loss." srcset="https://substackcdn.com/image/fetch/$s_!M5qJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!M5qJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!M5qJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!M5qJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13fd330d-5978-4caa-8eb9-5a359cff4e54_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><h3><strong>The Bigger Picture</strong></h3><p>Crazy Evil&#8217;s model represents the next evolution of <strong>cybercrime-as-a-service (CaaS).</strong> With the use of <strong>Telegram as a command hub</strong>, traffers are directed to private channels, each dedicated to specific criminal activities:</p><ul><li><p><strong>Payments Channel</strong> &#8211; Tracks traffers&#8217; earnings.</p></li><li><p><strong>Logbar</strong> &#8211; Provides details of stolen credentials and attack successes.</p></li><li><p><strong>Info Channel</strong> &#8211; Shares administrative and technical updates.</p></li><li><p><strong>Global Chat</strong> &#8211; Acts as a general forum for traffers.</p></li></ul><p>Beyond phishing attacks and malware distribution, Crazy Evil&#8217;s tactics <strong>mirror those of nation-state actors</strong> in the way they conduct intelligence gathering before deploying malware. Their approach involves deep reconnaissance, personalized phishing lures, and <strong>persistent targeting of high-value cryptocurrency users.<br></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aii1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aii1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!aii1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!aii1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!aii1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aii1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A dramatic, high-quality image of a cybercriminal organization laundering stolen cryptocurrency through multiple digital transactions. The image should depict a neon-lit dark web interface with blockchain transfers, wallet addresses, and security breaches in progress. The composition should be highly detailed, evoking the atmosphere of cyber warfare and financial crime.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A dramatic, high-quality image of a cybercriminal organization laundering stolen cryptocurrency through multiple digital transactions. The image should depict a neon-lit dark web interface with blockchain transfers, wallet addresses, and security breaches in progress. The composition should be highly detailed, evoking the atmosphere of cyber warfare and financial crime." title="A dramatic, high-quality image of a cybercriminal organization laundering stolen cryptocurrency through multiple digital transactions. The image should depict a neon-lit dark web interface with blockchain transfers, wallet addresses, and security breaches in progress. The composition should be highly detailed, evoking the atmosphere of cyber warfare and financial crime." srcset="https://substackcdn.com/image/fetch/$s_!aii1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!aii1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!aii1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!aii1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4f3376b-a008-4a0b-95ec-ac46f901b397_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>The Bottom Line</strong></h3><p>As long as <strong>crypto scams remain lucrative</strong>, groups like Crazy Evil will continue to evolve. Their <strong>highly structured, well-organized trafficking system</strong> makes them an ongoing threat to the cryptocurrency sector. Cybersecurity teams must remain <strong>constantly vigilant</strong> as criminals refine their social engineering playbook.</p><p>The game is changing. <strong>Threat actors aren&#8217;t just using malware&#8212;they&#8217;re building entire business models around deception, infiltration, and monetization.</strong></p><p>Stay ahead. Stay informed.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fJpW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fJpW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!fJpW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!fJpW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!fJpW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fJpW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A highly dramatic and visually intense illustration of a cyber attack on cryptocurrency wallets. The image should depict a futuristic hacker using sophisticated malware to drain digital assets from unsuspecting victims. A glowing blockchain network being infiltrated, with ominous red warnings flashing on a computer screen, creating an atmosphere of urgency and cyber warfare.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A highly dramatic and visually intense illustration of a cyber attack on cryptocurrency wallets. The image should depict a futuristic hacker using sophisticated malware to drain digital assets from unsuspecting victims. A glowing blockchain network being infiltrated, with ominous red warnings flashing on a computer screen, creating an atmosphere of urgency and cyber warfare." title="A highly dramatic and visually intense illustration of a cyber attack on cryptocurrency wallets. The image should depict a futuristic hacker using sophisticated malware to drain digital assets from unsuspecting victims. A glowing blockchain network being infiltrated, with ominous red warnings flashing on a computer screen, creating an atmosphere of urgency and cyber warfare." srcset="https://substackcdn.com/image/fetch/$s_!fJpW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!fJpW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!fJpW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!fJpW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845eee4f-35f6-42db-a4e7-aad16897560e_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[FBI WIPES OUT MAJOR HACKING FORUMS AND ILLICIT SERVICES. MAJOR HIT TO THE HACKER UNDERGROUND?]]></title><description><![CDATA[The takedown heard around the dark web&#8212;Cracked[.]io, Nulled[.]to, Sellix[.]io, Mysellix[.]io,some of the biggest hacking forums, have been seized by the FBI - Operation Talent.]]></description><link>https://www.codeaintel.com/p/fbi-wipes-out-major-hacking-forums</link><guid isPermaLink="false">https://www.codeaintel.com/p/fbi-wipes-out-major-hacking-forums</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Wed, 29 Jan 2025 21:38:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xeEk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xeEk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xeEk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!xeEk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!xeEk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!xeEk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xeEk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A visually intense image of a cybercriminal&#8217;s keyboard being dramatically yanked away by a digital FBI hand, symbolizing law enforcement shutting down hacker operations. The keys glow in neon colors, with 'Breach' and 'Seized' flashing on the screen. The aesthetic is futuristic, dark, and designed to go viral.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A visually intense image of a cybercriminal&#8217;s keyboard being dramatically yanked away by a digital FBI hand, symbolizing law enforcement shutting down hacker operations. The keys glow in neon colors, with 'Breach' and 'Seized' flashing on the screen. The aesthetic is futuristic, dark, and designed to go viral." title="A visually intense image of a cybercriminal&#8217;s keyboard being dramatically yanked away by a digital FBI hand, symbolizing law enforcement shutting down hacker operations. The keys glow in neon colors, with 'Breach' and 'Seized' flashing on the screen. The aesthetic is futuristic, dark, and designed to go viral." srcset="https://substackcdn.com/image/fetch/$s_!xeEk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!xeEk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!xeEk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!xeEk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F071692e2-a621-4c8c-b329-1198c4590dd4_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>These weren&#8217;t just your average forums. They were breeding grounds for cybercrime, offering everything from stolen credentials to cracked software, botnets, malware, and fraud tools. And now? They&#8217;re gone.</p><h1>What Happened?</h1><p>Late last night, visitors to Cracked.io, Nulled.to, Sellix.io, Mysellix.io, and Starkrdp.io were met with a familiar sight&#8212;a government seizure notice stamped with the logos of the FBI, DOJ, and international law enforcement partners.</p><p>The forums, which collectively boasted millions of registered users, have been under surveillance for months. Authorities didn&#8217;t just take them down; they likely scooped up huge amounts of user data, which could mean arrests are incoming for high-profile members.</p><h1>Why Does This Matter?</h1><p>This is not just another forum takedown. This move hits some of the biggest marketplaces for cybercriminal tools and data&#8212;and it sends a clear message: law enforcement is closing in.</p><p>Here&#8217;s what made these forums different:</p><p>Massive marketplaces for stolen credentials &#8211; Data dumps, login breaches, and leaked databases were constantly traded.</p><p>Cracked software &amp; malware distribution &#8211; These forums specialized in breaking software protections and repackaging malware-laced programs.</p><p>Cybercrime-as-a-service (CaaS) &#8211; Botnets, phishing kits, and automated attack tools were available for purchase.</p><p><br>This isn&#8217;t just about these forums. It&#8217;s about the underground&#8217;s ability to keep operating.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!abxd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!abxd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!abxd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!abxd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!abxd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!abxd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:409606,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!abxd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!abxd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!abxd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!abxd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62a7beee-945e-425d-8058-c4b10d98366c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>What&#8217;s next?</h1><p>Users will scatter to new forums, Telegram groups, and dark web sites.</p><p>Law enforcement is watching. This kind of takedown doesn&#8217;t happen without long-term surveillance. Expect more busts.</p><p>Leaked user data? If the FBI has full access to forum databases, high-profile members could be exposed, arrested, or doxxed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ReWH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ReWH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ReWH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ReWH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ReWH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ReWH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:428544,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ReWH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ReWH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ReWH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ReWH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee3fd53a-90e5-45f7-bb41-ca4e4ef00b7e_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h1>The Bottom Line</h1><p>For years, these forums were the go-to platforms for cybercriminals looking for tools, stolen credentials, and illicit services. Now, they&#8217;re gone&#8212;and their users are on the run.</p><p>But the cycle continues. Another forum will rise. Another takedown will follow.</p><p>The game never stops. But for now? Law enforcement is winning.</p><p> Stay ahead of the underground. Subscribe to CodeAIntel for exclusive insights into the cybercrime ecosystem.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cRlr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cRlr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cRlr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cRlr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cRlr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cRlr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:430990,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cRlr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cRlr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cRlr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cRlr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0452a1d-635e-45c8-bfd3-e3ddfa4c8074_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Belsen Group just dropped 15,000 FortiGate targets on BreachForums. ]]></title><description><![CDATA[In a bold start to 2025, the hacking collective known as the Belsen Group has made waves on BreachedForums by releasing over 15,000 FortiGate targets, including sensitive configurations, IPs, and PW's]]></description><link>https://www.codeaintel.com/p/belsen-group-15000-just-dropped-fortigate</link><guid isPermaLink="false">https://www.codeaintel.com/p/belsen-group-15000-just-dropped-fortigate</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Thu, 16 Jan 2025 02:10:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2VsG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2VsG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2VsG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!2VsG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!2VsG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!2VsG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2VsG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;An intricate, high-detail illustration of a cybersecurity terminal being hacked, with streams of glowing data flowing out of the screen. The scene should depict an intense digital environment, combining cyberpunk elements and modern tech visuals to captivate the audience. Use vibrant neon lights and a dark, futuristic background to emphasize the drama.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An intricate, high-detail illustration of a cybersecurity terminal being hacked, with streams of glowing data flowing out of the screen. The scene should depict an intense digital environment, combining cyberpunk elements and modern tech visuals to captivate the audience. Use vibrant neon lights and a dark, futuristic background to emphasize the drama." title="An intricate, high-detail illustration of a cybersecurity terminal being hacked, with streams of glowing data flowing out of the screen. The scene should depict an intense digital environment, combining cyberpunk elements and modern tech visuals to captivate the audience. Use vibrant neon lights and a dark, futuristic background to emphasize the drama." srcset="https://substackcdn.com/image/fetch/$s_!2VsG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!2VsG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!2VsG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!2VsG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20f3297-e6b9-4050-a9d8-484e9cb39468_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>Belsen Group has kicked off 2025 with a cyberattack that sends shockwaves through the global cybersecurity community. On the infamous BreachedForums, the group announced their acquisition of sensitive data from over 15,000 Fortigate devices worldwide. The leaked data, categorized by country, includes full configuration dumps and VPN password files. What&#8217;s more, this trove of information is being offered completely free, signaling a bold and potentially catastrophic cyber incident.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7_vh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7_vh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 424w, https://substackcdn.com/image/fetch/$s_!7_vh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 848w, https://substackcdn.com/image/fetch/$s_!7_vh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 1272w, https://substackcdn.com/image/fetch/$s_!7_vh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7_vh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png" width="1265" height="457" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:457,&quot;width&quot;:1265,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:362512,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7_vh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 424w, https://substackcdn.com/image/fetch/$s_!7_vh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 848w, https://substackcdn.com/image/fetch/$s_!7_vh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 1272w, https://substackcdn.com/image/fetch/$s_!7_vh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ebffa0-f598-4e76-a909-6626a2f38724_1265x457.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>What Happened?</strong></h3><p>A ZIP file shared by the Belsen Group contains folders for each targeted IP address. Inside each folder are two critical files:</p><ol><li><p><strong>config.conf</strong> &#8211; A full configuration dump of the Fortigate device.</p></li><li><p><strong>vpn-passwords.txt</strong> &#8211; Sensitive VPN access credentials.</p></li></ol><p>Analysis reveals that the leaked data likely originates from Fortigate 7.x and 7.2.x devices, hinting at a potential zero-day exploit in Fortinet&#8217;s latest firmware. Some of the IP addresses even align with Shodan, a search engine for internet-connected devices, suggesting targeted reconnaissance was employed to identify these systems.</p><p>The legitimacy of the data is supported by the unique configurations and the alignment of these devices to Shodan queries, demonstrating a calculated and effective breach.</p><div><hr></div><h3><strong>Why This Matters</strong></h3><p>The scale of this breach, affecting over 15,000 devices in both governmental and private sectors, underscores the severity of the attack. Here&#8217;s why it poses a significant threat:</p><ul><li><p><strong>Network Compromise</strong>: With access to configuration files and VPN passwords, attackers could infiltrate sensitive networks undetected.</p></li><li><p><strong>Zero-Day Exploit</strong>: The possibility of an unreported Fortigate vulnerability means thousands of organizations worldwide are at immediate risk.</p></li><li><p><strong>Supply Chain Implications</strong>: Breached Fortigate devices could serve as entry points for further attacks, compromising entire ecosystems.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!318l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!318l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!318l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!318l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!318l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!318l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-definition artistic rendering of a futuristic server room being hacked, with neon light reflections and cascading streams of red alert symbols. The scene is dark and intense, showing both glowing computer systems and a sense of vulnerability, perfectly capturing the drama of a cyber attack. Use cyberpunk-inspired elements to captivate the audience.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-definition artistic rendering of a futuristic server room being hacked, with neon light reflections and cascading streams of red alert symbols. The scene is dark and intense, showing both glowing computer systems and a sense of vulnerability, perfectly capturing the drama of a cyber attack. Use cyberpunk-inspired elements to captivate the audience." title="A high-definition artistic rendering of a futuristic server room being hacked, with neon light reflections and cascading streams of red alert symbols. The scene is dark and intense, showing both glowing computer systems and a sense of vulnerability, perfectly capturing the drama of a cyber attack. Use cyberpunk-inspired elements to captivate the audience." srcset="https://substackcdn.com/image/fetch/$s_!318l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!318l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!318l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!318l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2558fcde-0ce9-47e4-8191-67b91af7a83d_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><div><hr></div><h3><strong>The Bigger Picture</strong></h3><p>This incident is another example of threat actors exploiting overlooked or undisclosed vulnerabilities in widely used systems. Fortinet devices are staples in the cybersecurity infrastructure of countless organizations, and a breach of this magnitude undermines trust in critical systems.</p><p>The Belsen Group&#8217;s audacity to release the data for free adds a layer of chaos to the event. While some see it as an act of defiance, it&#8217;s clear that this move was designed to attract attention, disrupt systems, and erode confidence in cybersecurity standards.</p><div><hr></div><h3><strong>The Bottom Line</strong></h3><p>This is a wake-up call for organizations relying on Fortinet products. Immediate actions to mitigate risks include:</p><ul><li><p><strong>Audit and Update</strong>: Ensure devices are running the latest firmware versions, and review configurations for vulnerabilities.</p></li><li><p><strong>Change Credentials</strong>: Update all VPN credentials as a precaution.</p></li><li><p><strong>Monitor Traffic</strong>: Proactively monitor for unauthorized access or unusual network behavior.</p></li></ul><p>The Belsen Group has made a bold statement, but this is far from the end of the story. The incident demonstrates that no organization, no matter how robust its security measures, is immune to determined threat actors.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pKj8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pKj8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!pKj8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!pKj8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!pKj8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pKj8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-impact, photorealistic illustration of a digital padlock being shattered by neon cyber elements, symbolizing the breach of secure data. The scene combines glowing fragments and dramatic lighting, set against a dark, tech-heavy background. The visual should inspire awe and urgency, perfect for grabbing the attention of a cybersecurity-focused audience.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-impact, photorealistic illustration of a digital padlock being shattered by neon cyber elements, symbolizing the breach of secure data. The scene combines glowing fragments and dramatic lighting, set against a dark, tech-heavy background. The visual should inspire awe and urgency, perfect for grabbing the attention of a cybersecurity-focused audience." title="A high-impact, photorealistic illustration of a digital padlock being shattered by neon cyber elements, symbolizing the breach of secure data. The scene combines glowing fragments and dramatic lighting, set against a dark, tech-heavy background. The visual should inspire awe and urgency, perfect for grabbing the attention of a cybersecurity-focused audience." srcset="https://substackcdn.com/image/fetch/$s_!pKj8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!pKj8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!pKj8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!pKj8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ba735f0-dc23-41f7-8b63-f3ba58c1e9c5_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>P.S</p><p><a href="https://en.wikipedia.org/wiki/Bergen-Belsen_concentration_camp">[Bergen-]Belsen, commonly known as Belsen, was a Nazi concentration camp located in Lower Saxony, Germany. Established in 1943, it initially functioned as an "exchange camp," where Jewish hostages were detained with the intent of exchanging them for German prisoners of war held overseas.</a></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Hikki-Chan Sega continues. Hi Rey ;) ]]></title><description><![CDATA[I heard Grep did a follow up interview with you, but you guys missed few points..]]></description><link>https://www.codeaintel.com/p/hikki-chan-sega-continues-hi-rey</link><guid isPermaLink="false">https://www.codeaintel.com/p/hikki-chan-sega-continues-hi-rey</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Sun, 12 Jan 2025 14:55:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2IuV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2IuV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2IuV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!2IuV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!2IuV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!2IuV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2IuV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-definition conceptual image illustrating the manipulation of digital narratives. The image shows a hacker figure, styled as a dramatic silhouette in front of multiple computer screens displaying fake interviews, fabricated data, and glowing binary code. The screens emphasize a mix of intimidation tactics and media manipulation, with one screen prominently displaying 'Hikki-Chan' in bold text. The background is dark and moody, with neon highlights and a surreal blend of digital and psychological warfare elements. Designed to evoke curiosity and the blurred line between reality and fiction in cybersecurity storytelling.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-definition conceptual image illustrating the manipulation of digital narratives. The image shows a hacker figure, styled as a dramatic silhouette in front of multiple computer screens displaying fake interviews, fabricated data, and glowing binary code. The screens emphasize a mix of intimidation tactics and media manipulation, with one screen prominently displaying 'Hikki-Chan' in bold text. The background is dark and moody, with neon highlights and a surreal blend of digital and psychological warfare elements. Designed to evoke curiosity and the blurred line between reality and fiction in cybersecurity storytelling." title="A high-definition conceptual image illustrating the manipulation of digital narratives. The image shows a hacker figure, styled as a dramatic silhouette in front of multiple computer screens displaying fake interviews, fabricated data, and glowing binary code. The screens emphasize a mix of intimidation tactics and media manipulation, with one screen prominently displaying 'Hikki-Chan' in bold text. The background is dark and moody, with neon highlights and a surreal blend of digital and psychological warfare elements. Designed to evoke curiosity and the blurred line between reality and fiction in cybersecurity storytelling." srcset="https://substackcdn.com/image/fetch/$s_!2IuV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!2IuV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!2IuV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!2IuV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faca0c469-404b-4eed-bfdc-5c53c94db62b_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>What Happened?</h3><p>The enigmatic figure known as Hikki-Chan, an alleged administrator of the infamous Hellcat ransomware group, has found themselves under an even &#8220;brighter&#8221; spotlight. A recent "interview" conducted by the infamous hacker named Grep attempts to paint Hikki as a credible, skilled threat actor. However, upon closer inspection, this effort seems to be an orchestrated ploy to bolster a false narrative.</p><p>It all started with a small Telegram group (Nice name Grep) that published what seem to be an interesting article.. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m2Wm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m2Wm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 424w, https://substackcdn.com/image/fetch/$s_!m2Wm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 848w, https://substackcdn.com/image/fetch/$s_!m2Wm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 1272w, https://substackcdn.com/image/fetch/$s_!m2Wm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m2Wm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png" width="367" height="486.7900207900208" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:638,&quot;width&quot;:481,&quot;resizeWidth&quot;:367,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m2Wm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 424w, https://substackcdn.com/image/fetch/$s_!m2Wm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 848w, https://substackcdn.com/image/fetch/$s_!m2Wm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 1272w, https://substackcdn.com/image/fetch/$s_!m2Wm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0a5b1c-6125-4934-9ea4-9f77dc631711_481x638.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Why This Matters</h3><p>The cybersecurity community must remain cautious about the glorification and legitimization of individuals like Hikki-Chan. By feeding into the mythos of so-called "elite" hackers without thorough validation, we risk giving undue credibility to actors who may not actually possess the prowess they claim.</p><p>More importantly, the attempts to elevate Hikki-Chan's status through platforms like Grep&#8217;s "interview" serve as a reminder of how social engineering extends beyond direct hacking tactics. This is a psychological operation aiming to instill fear, recruit, and distract from the real operators behind Hellcat's campaigns.<br>As you can see in the beginning of the &#8220;Interview&#8221; (Don&#8217;t forget the remember that face) :</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nlcb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nlcb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 424w, https://substackcdn.com/image/fetch/$s_!nlcb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 848w, https://substackcdn.com/image/fetch/$s_!nlcb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 1272w, https://substackcdn.com/image/fetch/$s_!nlcb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nlcb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png" width="1456" height="732" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:732,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nlcb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 424w, https://substackcdn.com/image/fetch/$s_!nlcb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 848w, https://substackcdn.com/image/fetch/$s_!nlcb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 1272w, https://substackcdn.com/image/fetch/$s_!nlcb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81cc0fbd-d7af-4c1b-a5e0-77776f9c0de0_1701x855.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">https://medium.com/@naprysernestas/threat-actor-interview-spotlighting-on-hikki-chan-admin-of-the-hellcat-ransomware-group-39e293a5f87a</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9eFa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9eFa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!9eFa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!9eFa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!9eFa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9eFa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;An intense conceptual image showing a digital cat-and-mouse game, with a glowing cyber mouse trap in the foreground labeled 'HellCat Ransomware,' symbolizing deceit. In the background, screens display fake headlines and interviews with Hikki-Chan, surrounded by a web of digital connections representing misinformation. The atmosphere is cyberpunk-style, featuring glowing red and blue hues with a gritty and surreal digital aesthetic, aimed to intrigue and captivate.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An intense conceptual image showing a digital cat-and-mouse game, with a glowing cyber mouse trap in the foreground labeled 'HellCat Ransomware,' symbolizing deceit. In the background, screens display fake headlines and interviews with Hikki-Chan, surrounded by a web of digital connections representing misinformation. The atmosphere is cyberpunk-style, featuring glowing red and blue hues with a gritty and surreal digital aesthetic, aimed to intrigue and captivate." title="An intense conceptual image showing a digital cat-and-mouse game, with a glowing cyber mouse trap in the foreground labeled 'HellCat Ransomware,' symbolizing deceit. In the background, screens display fake headlines and interviews with Hikki-Chan, surrounded by a web of digital connections representing misinformation. The atmosphere is cyberpunk-style, featuring glowing red and blue hues with a gritty and surreal digital aesthetic, aimed to intrigue and captivate." srcset="https://substackcdn.com/image/fetch/$s_!9eFa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!9eFa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!9eFa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!9eFa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66dcb417-39bc-4089-bbdb-b219603f7f1e_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><br>The Projection Method </h3><p><br>Rey, don&#8217;t deny.. misinformation is exactly what you are doing, its called Projection:</p><blockquote><p>Projection is a defense mechanism where an individual unconsciously attributes their own thoughts, feelings, or behaviors to someone else to avoid acknowledging them within themselves.</p><p>For example:</p><ul><li><p>If someone is lying but accuses others of dishonesty, they are projecting their behavior onto others.</p></li></ul></blockquote><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e4nf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e4nf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 424w, https://substackcdn.com/image/fetch/$s_!e4nf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 848w, https://substackcdn.com/image/fetch/$s_!e4nf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 1272w, https://substackcdn.com/image/fetch/$s_!e4nf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e4nf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png" width="994" height="495" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:495,&quot;width&quot;:994,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e4nf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 424w, https://substackcdn.com/image/fetch/$s_!e4nf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 848w, https://substackcdn.com/image/fetch/$s_!e4nf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 1272w, https://substackcdn.com/image/fetch/$s_!e4nf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae3ce463-c24e-4503-8def-7d539b29eec3_994x495.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>More False Claims</h3><p>I've never seen any attempt of you to contact me and provide different data that could affect my attribution. I am still 90% sure your are IRGC affiliated, and more then that, based on your BF posts and databases you &#8220;Hacked&#8217; (more like reposted), you are a phony. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f_gi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f_gi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 424w, https://substackcdn.com/image/fetch/$s_!f_gi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 848w, https://substackcdn.com/image/fetch/$s_!f_gi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 1272w, https://substackcdn.com/image/fetch/$s_!f_gi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f_gi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png" width="842" height="306" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:306,&quot;width&quot;:842,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f_gi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 424w, https://substackcdn.com/image/fetch/$s_!f_gi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 848w, https://substackcdn.com/image/fetch/$s_!f_gi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 1272w, https://substackcdn.com/image/fetch/$s_!f_gi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644bcdb2-d7e0-4103-9092-c43ad6d3940b_842x306.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The Bigger Picture</h3><p>Hellcat ransomware has caused considerable disruption, but attributing its success solely to Hikki-Chan may be a deliberate diversion. The group has targeted sensitive industries, leveraging advanced tools and techniques&#8212;characteristics that often require a collective effort rather than the work of a single individual.</p><p>This narrative manipulation has larger implications:</p><ul><li><p><strong>Recruitment Tactics:</strong> Fabricating a "leader" persona can attract aspiring hackers seeking guidance or notoriety.</p></li><li><p><strong>Media Manipulation:</strong> Sensational stories about "master hackers" distract from actual investigative efforts into Hellcat's broader network.</p></li><li><p><strong>Security Posturing:</strong> Overestimating or mischaracterizing adversaries can lead organizations to focus on the wrong defensive priorities.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DoY8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DoY8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!DoY8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!DoY8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!DoY8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DoY8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A cyberpunk-style, high-definition image of a laptop screen displaying 'Hikki-Chan: The Myth' with distorted and glitching visuals. The background features dark neon-lit servers and a web of digital connections symbolizing misinformation spreading online. The tone is mysterious and engaging.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A cyberpunk-style, high-definition image of a laptop screen displaying 'Hikki-Chan: The Myth' with distorted and glitching visuals. The background features dark neon-lit servers and a web of digital connections symbolizing misinformation spreading online. The tone is mysterious and engaging." title="A cyberpunk-style, high-definition image of a laptop screen displaying 'Hikki-Chan: The Myth' with distorted and glitching visuals. The background features dark neon-lit servers and a web of digital connections symbolizing misinformation spreading online. The tone is mysterious and engaging." srcset="https://substackcdn.com/image/fetch/$s_!DoY8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!DoY8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!DoY8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!DoY8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96753f3f-639f-4037-9fd3-4285b7923a1f_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br></p></li></ul><h3>Did you remember the face?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0hdD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0hdD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 424w, https://substackcdn.com/image/fetch/$s_!0hdD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 848w, https://substackcdn.com/image/fetch/$s_!0hdD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 1272w, https://substackcdn.com/image/fetch/$s_!0hdD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0hdD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png" width="1456" height="484" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:484,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0hdD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 424w, https://substackcdn.com/image/fetch/$s_!0hdD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 848w, https://substackcdn.com/image/fetch/$s_!0hdD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 1272w, https://substackcdn.com/image/fetch/$s_!0hdD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba4e6c87-89be-443b-a39a-82fd4013271d_1711x569.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">If you love the little details like me.. you will notice that the so called &#8220;Journalist&#8221; is Grep sock puppet. </figcaption></figure></div><p></p><h3>The Bottom Line</h3><p>The cybersecurity community cannot afford to be swayed by smoke and mirrors. While figures like Hikki-Chan dominate headlines, the real focus should remain on dismantling the infrastructure supporting Hellcat ransomware operations.</p><p>Don&#8217;t be misled by flashy interviews or hyped personas. The real danger lies in the shadows, and uncovering it requires vigilance, critical thinking, and collaboration across the cybersecurity ecosystem.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a9O4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a9O4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!a9O4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!a9O4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!a9O4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a9O4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A dramatic, high-definition visual of a hacker's silhouette surrounded by floating media headlines and digital screens, each displaying exaggerated claims about 'Hikki-Chan.' The central figure appears enigmatic, with glowing red and blue glitch effects highlighting the digital manipulation theme. The background is dark and filled with binary code, symbolizing the cyber world.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A dramatic, high-definition visual of a hacker's silhouette surrounded by floating media headlines and digital screens, each displaying exaggerated claims about 'Hikki-Chan.' The central figure appears enigmatic, with glowing red and blue glitch effects highlighting the digital manipulation theme. The background is dark and filled with binary code, symbolizing the cyber world." title="A dramatic, high-definition visual of a hacker's silhouette surrounded by floating media headlines and digital screens, each displaying exaggerated claims about 'Hikki-Chan.' The central figure appears enigmatic, with glowing red and blue glitch effects highlighting the digital manipulation theme. The background is dark and filled with binary code, symbolizing the cyber world." srcset="https://substackcdn.com/image/fetch/$s_!a9O4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!a9O4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!a9O4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!a9O4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94760325-d5bd-41b3-8556-bee79656cc67_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[0-Day Drops: The 7-Zip Vulnerability Exploit Goes Public ]]></title><description><![CDATA[A storm is brewing in the cybersecurity world as @NSA_Employee39, a controversial figure with a growing following on X (formerly Twitter), leaks an 0-day exploit targeting 7-Zip.]]></description><link>https://www.codeaintel.com/p/0-day-drops-the-7-zip-vulnerability</link><guid isPermaLink="false">https://www.codeaintel.com/p/0-day-drops-the-7-zip-vulnerability</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Mon, 30 Dec 2024 11:56:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wN0W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wN0W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wN0W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!wN0W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!wN0W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!wN0W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wN0W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-resolution conceptual image showing a glowing 7-Zip icon being cracked open, with digital streams representing vulnerability leaks. The background includes a shadowy figure symbolizing the leaker and red warning symbols indicating danger.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-resolution conceptual image showing a glowing 7-Zip icon being cracked open, with digital streams representing vulnerability leaks. The background includes a shadowy figure symbolizing the leaker and red warning symbols indicating danger." title="A high-resolution conceptual image showing a glowing 7-Zip icon being cracked open, with digital streams representing vulnerability leaks. The background includes a shadowy figure symbolizing the leaker and red warning symbols indicating danger." srcset="https://substackcdn.com/image/fetch/$s_!wN0W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!wN0W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!wN0W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!wN0W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3c27dc-fdc0-4955-8523-090557e44bbe_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>The Exploit at a Glance</strong></h3><ul><li><p><strong>What it does</strong>: The exploit manipulates a buffer overflow in the LZMA stream decoder of 7-Zip, allowing attackers to execute arbitrary code. A seemingly harmless <strong>.7z file</strong> could trigger this exploit when opened, delivering a payload like launching <code>calc.exe</code>&#8212;or worse.</p></li><li><p><strong>How it works</strong>: It leverages malformed streams to tamper with internal buffer pointers, creating an opening for <strong>shellcode execution</strong>. With some adjustments to offsets, attackers can tailor it to specific targets.</p></li><li><p><strong>Impact</strong>: If successfully exploited, this vulnerability could allow attackers to take complete control of a victim's system, putting businesses, individuals, and even critical infrastructure at risk.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ic-s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ic-s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 424w, https://substackcdn.com/image/fetch/$s_!Ic-s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 848w, https://substackcdn.com/image/fetch/$s_!Ic-s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 1272w, https://substackcdn.com/image/fetch/$s_!Ic-s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ic-s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png" width="1000" height="923" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:923,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:63472,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ic-s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 424w, https://substackcdn.com/image/fetch/$s_!Ic-s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 848w, https://substackcdn.com/image/fetch/$s_!Ic-s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 1272w, https://substackcdn.com/image/fetch/$s_!Ic-s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d97fd52-96cb-439b-a85a-d160e8f7048c_1000x923.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><div><hr></div><h3><strong>The Role of @NSA_Employee39</strong></h3><p>This isn&#8217;t the first time <strong>@NSA_Employee39</strong> has stirred controversy on X. Known for sharing <strong>exploit code</strong> and <strong>vulnerability disclosures</strong>, their account has become a magnet for both aspiring hackers and concerned cybersecurity professionals. Their followers have grown rapidly in the wake of these leaks, and their posts often spark heated debates about the ethics of public exploit disclosure.</p><p><strong>Key highlights from the X post:</strong></p><ul><li><p>A Pastebin link to the exploit, openly shared with followers.</p></li><li><p>Mentions of further <strong>0-day drops</strong> planned for the week, keeping the community on edge.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bSgb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bSgb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 424w, https://substackcdn.com/image/fetch/$s_!bSgb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 848w, https://substackcdn.com/image/fetch/$s_!bSgb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 1272w, https://substackcdn.com/image/fetch/$s_!bSgb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bSgb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png" width="759" height="677" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:677,&quot;width&quot;:759,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:57472,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bSgb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 424w, https://substackcdn.com/image/fetch/$s_!bSgb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 848w, https://substackcdn.com/image/fetch/$s_!bSgb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 1272w, https://substackcdn.com/image/fetch/$s_!bSgb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1188bd29-6f21-47f3-b088-0adcad0227a1_759x677.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p></li></ul><div><hr></div><h3><strong>What&#8217;s the Bigger Picture?</strong></h3><p>This leak is part of a broader trend of <strong>0-day vulnerabilities being dropped publicly</strong>. While some see this as irresponsible, others argue that exposing these exploits forces vendors to act quickly to secure their software.</p><p><strong>Key concerns:</strong></p><ul><li><p><strong>Attackers&#8217; playground</strong>: Threat actors now have an advanced exploit at their disposal, potentially increasing attacks against unpatched 7-Zip versions.</p></li><li><p><strong>Wider reach</strong>: 7-Zip is used globally, from enterprise environments to individual users, making this a high-impact vulnerability.</p></li><li><p><strong>Ethics of disclosure</strong>: The public nature of @NSA_Employee39&#8217;s post reignites debates over whether such leaks do more harm than good.</p></li></ul><div><hr></div><h3><strong>Why It Matters</strong></h3><p>The release of this exploit highlights several pressing issues in cybersecurity:</p><ul><li><p><strong>Patch urgency</strong>: If you&#8217;re using 7-Zip, update to the latest version immediately&#8212;or risk being an easy target.</p></li><li><p><strong>Public vs. private disclosure</strong>: The ethics of dropping exploits publicly without prior vendor notification remain hotly debated.</p></li><li><p><strong>Influence of X profiles</strong>: The platform is becoming a significant hub for exploit releases, bringing both awareness and chaos to the cybersecurity space.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xem4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xem4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!xem4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!xem4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!xem4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xem4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A visually captivating image of a glowing Pastebin logo with 7-Zip icons dissolving into binary code. The background features a shadowy hacker figure and a digital warning symbol, representing the exploit leak and cybersecurity concerns.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A visually captivating image of a glowing Pastebin logo with 7-Zip icons dissolving into binary code. The background features a shadowy hacker figure and a digital warning symbol, representing the exploit leak and cybersecurity concerns." title="A visually captivating image of a glowing Pastebin logo with 7-Zip icons dissolving into binary code. The background features a shadowy hacker figure and a digital warning symbol, representing the exploit leak and cybersecurity concerns." srcset="https://substackcdn.com/image/fetch/$s_!xem4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!xem4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!xem4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!xem4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94a45400-a068-4a61-82fe-724828601a95_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><div><hr></div><h3><strong>What Should You Do?</strong></h3><ol><li><p><strong>Update your software</strong>: Check for the latest version of 7-Zip and apply updates immediately.</p></li><li><p><strong>Audit your environment</strong>: Review where 7-Zip is used in your organization and consider alternatives for critical workflows.</p></li><li><p><strong>Monitor for threats</strong>: Security teams should look for indicators of exploitation targeting this vulnerability.</p></li></ol><div><hr></div><p>This latest 0-day drop is a sobering reminder of the fragility of our digital tools&#8212;and the chaos that can unfold when they&#8217;re exploited. Platforms like X are proving to be double-edged swords: a space for knowledge sharing and a battlefield for cyber vulnerabilities.</p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[FBI's Encrypted Phone Sting Faces Legal Scrutiny]]></title><description><![CDATA[Imagine creating a tool to outsmart criminals&#8212;only for the maker to become the centerpiece of a legal battle that could unravel the world&#8217;s largest sting operation.]]></description><link>https://www.codeaintel.com/p/fbis-encrypted-phone-sting-faces</link><guid isPermaLink="false">https://www.codeaintel.com/p/fbis-encrypted-phone-sting-faces</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Mon, 23 Dec 2024 14:56:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!t5uy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t5uy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t5uy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!t5uy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!t5uy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!t5uy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t5uy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-detailed image of a sleek encrypted phone glowing with text messages being intercepted. The background includes subtle law enforcement icons, such as badges and scales of justice, symbolizing Operation Trojan Shield. The scene is futuristic and dramatic.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-detailed image of a sleek encrypted phone glowing with text messages being intercepted. The background includes subtle law enforcement icons, such as badges and scales of justice, symbolizing Operation Trojan Shield. The scene is futuristic and dramatic." title="A high-detailed image of a sleek encrypted phone glowing with text messages being intercepted. The background includes subtle law enforcement icons, such as badges and scales of justice, symbolizing Operation Trojan Shield. The scene is futuristic and dramatic." srcset="https://substackcdn.com/image/fetch/$s_!t5uy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!t5uy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!t5uy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!t5uy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e7f1f37-6054-47ae-95d4-44933b290bda_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>Welcome to the wild world of <strong>Operation Trojan Shield</strong>, the FBI&#8217;s backdoored encrypted phone system, <strong>Anom</strong>.</p><p>Now, the spotlight has turned to <strong>Afgoo</strong>, the mysterious figure who proposed Anom to the FBI, built it, and helped take down over <strong>12,000 criminal users</strong>, netting <strong>27 million intercepted messages</strong> along the way. But as new legal filings show, Anom's legacy might not be as clean-cut as law enforcement hoped.</p><div><hr></div><h3><strong>What Is Operation Trojan Shield?</strong></h3><p>In 2018, <strong>Afgoo</strong>, a confidential human source (CHS), approached the FBI with a proposition: take over the embryonic <strong>Anom encrypted phone system</strong> he was developing. The FBI, seeing an unprecedented opportunity, agreed. With a secret backdoor installed, Anom became the tool that infiltrated <strong>global criminal networks</strong> involved in <strong>drug trafficking</strong>, <strong>weapons smuggling</strong>, and <strong>assassinations</strong>.</p><p>The results?</p><ul><li><p><strong>Hundreds of criminal syndicates dismantled</strong> in more than 100 countries.</p></li><li><p><strong>Major figures taken down</strong>, including <strong>Hakan Ayik</strong>, leader of the billion-dollar Aussie Cartel.</p></li><li><p>Tens of millions of messages intercepted, uncovering plots ranging from narcotics shipments to murder-for-hire schemes.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EjMf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EjMf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!EjMf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!EjMf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!EjMf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EjMf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;An artistic representation of intercepted encrypted messages glowing in the air, with shadowy figures representing organized crime syndicates in the background. The scene features law enforcement badges and the faint outline of a courtroom, symbolizing Operation Trojan Shield.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An artistic representation of intercepted encrypted messages glowing in the air, with shadowy figures representing organized crime syndicates in the background. The scene features law enforcement badges and the faint outline of a courtroom, symbolizing Operation Trojan Shield." title="An artistic representation of intercepted encrypted messages glowing in the air, with shadowy figures representing organized crime syndicates in the background. The scene features law enforcement badges and the faint outline of a courtroom, symbolizing Operation Trojan Shield." srcset="https://substackcdn.com/image/fetch/$s_!EjMf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!EjMf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!EjMf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!EjMf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ad23f31-c9cc-42f5-9762-9acc76a70ad2_1024x1024.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><div><hr></div><h3><strong>Why Is Afgoo in the Crosshairs?</strong></h3><p>Now, a defense attorney representing <strong>Alexander Dmitrienko</strong>, one of 17 defendants charged in connection with Anom, is demanding the government reveal Afgoo&#8217;s identity. Why? Because Afgoo wasn&#8217;t just a passive informant&#8212;he was allegedly the <strong>key architect</strong> of Anom, making him a crucial witness.</p><p>Afgoo&#8217;s contributions, according to court filings, include:</p><ul><li><p>Acting as the <strong>principal organizer, promoter, and technician</strong> for Anom.</p></li><li><p>Running Anom on behalf of the FBI while working closely with agents.</p></li><li><p>Operating under promises of <strong>financial compensation</strong> ($180,000 in payments) and potential <strong>sentence reductions</strong> for his own criminal charges.</p></li></ul><p>Defense lawyers argue they need to thoroughly investigate Afgoo&#8217;s background to prepare a proper cross-examination. That includes digging into his <strong>criminal history</strong>, <strong>substance abuse issues</strong>, and any agreements with the government.</p><div><hr></div><h3><strong>The Risk to Afgoo</strong></h3><p>Revealing Afgoo&#8217;s real identity isn&#8217;t just a legal issue&#8212;it&#8217;s a <strong>safety concern</strong>. Operation Trojan Shield exposed global criminal networks, including violent drug cartels and organized crime groups. If Afgoo&#8217;s identity goes public, he could face <strong>serious retaliation</strong> from those implicated in the sting.</p><div><hr></div><h3><strong>What&#8217;s Next?</strong></h3><p>Court filings reveal:</p><ul><li><p>The government will disclose Afgoo&#8217;s identity before trial, which is set for March.</p></li><li><p>If the case goes to trial, <strong>Afgoo may testify</strong>, potentially revealing his real name in open court.</p></li></ul><p>The defense has already obtained <strong>detailed technical documents</strong> about how Anom operated, along with millions of intercepted messages. But they argue that without full disclosure about Afgoo&#8217;s role and credibility, their ability to defend the accused is compromised.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!da94!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!da94!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!da94!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!da94!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!da94!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!da94!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f744becc-5607-40d6-be87-27f207468455_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-detailed conceptual image showing an FBI agent analyzing an encrypted phone, with glowing backdoor messages flowing out into a digital map. The background highlights global connections with organized crime syndicates across continents.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-detailed conceptual image showing an FBI agent analyzing an encrypted phone, with glowing backdoor messages flowing out into a digital map. The background highlights global connections with organized crime syndicates across continents." title="A high-detailed conceptual image showing an FBI agent analyzing an encrypted phone, with glowing backdoor messages flowing out into a digital map. The background highlights global connections with organized crime syndicates across continents." srcset="https://substackcdn.com/image/fetch/$s_!da94!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!da94!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!da94!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!da94!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff744becc-5607-40d6-be87-27f207468455_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>The Stakes for Law Enforcement</strong></h3><p>Operation Trojan Shield was celebrated as a landmark achievement in disrupting organized crime. But as the legal battles unfold, questions arise:</p><ul><li><p>How far can law enforcement go in using informants to build operations?</p></li><li><p>Will exposing confidential sources jeopardize future sting operations?</p></li><li><p>Could this case set a precedent for greater transparency in undercover work?</p></li></ul><div><hr></div><h3><strong>Why This Matters</strong></h3><p>The Anom saga isn&#8217;t just about one informant or one case. It&#8217;s about the balance between <strong>justice and accountability</strong> in global law enforcement. As defense attorneys press for answers, the future of large-scale undercover operations could hang in the balance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UGBu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UGBu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!UGBu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!UGBu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!UGBu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UGBu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A dramatic illustration of a courtroom with a glowing encrypted phone at the center, symbolizing the legal battle over revealing the identity of the confidential informant in Operation Trojan Shield. The scene is intense, with shadowy figures and scales of justice in the background.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A dramatic illustration of a courtroom with a glowing encrypted phone at the center, symbolizing the legal battle over revealing the identity of the confidential informant in Operation Trojan Shield. The scene is intense, with shadowy figures and scales of justice in the background." title="A dramatic illustration of a courtroom with a glowing encrypted phone at the center, symbolizing the legal battle over revealing the identity of the confidential informant in Operation Trojan Shield. The scene is intense, with shadowy figures and scales of justice in the background." srcset="https://substackcdn.com/image/fetch/$s_!UGBu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!UGBu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!UGBu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!UGBu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c2b098-7fe0-4b1e-8e10-b76e1b653957_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/fbis-encrypted-phone-sting-faces?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/p/fbis-encrypted-phone-sting-faces?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.codeaintel.com/p/fbis-encrypted-phone-sting-faces?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>Thanks to <a href="https://www.404media.co/author/joseph-cox/">Joseph Cox</a> for bringing this information up and the amazing team of  404media.co </p>]]></content:encoded></item><item><title><![CDATA[The Ecosystem of IABs: A Window into the Cybercrime Underground ]]></title><description><![CDATA[The digital economy is under constant threat from increasingly sophisticated cybercrime ecosystems. One of the more insidious components of this ecosystem is Initial Access Brokers (IABs).]]></description><link>https://www.codeaintel.com/p/the-ecosystem-of-iabs-a-window-into</link><guid isPermaLink="false">https://www.codeaintel.com/p/the-ecosystem-of-iabs-a-window-into</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Mon, 18 Nov 2024 16:40:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_BxK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>These cybercriminal operators play a pivotal role in connecting threat actors with vulnerable systems, facilitating ransomware attacks, data breaches, and industrial sabotage. </strong></h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_BxK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_BxK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!_BxK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!_BxK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!_BxK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_BxK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-definition, dramatic depiction of the cybercrime ecosystem, featuring a dark web marketplace interface with listings of compromised systems, glowing code in the background, and shadowy figures representing cybercriminals. The environment should feel ominous and futuristic, with vivid neon lighting and a strong contrast between light and shadow.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-definition, dramatic depiction of the cybercrime ecosystem, featuring a dark web marketplace interface with listings of compromised systems, glowing code in the background, and shadowy figures representing cybercriminals. The environment should feel ominous and futuristic, with vivid neon lighting and a strong contrast between light and shadow." title="A high-definition, dramatic depiction of the cybercrime ecosystem, featuring a dark web marketplace interface with listings of compromised systems, glowing code in the background, and shadowy figures representing cybercriminals. The environment should feel ominous and futuristic, with vivid neon lighting and a strong contrast between light and shadow." srcset="https://substackcdn.com/image/fetch/$s_!_BxK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!_BxK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!_BxK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!_BxK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7afd7808-6619-4c07-9351-e16412bd2596_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><blockquote><p><strong>This article takes you inside this dark world, explaining the role of IABs, their relationship with stealer logs, and how organizations can defend against this evolving threat.</strong></p></blockquote><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Who Are Initial Access Brokers (IABs)?</strong></h3><p>IABs are specialized cybercriminals who sell access to compromised systems. Their offerings typically include Remote Desktop Protocol (RDP) servers, VPN credentials, and other access points to corporate networks. What makes them particularly dangerous is their efficiency. By focusing solely on gaining initial access, they enable other threat actors&#8212;such as ransomware operators or espionage groups&#8212;to execute their attacks without wasting time on reconnaissance or exploitation.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kgyX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kgyX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 424w, https://substackcdn.com/image/fetch/$s_!kgyX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 848w, https://substackcdn.com/image/fetch/$s_!kgyX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 1272w, https://substackcdn.com/image/fetch/$s_!kgyX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kgyX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png" width="583" height="373.4579710144927" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:221,&quot;width&quot;:345,&quot;resizeWidth&quot;:583,&quot;bytes&quot;:76084,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kgyX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 424w, https://substackcdn.com/image/fetch/$s_!kgyX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 848w, https://substackcdn.com/image/fetch/$s_!kgyX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 1272w, https://substackcdn.com/image/fetch/$s_!kgyX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b131022-5428-432a-bba7-9f0d9f41ea1c_345x221.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ea1j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ea1j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 424w, https://substackcdn.com/image/fetch/$s_!ea1j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 848w, https://substackcdn.com/image/fetch/$s_!ea1j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 1272w, https://substackcdn.com/image/fetch/$s_!ea1j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ea1j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png" width="559" height="481.40509915014167" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:304,&quot;width&quot;:353,&quot;resizeWidth&quot;:559,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ea1j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 424w, https://substackcdn.com/image/fetch/$s_!ea1j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 848w, https://substackcdn.com/image/fetch/$s_!ea1j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 1272w, https://substackcdn.com/image/fetch/$s_!ea1j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3932f4b2-47bf-42c5-a936-d82799c86826_353x304.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><strong>Example: The Listings Above</strong></h4><p>The two listings illustrate IAB activity:</p><ul><li><p><strong>"lacrim"</strong> offers access to a manufacturing company in the USA with $27M in revenue, pricing access at $600.</p></li><li><p><strong>"Rivka"</strong> ups the stakes with a $1B revenue company, selling access for $3,000.</p></li></ul><p>These brokers use forums and dark web marketplaces to auction compromised systems to the highest bidder, often providing details like revenue, industry, and number of accessible hosts to entice buyers.</p><div><hr></div><h3><strong>The Role of Stealer Logs in This Ecosystem</strong></h3><p>Stealer logs are data dumps created by malware designed to harvest credentials, cookies, and other sensitive information from infected devices. This data becomes the raw material for IABs, who use it to identify and verify vulnerable organizations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j7Ag!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j7Ag!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!j7Ag!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!j7Ag!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!j7Ag!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j7Ag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-definition visual representation of a stealer malware attack, showcasing an infected computer screen with cascading code and highlighted stolen credentials. The setting is dark and ominous, with a glowing skull hologram symbolizing cyber theft. Neon accents and intricate digital patterns add a futuristic touch.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-definition visual representation of a stealer malware attack, showcasing an infected computer screen with cascading code and highlighted stolen credentials. The setting is dark and ominous, with a glowing skull hologram symbolizing cyber theft. Neon accents and intricate digital patterns add a futuristic touch." title="A high-definition visual representation of a stealer malware attack, showcasing an infected computer screen with cascading code and highlighted stolen credentials. The setting is dark and ominous, with a glowing skull hologram symbolizing cyber theft. Neon accents and intricate digital patterns add a futuristic touch." srcset="https://substackcdn.com/image/fetch/$s_!j7Ag!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!j7Ag!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!j7Ag!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!j7Ag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e53622-038d-46bb-bfcc-2e23ca5d2f03_1792x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s how it works:</p><ol><li><p><strong>Infection</strong>: Stealer malware spreads through phishing emails, malicious downloads, or cracked software.</p></li><li><p><strong>Data Harvesting</strong>: The malware collects login credentials, session cookies, and other sensitive information.</p></li><li><p><strong>Filtering and Selling</strong>: IABs sift through these logs, identifying high-value targets based on organizational size, industry, or geographic location. The access points are then sold to other cybercriminals.</p></li></ol><p>By leveraging stealer logs, IABs can continuously replenish their inventory of compromised systems, creating a self-sustaining economy of cybercrime.</p><div><hr></div><h3><strong>Why This Matters: The Broader Cybercrime Ecosystem</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Jji!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Jji!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!6Jji!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!6Jji!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!6Jji!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Jji!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-definition image showcasing the interconnected networks of the cybercrime ecosystem, with a glowing digital globe at the center surrounded by lines connecting various elements like a dark web marketplace, stealer malware code, and compromised servers. The atmosphere is ominous with blue and red neon lighting and a matrix-like digital overlay.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-definition image showcasing the interconnected networks of the cybercrime ecosystem, with a glowing digital globe at the center surrounded by lines connecting various elements like a dark web marketplace, stealer malware code, and compromised servers. The atmosphere is ominous with blue and red neon lighting and a matrix-like digital overlay." title="A high-definition image showcasing the interconnected networks of the cybercrime ecosystem, with a glowing digital globe at the center surrounded by lines connecting various elements like a dark web marketplace, stealer malware code, and compromised servers. The atmosphere is ominous with blue and red neon lighting and a matrix-like digital overlay." srcset="https://substackcdn.com/image/fetch/$s_!6Jji!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!6Jji!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!6Jji!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!6Jji!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14154116-d8e7-4cbc-8721-31fab6d77fbc_1792x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>IABs serve as a linchpin in the broader cybercrime ecosystem:</p><ul><li><p><strong>Ransomware-as-a-Service (RaaS)</strong> operators rely on IABs for quick access to corporate networks.</p></li><li><p><strong>Data extortion groups</strong> use IAB services to identify and breach high-value targets.</p></li><li><p><strong>Espionage and sabotage</strong> actors may purchase access to cripple industrial competitors or steal intellectual property.</p></li></ul><p>This ecosystem thrives because of the specialization of roles. IABs focus on access, malware developers refine tools like stealers, and ransomware gangs monetize the breach&#8212;creating an industrialized chain of cybercrime.</p><div><hr></div><h3><strong>The Risks to Organizations</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hSzD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hSzD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!hSzD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!hSzD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!hSzD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hSzD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-definition illustration of a ransomware attack, showing a corporate office digitally locked with a glowing red lock hologram. The environment is eerie with a blend of technological menace&#8212;lines of binary code, a countdown timer, and warning signs on screens in the background. The scene symbolizes urgency and vulnerability.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-definition illustration of a ransomware attack, showing a corporate office digitally locked with a glowing red lock hologram. The environment is eerie with a blend of technological menace&#8212;lines of binary code, a countdown timer, and warning signs on screens in the background. The scene symbolizes urgency and vulnerability." title="A high-definition illustration of a ransomware attack, showing a corporate office digitally locked with a glowing red lock hologram. The environment is eerie with a blend of technological menace&#8212;lines of binary code, a countdown timer, and warning signs on screens in the background. The scene symbolizes urgency and vulnerability." srcset="https://substackcdn.com/image/fetch/$s_!hSzD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!hSzD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!hSzD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!hSzD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0961f1f3-7a9b-403f-9698-7b1192698d28_1792x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The risks posed by IABs are significant and multifaceted:</p><ul><li><p><strong>Financial Losses</strong>: Ransom payments, fines, and lost revenue can cripple organizations.</p></li><li><p><strong>Operational Disruption</strong>: Attacks on manufacturing firms, for instance, can halt production and delay supply chains.</p></li><li><p><strong>Reputation Damage</strong>: A breach erodes customer trust and damages brand equity.</p></li><li><p><strong>Regulatory Consequences</strong>: In industries like healthcare or finance, breaches can result in severe penalties under regulations like GDPR or HIPAA.</p></li></ul><div><hr></div><h3><strong>How to Defend Against IABs</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SbSd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SbSd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!SbSd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!SbSd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!SbSd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SbSd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A high-definition image portraying a cybersecurity defense concept, with a shield made of glowing digital patterns blocking a stream of malicious data. The background features abstract code and a dark web marketplace interface partially visible. The atmosphere is intense, with a focus on protection and security in a cyber environment.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-definition image portraying a cybersecurity defense concept, with a shield made of glowing digital patterns blocking a stream of malicious data. The background features abstract code and a dark web marketplace interface partially visible. The atmosphere is intense, with a focus on protection and security in a cyber environment." title="A high-definition image portraying a cybersecurity defense concept, with a shield made of glowing digital patterns blocking a stream of malicious data. The background features abstract code and a dark web marketplace interface partially visible. The atmosphere is intense, with a focus on protection and security in a cyber environment." srcset="https://substackcdn.com/image/fetch/$s_!SbSd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!SbSd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!SbSd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!SbSd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed703b7-38a5-407a-ad91-cd7f745df2a6_1792x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While the threat landscape is daunting, organizations can take several steps to reduce their risk:</p><ol><li><p><strong>Implement Strong Authentication</strong>:</p><ul><li><p>Enforce multi-factor authentication (MFA) to make it harder for stolen credentials to be used.</p></li></ul></li><li><p><strong>Harden Access Points</strong>:</p><ul><li><p>Limit RDP and VPN access to essential personnel and implement strict IP whitelisting.</p></li></ul></li><li><p><strong>Monitor for Threat Intelligence</strong>:</p><ul><li><p>Use tools that detect if your organization's credentials appear in stealer logs or dark web marketplaces.</p></li></ul></li><li><p><strong>Invest in Endpoint Detection</strong>:</p><ul><li><p>Deploy EDR solutions to identify and isolate stealer malware infections early.</p></li></ul></li><li><p><strong>Train Employees</strong>:</p><ul><li><p>Conduct regular training to recognize phishing attempts and other social engineering tactics.</p></li></ul></li><li><p><strong>Regularly Update Software</strong>:</p><ul><li><p>Patch vulnerabilities promptly to minimize the risk of exploitation.</p></li></ul></li></ol><div><hr></div><h3><strong>The Road Ahead</strong></h3><p>The rise of IABs highlights the industrialization of cybercrime. As organizations grow increasingly dependent on digital systems, they become more attractive to threat actors. By understanding the mechanisms of the cybercrime ecosystem and adopting proactive defenses, businesses can stay one step ahead of the attackers.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[XSS.is Account Sales: A Deep Dive into the Dark Web's Exclusive Marketplace ]]></title><description><![CDATA[At the heart of this ecosystem lies XSS.is, an invitation-only Russian-speaking hacking forum that has long been a nexus for some of the world's most sophisticated cyber threats.]]></description><link>https://www.codeaintel.com/p/xssis-account-sales-a-deep-dive-into</link><guid isPermaLink="false">https://www.codeaintel.com/p/xssis-account-sales-a-deep-dive-into</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Fri, 13 Sep 2024 17:40:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cUVD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the shadowy recesses of the internet, a thriving underground economy fuels the ever-growing cybercrime industry. At the heart of this ecosystem lies XSS.is, an invitation-only Russian-speaking hacking forum that has long been a nexus for some of the world's most sophisticated cyber threats. Recent developments on BreachForums&#8212;another notorious cybercriminal platform&#8212;have shed light on a disturbing trend: the sale of fully activated XSS.is accounts. This article delves into the technical intricacies of this phenomenon, its implications for cybersecurity, and a detailed analysis of the threat actors involved.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cUVD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cUVD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!cUVD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!cUVD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!cUVD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cUVD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A highly technical and mature 3D image focusing on the sale of exclusive hacking accounts in a dark web marketplace. The scene features a sophisticated user interface with multiple encrypted layers, account profile data, and transaction monitoring screens. The background shows a cybercriminal network represented by data streams, with figures in the shadows engaging in encrypted communication. A glowing hologram of a digital wallet is visible, emphasizing the technical prowess and high-level operational security involved in these dark web exchanges.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A highly technical and mature 3D image focusing on the sale of exclusive hacking accounts in a dark web marketplace. The scene features a sophisticated user interface with multiple encrypted layers, account profile data, and transaction monitoring screens. The background shows a cybercriminal network represented by data streams, with figures in the shadows engaging in encrypted communication. A glowing hologram of a digital wallet is visible, emphasizing the technical prowess and high-level operational security involved in these dark web exchanges." title="A highly technical and mature 3D image focusing on the sale of exclusive hacking accounts in a dark web marketplace. The scene features a sophisticated user interface with multiple encrypted layers, account profile data, and transaction monitoring screens. The background shows a cybercriminal network represented by data streams, with figures in the shadows engaging in encrypted communication. A glowing hologram of a digital wallet is visible, emphasizing the technical prowess and high-level operational security involved in these dark web exchanges." srcset="https://substackcdn.com/image/fetch/$s_!cUVD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!cUVD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!cUVD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!cUVD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5f72ce-7a45-41ee-baad-268ead6072ec_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Anatomy of an XSS.is Account Sale</h2><p>On September 2024, a BreachForums user known as "notwj" posted an offer that sent ripples through the cybercriminal community: fully activated XSS.is accounts, complete with email access. To understand the gravity of this offer, one must first grasp the exclusivity of XSS.is:</p><ol><li><p><strong>Vetting Process</strong>: XSS.is employs a rigorous vetting system, requiring potential members to demonstrate not only technical prowess but also a history of malicious activities and endorsements from existing members.</p></li><li><p><strong>Technical Barriers</strong>: The forum often requires solving complex coding challenges or demonstrating proficiency in specific hacking techniques as part of the application process.</p></li><li><p><strong>Linguistic Hurdle</strong>: As a primarily Russian-speaking forum, XSS.is naturally excludes a significant portion of the global cybercriminal community.</p></li><li><p><strong>Reputation System</strong>: Within XSS.is, members operate under a strict reputation system, where trust is hard-earned and easily lost.</p></li></ol><p>The sale of these accounts effectively bypasses these safeguards, potentially flooding the exclusive forum with less experienced but equally motivated cybercriminals.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s4uT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s4uT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 424w, https://substackcdn.com/image/fetch/$s_!s4uT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 848w, https://substackcdn.com/image/fetch/$s_!s4uT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 1272w, https://substackcdn.com/image/fetch/$s_!s4uT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s4uT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png" width="996" height="439" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:439,&quot;width&quot;:996,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Uploaded image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Uploaded image" title="Uploaded image" srcset="https://substackcdn.com/image/fetch/$s_!s4uT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 424w, https://substackcdn.com/image/fetch/$s_!s4uT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 848w, https://substackcdn.com/image/fetch/$s_!s4uT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 1272w, https://substackcdn.com/image/fetch/$s_!s4uT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab2bd06-1eb2-4e9b-8432-ae63ed569165_996x439.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2></h2><h2>Threat Actor Profile: Unmasking "notwj"</h2><p>Understanding the threat actor behind these sales is crucial for assessing the broader implications of this development. Here's what we can infer about "notwj" based on their activities:</p><h3>Operational Security (OpSec)</h3><ul><li><p><strong>Username Choice</strong>: "notwj" could be a deliberate misdirection, possibly implying "not white hat/black hat joker," showcasing a playful yet cautious approach to identity concealment.</p></li><li><p><strong>Platform Diversity</strong>: Operating on both BreachForums and Telegram indicates a strategy to compartmentalize activities and reduce the risk of complete exposure if one platform is compromised.</p></li></ul><h3></h3><h3></h3><h2>Implications for the Cyber Threat Landscape</h2><p>The sale of XSS.is accounts represents a significant shift in the cybercriminal ecosystem:</p><ol><li><p><strong>Democratization of Advanced Threats</strong>: Less skilled actors now have potential access to sophisticated tools and techniques previously reserved for elite cybercriminals.</p></li><li><p><strong>Increased Attack Surface</strong>: Organizations must now contend with a broader range of threat actors capable of launching advanced persistent threats (APTs).</p></li><li><p><strong>Evolution of Cybercriminal Services</strong>: This trend may spark a new "Access-as-a-Service" model in the cybercriminal underground, focusing on providing entry to exclusive forums and marketplaces.</p></li><li><p><strong>Challenges for Law Enforcement</strong>: The influx of new actors into established cybercriminal circles may complicate ongoing investigations and disrupt existing intelligence gathering efforts.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1irj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1irj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!1irj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!1irj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!1irj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1irj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A highly detailed and mature 3D image of a dark web marketplace focused on selling exclusive hacking forum accounts. The setting is a futuristic cyber hub, with layered encryption codes, firewalls, and a holographic globe displaying live cyber traffic. The foreground features a hacker, sophisticated in appearance, interacting with digital controls, transferring account credentials and security keys. Neon accents outline the data streams, with an advanced user interface displaying high-level encryption algorithms, escrow services, and encrypted emails. The overall environment is sleek, modern, and highly technical, symbolizing the exclusivity and complexity of dark web transactions.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A highly detailed and mature 3D image of a dark web marketplace focused on selling exclusive hacking forum accounts. The setting is a futuristic cyber hub, with layered encryption codes, firewalls, and a holographic globe displaying live cyber traffic. The foreground features a hacker, sophisticated in appearance, interacting with digital controls, transferring account credentials and security keys. Neon accents outline the data streams, with an advanced user interface displaying high-level encryption algorithms, escrow services, and encrypted emails. The overall environment is sleek, modern, and highly technical, symbolizing the exclusivity and complexity of dark web transactions." title="A highly detailed and mature 3D image of a dark web marketplace focused on selling exclusive hacking forum accounts. The setting is a futuristic cyber hub, with layered encryption codes, firewalls, and a holographic globe displaying live cyber traffic. The foreground features a hacker, sophisticated in appearance, interacting with digital controls, transferring account credentials and security keys. Neon accents outline the data streams, with an advanced user interface displaying high-level encryption algorithms, escrow services, and encrypted emails. The overall environment is sleek, modern, and highly technical, symbolizing the exclusivity and complexity of dark web transactions." srcset="https://substackcdn.com/image/fetch/$s_!1irj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!1irj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!1irj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!1irj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc76ff7df-5efe-4ad1-b1fd-7dcab22e6ed3_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><h2>Conclusion: A New Chapter in Cybercrime</h2><p>The sale of XSS.is accounts on BreachForums marks a significant milestone in the evolution of cybercrime. It represents not just a breach of an exclusive community, but a potential restructuring of the entire cybercriminal hierarchy. As the barriers between amateur and elite hackers continue to erode, organizations must adapt their security postures to address a threat landscape that is becoming increasingly complex and democratized.</p><p>The emergence of actors like "notwj" underscores the need for a dynamic, intelligence-driven approach to cybersecurity. By understanding the technical underpinnings of these transactions and the motivations of the actors involved, defenders can better anticipate and mitigate the next wave of cyber threats.</p><p>As we move forward, the cybersecurity community must remain vigilant, collaborative, and innovative. The sale of XSS.is accounts is likely just the beginning of a new chapter in the ongoing saga of cybercrime&#8212;one that promises to be more inclusive, more technically sophisticated, and more challenging to combat than ever before.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PgQ4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PgQ4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!PgQ4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!PgQ4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!PgQ4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PgQ4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;An alternative 3D image of a dark web marketplace, with a more minimalistic and mature design, focusing on the technical complexity of encrypted hacking forum accounts. The setting is a high-tech control room with sleek holographic displays showing encryption keys, account transactions, and blockchain escrow mechanisms. The hacker, wearing advanced digital gear, is accessing a dark web portal represented by glowing neon data streams that connect to a secure, futuristic server room. The color palette is subdued, using dark tones with sharp neon lines, emphasizing precision and technical mastery.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An alternative 3D image of a dark web marketplace, with a more minimalistic and mature design, focusing on the technical complexity of encrypted hacking forum accounts. The setting is a high-tech control room with sleek holographic displays showing encryption keys, account transactions, and blockchain escrow mechanisms. The hacker, wearing advanced digital gear, is accessing a dark web portal represented by glowing neon data streams that connect to a secure, futuristic server room. The color palette is subdued, using dark tones with sharp neon lines, emphasizing precision and technical mastery." title="An alternative 3D image of a dark web marketplace, with a more minimalistic and mature design, focusing on the technical complexity of encrypted hacking forum accounts. The setting is a high-tech control room with sleek holographic displays showing encryption keys, account transactions, and blockchain escrow mechanisms. The hacker, wearing advanced digital gear, is accessing a dark web portal represented by glowing neon data streams that connect to a secure, futuristic server room. The color palette is subdued, using dark tones with sharp neon lines, emphasizing precision and technical mastery." srcset="https://substackcdn.com/image/fetch/$s_!PgQ4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!PgQ4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!PgQ4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!PgQ4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3f86bf6-7a74-444d-8719-4368f6493d14_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Hikki-Chan: Unmasking a Fraudulent Hacker and The Iranian Connection]]></title><description><![CDATA[Unraveling the Web of Deception: How a Self-Proclaimed Hacker Exploits Geopolitical Tensions with Recycled Data and False Claims]]></description><link>https://www.codeaintel.com/p/hikki-chan-unmasking-a-fraudulent</link><guid isPermaLink="false">https://www.codeaintel.com/p/hikki-chan-unmasking-a-fraudulent</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Tue, 10 Sep 2024 15:58:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ox7I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ox7I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ox7I!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!Ox7I!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!Ox7I!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!Ox7I!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ox7I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A 3D image of a shadowy figure sitting behind a computer, representing the hacker 'Hikki-Chan'. The figure's face is partially concealed, with digital hacker forum interfaces in the background. Floating around the figure are forum messages, usernames, and hacker-related symbols like code and icons of databases. In the background, symbols of data leaks and geopolitical elements are subtly visible, representing the IRGC affiliation and PsyOps. The lighting is dark with green and blue hues, creating a mysterious and deceptive atmosphere.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A 3D image of a shadowy figure sitting behind a computer, representing the hacker 'Hikki-Chan'. The figure's face is partially concealed, with digital hacker forum interfaces in the background. Floating around the figure are forum messages, usernames, and hacker-related symbols like code and icons of databases. In the background, symbols of data leaks and geopolitical elements are subtly visible, representing the IRGC affiliation and PsyOps. The lighting is dark with green and blue hues, creating a mysterious and deceptive atmosphere." title="A 3D image of a shadowy figure sitting behind a computer, representing the hacker 'Hikki-Chan'. The figure's face is partially concealed, with digital hacker forum interfaces in the background. Floating around the figure are forum messages, usernames, and hacker-related symbols like code and icons of databases. In the background, symbols of data leaks and geopolitical elements are subtly visible, representing the IRGC affiliation and PsyOps. The lighting is dark with green and blue hues, creating a mysterious and deceptive atmosphere." srcset="https://substackcdn.com/image/fetch/$s_!Ox7I!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!Ox7I!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!Ox7I!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!Ox7I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96d879de-8176-4288-82a8-8309fce4f9fe_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>New threat actors frequently emerge, each claiming responsibility for high-profile attacks. Recently, a figure known as "Hikki-Chan" has gained notoriety on hacking forums. However, careful analysis reveals that this supposed hacker may be nothing more than a fraudster attempting to capitalize on current geopolitical tensions. This report aims to dissect Hikki-Chan's claims and expose the reality behind the facade.</p><h3>The VK Leak: A Cornerstone of Credibility?</h3><p>Hikki-Chan's reputation largely rests on a purported leak of data from VK (VKontakte), a popular Russian social networking site. However, closer examination suggests that this "leak" consists of scraped public data rather than information obtained through a genuine breach. This pattern of presenting publicly available information as exclusive, stolen data is a common tactic among fraudulent actors seeking to build credibility in hacking communities.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2C1r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2C1r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 424w, https://substackcdn.com/image/fetch/$s_!2C1r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 848w, https://substackcdn.com/image/fetch/$s_!2C1r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 1272w, https://substackcdn.com/image/fetch/$s_!2C1r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2C1r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png" width="1456" height="530" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:530,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2C1r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 424w, https://substackcdn.com/image/fetch/$s_!2C1r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 848w, https://substackcdn.com/image/fetch/$s_!2C1r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 1272w, https://substackcdn.com/image/fetch/$s_!2C1r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F634ae48b-ba58-47c6-ad3e-cab62601bcef_1715x624.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The Kavim Incident: A Case of False Attribution</h3><p>One of Hikki-Chan's most audacious claims involves the alleged hacking of Kavim, an Israeli public transportation company. However, this incident can be definitively attributed to "Black Shadow," an IRGC-affiliated group that targeted Kavim in 2021. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ERad!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ERad!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 424w, https://substackcdn.com/image/fetch/$s_!ERad!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 848w, https://substackcdn.com/image/fetch/$s_!ERad!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 1272w, https://substackcdn.com/image/fetch/$s_!ERad!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ERad!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png" width="1456" height="543" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:543,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ERad!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 424w, https://substackcdn.com/image/fetch/$s_!ERad!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 848w, https://substackcdn.com/image/fetch/$s_!ERad!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 1272w, https://substackcdn.com/image/fetch/$s_!ERad!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d77c1-c55a-46dc-b7c3-1d192c81f974_1736x648.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Bleeping Computer, a respected cybersecurity news outlet, reported on the Black Shadow attack in detail. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!880U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!880U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 424w, https://substackcdn.com/image/fetch/$s_!880U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 848w, https://substackcdn.com/image/fetch/$s_!880U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 1272w, https://substackcdn.com/image/fetch/$s_!880U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!880U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png" width="946" height="979" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:979,&quot;width&quot;:946,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!880U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 424w, https://substackcdn.com/image/fetch/$s_!880U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 848w, https://substackcdn.com/image/fetch/$s_!880U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 1272w, https://substackcdn.com/image/fetch/$s_!880U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff3f3ca-5d7a-4ce2-865c-d9b20486a180_946x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oWdq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oWdq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 424w, https://substackcdn.com/image/fetch/$s_!oWdq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 848w, https://substackcdn.com/image/fetch/$s_!oWdq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 1272w, https://substackcdn.com/image/fetch/$s_!oWdq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oWdq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png" width="964" height="676" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:676,&quot;width&quot;:964,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oWdq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 424w, https://substackcdn.com/image/fetch/$s_!oWdq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 848w, https://substackcdn.com/image/fetch/$s_!oWdq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 1272w, https://substackcdn.com/image/fetch/$s_!oWdq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185869b6-0517-4081-a9ee-3462f1864cb7_964x676.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Their article, available here, provides a comprehensive breakdown of the actual incident.</p><p>Hikki-Chan's attempt to take credit for this well-documented attack raises serious questions about the veracity of their other claims.</p><p></p><h3>The Israeli Police Database: A Misrepresentation</h3><p>Another significant claim by Hikki-Chan involves an alleged breach of the Israeli Police database. However, analysis of the data offered reveals that it is unrelated to law enforcement. Instead, the information pertains to "Aharai" (After Me), a youth organization that helps prepare Israeli teenagers for military service.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3kQ7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3kQ7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 424w, https://substackcdn.com/image/fetch/$s_!3kQ7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 848w, https://substackcdn.com/image/fetch/$s_!3kQ7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 1272w, https://substackcdn.com/image/fetch/$s_!3kQ7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3kQ7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png" width="1456" height="585" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:585,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3kQ7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 424w, https://substackcdn.com/image/fetch/$s_!3kQ7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 848w, https://substackcdn.com/image/fetch/$s_!3kQ7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 1272w, https://substackcdn.com/image/fetch/$s_!3kQ7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd91ebb5e-2822-4fd4-8eda-20773bbc4fe4_1811x728.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Moreover, this data isn't new. Research conducted by <a href="https://www.clearskysec.com/">ClearSky</a>, a cybersecurity intelligence firm, confirms that this exact dataset first appeared on hacking forums in June 2023, months before Hikki-Chan's emergence. This strongly suggests that Hikki-Chan is recycling old, previously leaked data rather than obtaining new information through actual hacking activities.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MfRH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MfRH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MfRH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MfRH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MfRH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MfRH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg" width="903" height="457" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:457,&quot;width&quot;:903,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MfRH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MfRH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MfRH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MfRH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25be8dbf-bfa8-4069-9a96-e27a63dabb48_903x457.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fHMP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fHMP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 424w, https://substackcdn.com/image/fetch/$s_!fHMP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 848w, https://substackcdn.com/image/fetch/$s_!fHMP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 1272w, https://substackcdn.com/image/fetch/$s_!fHMP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fHMP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png" width="898" height="526" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:526,&quot;width&quot;:898,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fHMP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 424w, https://substackcdn.com/image/fetch/$s_!fHMP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 848w, https://substackcdn.com/image/fetch/$s_!fHMP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 1272w, https://substackcdn.com/image/fetch/$s_!fHMP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94570997-5533-4b05-bd2e-9845c1dfcbc7_898x526.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Thanks to research by ClearSky cyber security analysts, we could provide you with the data mentioned above.</p><h3>The Iranian Connection</h3><p>Iranian state-sponsored Advanced Persistent Threat (APT) groups have been observed engaging in sophisticated disinformation campaigns, notably involving the publication of purportedly leaked Israeli databases. This analysis examines the tactics, techniques, and procedures (TTPs) employed in these operations, with a focus on their strategic objectives and potential impact.</p><p></p><ul><li><p><strong>Prominent Threat Actors</strong>:</p><ul><li><p>Charming Kitten (APT35)</p></li><li><p>OilRig (APT34)</p></li></ul></li><li><p><strong>Primary Tactics</strong>:</p><ul><li><p>Dissemination of fabricated or outdated databases</p></li><li><p>False claims of data exfiltration from Israeli sources</p></li></ul></li><li><p><strong>Strategic Objectives</strong>:</p><ul><li><p>Generate media attention</p></li><li><p>Conduct psychological operations</p></li><li><p>Undermine Israeli reputation and perceived security posture</p></li></ul></li><li><p><strong>Operational Patterns</strong>:</p><ul><li><p>Release of ostensibly sensitive information, often including personal data</p></li><li><p>Utilization of social media and dark web forums for distribution</p></li></ul></li><li><p><strong>Data Veracity</strong>:</p><ul><li><p>Many leaked databases proven to be:</p><ul><li><p>Outdated</p></li><li><p>Incomplete</p></li><li><p>Entirely fabricated</p></li></ul></li></ul></li></ul><p>These disinformation campaigns represent a nuanced approach to cyber warfare, where the primary objective extends beyond direct system compromise. By creating the illusion of successful cyber intrusions, these APT groups aim to:</p><ol><li><p>Sow confusion among targeted populations</p></li><li><p>Erode trust in Israeli cybersecurity measures</p></li><li><p>Compel Israeli security resources to be allocated to threat verification and mitigation</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iSOD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iSOD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!iSOD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!iSOD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!iSOD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iSOD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A visually intense 3D depiction of a cyber warfare scenario. Several hackers, wearing dark hooded clothing, are seated at computers in a dimly lit room with glowing screens. On the screens are large databases, some appearing corrupted with glitch effects, while others show Israeli symbols and maps. There are lines of code flowing across the screens. In the background, elements of disinformation are represented by old newspapers and leaked data floating in the air. A digital Iranian flag hovers above, signaling the origin of the attacks, while fragmented data and distorted Israeli logos emerge in the foreground. The room is filled with a sense of tension and threat.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A visually intense 3D depiction of a cyber warfare scenario. Several hackers, wearing dark hooded clothing, are seated at computers in a dimly lit room with glowing screens. On the screens are large databases, some appearing corrupted with glitch effects, while others show Israeli symbols and maps. There are lines of code flowing across the screens. In the background, elements of disinformation are represented by old newspapers and leaked data floating in the air. A digital Iranian flag hovers above, signaling the origin of the attacks, while fragmented data and distorted Israeli logos emerge in the foreground. The room is filled with a sense of tension and threat." title="A visually intense 3D depiction of a cyber warfare scenario. Several hackers, wearing dark hooded clothing, are seated at computers in a dimly lit room with glowing screens. On the screens are large databases, some appearing corrupted with glitch effects, while others show Israeli symbols and maps. There are lines of code flowing across the screens. In the background, elements of disinformation are represented by old newspapers and leaked data floating in the air. A digital Iranian flag hovers above, signaling the origin of the attacks, while fragmented data and distorted Israeli logos emerge in the foreground. The room is filled with a sense of tension and threat." srcset="https://substackcdn.com/image/fetch/$s_!iSOD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!iSOD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!iSOD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!iSOD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f8cbb2-a648-4b9f-9abd-eb36c89afa42_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here are  examples of Iranian APT groups publishing fake or outdated Israeli databases as part of their cyber operations:</p><h3>1. <strong>Charming Kitten (APT35) - "Pay2Key" Ransomware Campaign (2020)</strong></h3><p>In late 2020, the Iranian-linked APT group <strong>Charming Kitten (APT35)</strong> was believed to be behind the "Pay2Key" ransomware attacks targeting Israeli companies. After some attacks, the group posted what they claimed were stolen databases from Israeli organizations. However, cybersecurity analysts found that some of these leaked databases were either outdated or fabricated, likely aimed at causing panic and reputational damage rather than gaining financial benefit or releasing valuable information.</p><h3>2. <strong>MuddyWater (APT34) - Fake Leaks of Israeli Government Data</strong></h3><p><strong>MuddyWater (APT34)</strong>, another Iranian-affiliated group, has been involved in disinformation campaigns where they claim to have breached Israeli networks. In several instances, MuddyWater published what they purported to be sensitive Israeli government or military databases. Investigations into these leaks revealed that some of the data was outdated or tampered with, undermining the credibility of the claims but still creating headlines that served their propaganda goals.</p><h3>3. <strong>Hackers of Sabrin - Fake Israeli Voter Database (2020)</strong></h3><p>In 2020, an Iranian-affiliated group known as <strong>Hackers of Sabrin</strong> claimed to have leaked a database of Israeli voters, which they said they obtained from government systems. While parts of the data appeared authentic, much of it was old and incomplete. Analysts concluded that the group&#8217;s goal was to incite fear and distrust within the Israeli public rather than to expose current or useful information.</p><h3>4. <strong>Black Shadow - Insurance Data Leak (2021)</strong></h3><p>The <strong>Black Shadow</strong> hacking group, believed to have ties to Iran, breached Israeli insurance company <strong>Shirbit</strong> in 2021. They published personal details of Israeli citizens on the dark web. While some of the leaked data was accurate, many of the published records were old or had already been publicly available, signaling an attempt to cause panic and damage Israel&#8217;s reputation.</p><h3>5. <strong>Islamic Revolutionary Guard Corps (IRGC) - Fake Financial Data Leak (2018)</strong></h3><p>In 2018, an Iranian state-affiliated cyber group, believed to have links to the <strong>IRGC</strong>, claimed to have breached Israeli banks and financial institutions. They released what they said was sensitive financial information. Upon review, cybersecurity experts determined that much of the data was outdated or fabricated, designed to manipulate the public perception of Israel's cyber vulnerabilities.</p><p>These incidents demonstrate how Iranian APTs use the tactic of releasing fake or old databases as part of broader cyber warfare strategies that include disinformation, psychological operations, and propaganda. The goal is often less about the immediate impact of the data and more about shaping narratives and inciting fear.</p><p>Huge thanks to <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Alon Gal&quot;,&quot;id&quot;:34393444,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0dc1d17-7d1e-4e05-90ef-f1538d9c9455_200x200.jpeg&quot;,&quot;uuid&quot;:&quot;be4633ac-b23a-493d-b88c-43e63ddd91c1&quot;}" data-component-name="MentionToDOM"></span> The Co-Founder &amp; CTO @ <a href="https://www.hudsonrock.com/">Hudson Rock</a> (Cybercrime intelligence)</p><h3>Threat Actor Profile Analysis</h3><p>Based on the available information, we can construct the following profile of Hikki-Chan:</p><p><strong>Alias</strong>: Hikki-Chan</p><p><strong>Forum Reputation</strong>: As of the latest check, Hikki-Chan has accumulated 197 reputation points on their primary forum. It's worth noting that this increase in reputation coincides with heightened geopolitical tensions following the events of October 7th, 2023.</p><p><strong>Suspected Motivation</strong>: While it's challenging to determine precise motivations without direct evidence, the pattern of behavior suggests that Hikki-Chan may be affiliated with or acting as a proxy for state-sponsored actors, possibly the Islamic Revolutionary Guard Corps (IRGC). The primary goal appears to be conducting psychological operations (Psy-Ops) aimed at portraying Israeli cyber defenses as vulnerable.</p><p><strong>Modus Operandi</strong>: Hikki-Chan's strategy involves:</p><p>  1. Repurposing old, publicly available data leaks</p><p>  2. Falsely claiming credit for well-documented attacks by other groups</p><p>  3. Misrepresenting the nature and origin of the data they claim to have obtained</p><p>  4. Leveraging current geopolitical tensions to gain credibility and attention</p><h3>Conclusion</h3><p>The evidence strongly suggests that Hikki-Chan is not a legitimate threat actor but rather a fraudulent entity engaged in misinformation and reputation-building through deception. Their claims consistently fail to withstand scrutiny, relying on misattributed attacks, recycled data, and misrepresented information.</p><p>For cybersecurity professionals and researchers, this case underscores the importance of rigorous verification and cross-referencing when evaluating claims made by purported hackers or leak sellers. It also highlights how geopolitical events can be exploited by bad actors to gain credibility in underground forums.</p><p>As I always appreciate sharing data in our field, I must say they analysis of Sam Bent, in this case, seems to be wrong:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DQyZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DQyZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 424w, https://substackcdn.com/image/fetch/$s_!DQyZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 848w, https://substackcdn.com/image/fetch/$s_!DQyZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 1272w, https://substackcdn.com/image/fetch/$s_!DQyZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DQyZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png" width="1143" height="331" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:331,&quot;width&quot;:1143,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:45195,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DQyZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 424w, https://substackcdn.com/image/fetch/$s_!DQyZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 848w, https://substackcdn.com/image/fetch/$s_!DQyZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 1272w, https://substackcdn.com/image/fetch/$s_!DQyZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c116adf-58f7-4f4b-b218-034dfaed355e_1143x331.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Source: https://doingfedtime.com/kavim-data-leak-29-000-records-compromised/</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.codeaintel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CodeAIntel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[USDoD Takes Off His Digital Mask in a Plot Twist Worthy of a Brazilian Telenovela]]></title><description><![CDATA[Hey there, cyber-sleuths and data detectives! Grab your digital magnifying glasses because we've got a story that's hotter than a overclocked CPU in the Amazon rainforest.]]></description><link>https://www.codeaintel.com/p/usdod-takes-off-his-digital-mask</link><guid isPermaLink="false">https://www.codeaintel.com/p/usdod-takes-off-his-digital-mask</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Fri, 23 Aug 2024 17:02:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mcOZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mcOZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mcOZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!mcOZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!mcOZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!mcOZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mcOZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A dynamic 3D scene for a blog post featuring a hacker reveal. The image shows a hacker figure, with elements of a digital mask melting away, revealing the face of a 33-year-old Brazilian man (suggesting the name 'Luan G'). The hacker's background includes a dark, cyber-inspired room filled with monitors displaying lines of code, leaked data symbols, and logos of major security breaches (like FBI, CrowdStrike). The scene should have an element of tension, with hints of Brazil (maybe a flag or beach image on one screen), adding an ironic twist. In one corner, a caipirinha drink rests on the table next to a laptop, further reinforcing the Brazilian theme.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A dynamic 3D scene for a blog post featuring a hacker reveal. The image shows a hacker figure, with elements of a digital mask melting away, revealing the face of a 33-year-old Brazilian man (suggesting the name 'Luan G'). The hacker's background includes a dark, cyber-inspired room filled with monitors displaying lines of code, leaked data symbols, and logos of major security breaches (like FBI, CrowdStrike). The scene should have an element of tension, with hints of Brazil (maybe a flag or beach image on one screen), adding an ironic twist. In one corner, a caipirinha drink rests on the table next to a laptop, further reinforcing the Brazilian theme." title="A dynamic 3D scene for a blog post featuring a hacker reveal. The image shows a hacker figure, with elements of a digital mask melting away, revealing the face of a 33-year-old Brazilian man (suggesting the name 'Luan G'). The hacker's background includes a dark, cyber-inspired room filled with monitors displaying lines of code, leaked data symbols, and logos of major security breaches (like FBI, CrowdStrike). The scene should have an element of tension, with hints of Brazil (maybe a flag or beach image on one screen), adding an ironic twist. In one corner, a caipirinha drink rests on the table next to a laptop, further reinforcing the Brazilian theme." srcset="https://substackcdn.com/image/fetch/$s_!mcOZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!mcOZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!mcOZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!mcOZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78099c82-f907-4881-81d1-44bffecdaf11_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Grand Unmasking: USDoD's "Oops, I Did It Again" Moment</h2><p>In a move that's got the cybersecurity world doing a collective spit-take, the infamous hacker known as USDoD (or EquationCorp, for those who like their hackers with a side of math puns) has revealed his true identity. Ladies and gentlemen, meet Luan G, a 33-year-old from Minas Gerais, Brazil, who apparently decided that anonymity was so last season.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vKTx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vKTx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vKTx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vKTx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vKTx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vKTx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg" width="640" height="640" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:640,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:55539,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vKTx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vKTx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vKTx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vKTx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda637fc2-c282-4569-80e0-64e38c200786_640x640.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2>A Hacking Repertoire That Would Make Ocean's Eleven Jealous</h2><p>Our friend Luan hasn't just been sipping caipirinha on the beaches of Copacabana. Oh no, he's been busy:</p><ul><li><p>Breached National Public Data, leaking 3.2 billion SSNs (Because why stop at "Big Data" when you can go for "Colossal Data"?)</p></li><li><p>Hacked the FBI's InfraGard, exposing 87,000 members (Talk about an exclusive club membership leak)</p></li><li><p>Scraped and leaked CrowdStrike's 100,000-line IoC list (Indicators of Compromise? More like Indicators of Chutzpah)</p></li></ul><p>And that's just the greatest hits album!</p><h2>The "Dox" That Rocked: CrowdStrike's Uno Reverse Card</h2><p>According to our digital desperado, he got "doxed by CrowdStrike." Apparently, CrowdStrike decided to show that they can play the hacking game too. It's like watching the cybersecurity version of "Tag, you're it!"</p><p>But wait, there's more! Luan claims he's been doxed before, even prior to the InfraGard hack. At this point, getting doxed seems to be his hobby.</p><h2>Brazil: Where Hackers Go for Carnival and... Legal Protection?</h2><p>Here's where it gets spicier than a Bahian hot sauce. Brazil, land of samba, football, and... strict extradition laws? Yep, turns out Brazil is the ultimate VPN for its citizens - it just doesn't let them out.</p><p>So while Uncle Sam might be sending friend requests, Brazil's response is basically "New IP address, who dis?"</p><h2>The Hacker's Heartfelt Monologue</h2><p>In a statement that reads like a mix between a retirement speech and a telenovela monologue, Luan said:</p><p>"I want to say thank you, it is time to admit I got defeated and I will retire my Jersey. Yes, this is Luan speaking. I won't run, I'm in Brazil, the same city where I was born. I am a huge valuable target and maybe I will talk soon to whoever is in charge but everyone will know that behind USDoD I'm a human like everyone else."</p><p>Cue the dramatic music and slow-motion walk into the sunset.</p><h2>The Moral of the Story</h2><ol><li><p>If you're going to be a world-famous hacker, maybe don't keep your Instagram public.</p></li><li><p>Always read the fine print on extradition treaties before choosing your hacking headquarters.</p></li><li><p>When life gives you lemons, make caipirinhas... and then maybe turn yourself in to the authorities.</p></li></ol><p>In conclusion, dear readers, remember: in the grand chess game of cybersecurity, sometimes the queen reveals herself. And when she does, we'll be here with the cheesy puns and dad jokes to make sense of it all.</p><p>Stay safe out there, and maybe check if your SSN is one of the 3.2 billion. You know, just in case.</p>]]></content:encoded></item></channel></rss>