Exposing Bulgaria’s Emil Kyulev/RansomedVC/Magadans/BorisTulev/BlackForums/ImpotentNaEvropa/Everest Ransomware Group/DADS Agency – An OSINT Analysis

Dear blog readers,I’ve decided to share some OSINT notes on Bulgaria’s Emil Kyulev.Sample network assets reconnaissance:e[.]kyulev[[.]]protonmail[.]comhxxp://magadans[.]net14cbx34hgJYN1iyFvT4PsCxKVsGDuZi5pR0x0837a9df92d68505ceba32fb540475e29fbf29f… Continue reading Exposing Bulgaria’s Emil Kyulev/RansomedVC/Magadans/BorisTulev/BlackForums/ImpotentNaEvropa/Everest Ransomware Group/DADS Agency – An OSINT Analysis

Posted in Uncategorized

Exposing Bulgaria’s Ruja Ignatova’s OneCoin Cryptocurrency Internet-Connected Infrastructure – An Analysis

UPDATE: I just added an additional set of details and information obtained using public sources.Personal email: rujaignatova[.]hotmail.comhxxp://rujaignatova.eu/hxxp://drrujaignatova.comhxxp://www.youtube.com/rujaignatovahxxp://x.com/rujaignatovahxxp:/… Continue reading Exposing Bulgaria’s Ruja Ignatova’s OneCoin Cryptocurrency Internet-Connected Infrastructure – An Analysis

Posted in Uncategorized

A Peek Inside a Recently Seized Malware Crypting as a Service Domain Portfolio – An Analysis

 Dear blog readers,In this analysis I’ll take a look at a recently seized malware crypting as a service domain and will offer additional insights into how the service works.From the press release:”AegisTools.pw is a platform known in the undergrou… Continue reading A Peek Inside a Recently Seized Malware Crypting as a Service Domain Portfolio – An Analysis

Posted in Uncategorized

Exposing the C&C and IoC Infrastructure of the Redline Stealer Malicious Software – An Analysis

In this analysis we’ll take a look inside the Redline Stealer’s C&C and IoCs infrastructure obtained using public sources with the idea to enrich the actual domain infrastructure while looking for additional clues for related malicious and fraudule… Continue reading Exposing the C&C and IoC Infrastructure of the Redline Stealer Malicious Software – An Analysis

Posted in Uncategorized

Exposing the Sonatrach Data Leak and the Data Leak Broker Behind it – An OSINT Analysis

Dear blog readers,In this analysis I’ll offer and provide an in-depth technical overview of the Internet-connected infrastructure behind the Maze Ransomware Group using public sources including the data leak broker who’s responsible for the Sonatrach D… Continue reading Exposing the Sonatrach Data Leak and the Data Leak Broker Behind it – An OSINT Analysis

Posted in Uncategorized

Exposing a Domains Portfolio Courtesy of Breached Forum Team Members – An OSINT Analysis

I’ve recently obtained access to a publicly obtainable set of personally identifiable information belonging to a secondary Breached Forum team members and based on this discovery I’ve decided to dig a little bit deeper and find out related domain name … Continue reading Exposing a Domains Portfolio Courtesy of Breached Forum Team Members – An OSINT Analysis

Posted in Uncategorized

Profiling the Recently Seized Samourai Cryptocurrency Mixer Service – An Analysis

I’ve decided to take a closer look at the recently seized domain portfolio owned by the infamous Samourai Cryptocurrency Mixer where the actual infrastructure consists of several primary domains and several secondary domains including a vast social med… Continue reading Profiling the Recently Seized Samourai Cryptocurrency Mixer Service – An Analysis

Posted in Uncategorized