Uncovering Cybercriminals: How IntelBroker’s Digital Trail Reveals Their Secrets

Victim: IntelBroker | IntelBroker
Price: Not disclosed
Data: Email addresses, IP addresses, operational tactics
Keypoints :

  • Cybercriminal Profile: IntelBroker is a prominent figure in the cybercrime landscape, known for high-profile data breaches and ransomware attacks.
  • Notable Breaches: His portfolio includes breaches of major entities like AMD, Europol, and Cisco.
  • Ransom Payments: Ransom payments are exclusively demanded in Monero (XMR).
  • Email Trail: Four verified email addresses linked to IntelBroker were uncovered, associated with various platforms.
  • VPN Usage: Heavy reliance on privacy-focused VPNs was documented, indicating efforts to obfuscate his real location.
  • Minecraft Connection: Linked to accounts in the Minecraft community, with data associated with IP addresses in multiple countries.
  • Links to Hacking Groups: Identified overlaps with the hacking group AgainstTheWest, including shared crypto addresses.
  • Operational Strategy: Utilizes sophisticated strategies for initial access, persistence, privilege escalation, and data monetization.
  • OSINT Importance: KELA’s analysis highlights the significance of open-source intelligence in uncovering cybercriminal operations.

Original Source: https://securityonline.info/intelbrokers-digital-trail-osint-analysis-exposes-cybercriminals-operations/