Victim: IntelBroker | IntelBroker
Price: Not disclosed
Data: Email addresses, IP addresses, operational tactics
Keypoints :
Price: Not disclosed
Data: Email addresses, IP addresses, operational tactics
Keypoints :
- Cybercriminal Profile: IntelBroker is a prominent figure in the cybercrime landscape, known for high-profile data breaches and ransomware attacks.
- Notable Breaches: His portfolio includes breaches of major entities like AMD, Europol, and Cisco.
- Ransom Payments: Ransom payments are exclusively demanded in Monero (XMR).
- Email Trail: Four verified email addresses linked to IntelBroker were uncovered, associated with various platforms.
- VPN Usage: Heavy reliance on privacy-focused VPNs was documented, indicating efforts to obfuscate his real location.
- Minecraft Connection: Linked to accounts in the Minecraft community, with data associated with IP addresses in multiple countries.
- Links to Hacking Groups: Identified overlaps with the hacking group AgainstTheWest, including shared crypto addresses.
- Operational Strategy: Utilizes sophisticated strategies for initial access, persistence, privilege escalation, and data monetization.
- OSINT Importance: KELA’s analysis highlights the significance of open-source intelligence in uncovering cybercriminal operations.
Original Source: https://securityonline.info/intelbrokers-digital-trail-osint-analysis-exposes-cybercriminals-operations/