Hacker/Cybercrime Community / Script Kiddies / Skids / Skid Hunters / Hacker Forums / Darknet Marketplaces - Skids and manchildren that hunt them

Relinquish

Интернет убил меня
True & Honest Fan
kiwifarms.net
Joined
Oct 17, 2021
Note: this is rewrite of this OP by @Krebs on Security, which funnily enough is a rewrite of my old OP in the tech subforum. I made this OP due to the inactivity from @Krebs on Security to finish his OP. A lot of info you'll see here was taken from him but I also added my own
This OP will be focusing more on the people and communities rather on their methods, if you want to know how they managed to earn so much money check out @Robo Sonichu's informative posts here (
post 1, post 2)

Was thinking, it would prob be useful to have a list of com lingo here, so here you go

General

Logs - Logins, usually to a stolen account. Ex: a hulu log would be a stolen hulu login
FA - Email access, FA is an abbreviation for "full access", with email access being considered "full access" because you can gain access to someone's entire digital life with access to that person's email
NFA - Non-full access, opposite of the previous term
Stealer - Malware intended to steal saved passwords from browser autofill, among other things
Stealer logs - Logs stolen using stealers
Larping - Obvious
Newgen / newfag - Obvious
Fansign - A name written on someone's forehead/other parts of the body. Is basically just a way to refer to any sort of low paid "do this funny thing on camera" position. Is also sometimes extorted out of people
Cutsign - A fansign in which the person fansigning carves the person's name into their skin. Is gained almost exclusively via extortion
Comgirl - A female in com. Note: women don't participate in any of the hacking. They exist almost purely to do fansigns and have "e-sex", obviously.
Targ - The target/victim of your cybercrime
POF - Proof of funds
Beaming - Scamming another cybercriminal
Snaking - Refusing to pay an agreed cut
EDR / Emergency Disclosure Request - When someone hacks into a government email and then uses it to submit requests to companies for private information or other things
Ogu - An original username
Panel - A phishing page
Niggerfraud - Any form of cybercrime that doesn't involve any hacking/is purely financial fraud. Each individual com defines this its own way so I'll list this in each individual com section too, but every section agrees that anything purely financial and not techncial (the fraud that rappers like teejayx6 and punchmade dev talk about for example) falls under this category.

DB com

Bluefag - Someone on RF/BF with no paid rank. Used as an insult
Niggerfraud - Any form of cybercrime that involves no coding or exploitation, or minimally so. Would include simming/crypto SEing and bankfraud
Leads - Low quality spamlists, usually derived from DBs
Initial access broker - Someone who hacks into corporate networks and sells access to them rather than extorting the company themselves, having to deal with the exploitation needed to escalate privelege and exfiltrate
Dorks / dorklists - Lists of google dorks to find vulnerable web services
Raped - When a database or some other resource has already been used by other cybercriminals due to being public to the point that it's useless

Cracking com

Logshop - A website that sells stolen account credentials
Method - A step-by-step guide on how to use stolen account credentials (get past unrecognized device locks, commit the desired fraud on the account without it being locked)
Checker - A program that runs through every line in a db with emails and passwords and tries automated logins on a website to see which passwords have been reused
Config - A mini-script meant to be used for a credential stuffing program such as OpenBullet or SilverBullet, meant to specify the requests meant for attempting an automated login
OTP bot - An autodialer meant for getting past 2fa, will call the target and prompt the targ to enter the code sent to their phone
Niggerfraud - The fraud that the customers of logshops do lmao

Crypto SEing / simming com

Remo - The manager's tablet at the phone carrier's store. Funnily enough this is actually what T-Mobile employees refer to their tablets as
Acti - Activation, referring to a SIM activation after you swap
Caller / Activator (simming) - The person that gets the SIM card activated
Caller (SEing) - The person that calls the target impersonating Coinbase
Holder - The person that holds the SIM card and burner phone
Autodoxer - A program that takes a list of emails and scrapes the name and phone number associated with it, among other things
Reset - A service where someone will get the password to an email reset with no auth via an exploit
Tools - A priveleged/admin panel. For example, Twitter tools would be admin tools that Twitter employees have access too
Emp / inny - An employee/insider at a company, usually a phone carrier
IRL job - Any number of services in which you can pay someone to do something irl (throw a brick/firebomb through someone's window, get someone kidnapped, irl crypto robberies, etc.)
P1 / press 1 bot - An autodialer that pretends to be Coinbase, and then says "if this was not you please press 1", used to eliminate cold calling when SEing
VM / valid mail - A program which takes a list of emails and checks if it's registered on a website, usually by attempting registration
Niggerfraud - Any form of cybercrime committed outside of the com (the entire com, not just crypto seing/simming com)
Cashout - When the funds are drained from a crypto wallet
Conf bal - When a crypto targ is confirmed to have a specific balance
Mail sender - A tool intended for sending perfectly spoofed emails to targets
SIP - A SIP account (VoIP) that allows for phone calls to be made via the internet, usually spoofed
Gvoice - A google voice account

Script kiddies and hacker forums

RaidForums / BreachForums

1731133389057.png1731133409749.png
1731133854062.png1731134609644.png

Diogo Santos Coelho / Omnipotent / Shiza

1731133936345.png1731133952778.png1731133968560.png
In 2015, a 15-year-old Portuguese teenager using the username Omnipotent started RaidForums, a forum initially made for Twitch raids. Omni, who seldom policed or enforced rules on the forum, allowed subforums for DDoSing, doxing, swatting, and eventually the trade and sell of data breaches. The forum eventually outgrew Twitch raids to become the biggest forum for selling and exchanging personally identifiable information (PII).

The forum housed a lot of guides on various things like doxing, raiding, and trolling
1731134217611.png1731134305864.png1731134351300.png
And other ones like how to masturbate and how to get laid
1731134415882.png1731134468353.png
Although not everyone on the forum is successful at the latter
1731134547637.png
Their best trolls would be put in their "Hall Of Autism" section of the site accompanies with shitty rap music and brony mouse cursor
1731134778414.png
(https://archive.is/RbnYC)
The currency on RF/BF is credited, which can either be bought or obtained through activity on the forum or posting stolen data or guides. Credits are used to get access to data breaches on the website, with the credits given to the OP offering the data.

The forum, which is infested with teenage skids, has a "Certified Grill" award for e-girls that can prove they're women to mods. There were about a dozen "Certified Grills" under Pompompurin and there is now a whopping FIVE CONFIRMED FEMALES on BF as of writing this.
1731135495539.png
1731135516008.png
Everything on the forum was going well until Omni made a big mistake. He used the e-mail he used for running the forum on his U.S. visa application, which led to his devices being seized at Atlanta International Airport in 2018. Despite this, the feds waited until he was over the age of 21 to charge him. He was indicted in 2022 and arrested in London with his website seized while visiting his mother in England who was dying from Huntington's disease.

During his ongoing battle to avoid extradition, he went on a number of press runs including an appearance on CNN Portugal, an interview with The Guardian, and TVI. He implied in a Daily Mail interview that he was groomed into operating the forum by older members of the Twitch raiding community while facing bullying as a Portuguese kid in a British school amidst a divorce, which seems likely considering his age when he created the site. A British court deemed him to be an autistic suicide risk due to the prospect of him spending sixty years in prison in a country where he knows nobody.

Conor Brian Fitzpatrick / pompompurin / xml / @pomp

1731135213373.png1731135229531.png1731135245036.png
1731135315639.png
After Omni’s arrest, a RaidForums veteran LARPing as Sanrio character Pompompurin who previously ran SkidBin began a splinter site named BreachForums. Partly thanks to his existing reputation on RF, his website was perfect grounds for exodus. Unlike RF, who at least pretended to mainly be about Twitch raids, BF was entirely focused on sharing PII. He viewed ransomware gangs as beneficial since they were not only charitable but also helped improve cybersecurity and expose companies who didn't care about their customers. He also rightfully viewed NFTs as stupid and driving him mad, what a visionary.

In 2021, Pom exposed a BreachForums account run by a security 'researcher' and failed DJ Vinny Troia (mentioned later in the thread) where he sold his client's databases. This led to a lasting feud between Pom and Troia, which culminated in Pom exploiting a faulty external FBI e-mail server and sending off e-mails under the FBI domain name to a number of sysadmins warning about the "threat actor" Vinny Troia who was using "multiple global accelerators" and "fastflux technologies" for his attacks. He also sent an e-mail to journo Brian Krebs (also mentioned later) claiming responsibility for the incident and warning him to take immediate action as "we located a botnet being hosted on your forehead".
1731135616527.png
Despite this being highly embarrassing for the FBI, Pom was never charged for the incident. Troia published a disastrous faildox on pompompurin claiming that he’s actually some Canadian because they both joke about getting fucked in the ass or something. Pom issued a lengthy blog post proving that he wasn't Canadian and also broke into his Twitter account as well as the NCMEC's website to issue an alert about Troia being a pedophile. The FBI incident as well as the feud with Troia is covered in this ProPublica article.

In 2022, while he ran SkidBin, he posted on Kiwi Farms that he was offered 5,000 USD by none other than Corey Barnhill to remove his dox. Pom refused the offer, and SkidBin was taken down by Path.net for "child pornography". This proved suspicions that Barnhill was using his unofficial position at Path to get rid of content he didn't like through calumnious accusations of breaking federal law, which also happened to the Kiwi Farms.

This hatred for Barnhill led Pom to support the Kiwi Farms after their seizure by Path and the following DropKiwiFarms fiasco, giving 500 USD in crypto to Null while the site was down. Funnily enough, he scolded the DoxBin Telegram group ran by @katy (of ViLE fame, possible powerword Lachlan Shipley?) because it was "full of pedos" and claimed he was sent child pornography after getting in an argument with a member of the group.
1731135961037.png1731135988463.png
He was arrested by the FBI and the fucking Department of Health and Human Services on March 15, 2023, and was later indicted by federal prosecutors as Conor Brian Fitzpatrick, a pure-bred Celt and 21-year-old native of Peekskill, New York who looks like he could play Adam Lanza in a live-action movie. He graduated from Peekskill High School where he was known as “reserved and pretty smart” before doing two computer science semesters at Westchester Community College. Embarrassed by his fail-dox, Vinny Troia deleted his blog post claiming he was some Canadian guy. An affidavit showed that his real identity was mainly unveiled through the seized RaidForums database, he immediately admitted who he was after his arrest.

After a raid on his house, the FBI found a trove of child porn consisting of 26 files in 2 folders including one labeled “Girl_Hebephilia” (even doe it included kids under the age of 12). This is particularly ironic because he posted on the Kiwi Farms about how glad he was that notorious child molester Nathan Larson was dead while describing his efforts to get his sites taken down.

Upon this discovery by the feds and knowing he’d be charged, he sent a suicide note to a number of his Discord friends telling them that he’d overdosed on pills and begging them to tell Baphomet to split his money 50/50 between his internet girlfriend and a certain “Ethan”. Another friend of his later called EMTs after receiving a goodbye call, who wheeled out his unconscious body to NewYork-Presbyterian Hospital, saving his life.
1731136289908.png
It has been speculated privately for a while if Baphomet was a compromised by law enforcement. When pompompurin attempted suicide after being arrested he sent a suicide note to multiple people that included a message he wanted relayed to Baphomet. Pom conspicuously mentions that he knows Bap may not be allowed to send his OG minecraft accounts to his girlfriend and friend. Why would Baphomet not be allowed to do that and who/what would be restricting him 🤔 (source)

After the story of Conor's suicide attempt broke in a local newspaper, the friend contacted the newspaper asking for the story to be taken down due to concerns of “hugely adverse effects on his real life”, the story was promptly removed before being reinstated after a couple of readers contacted the paper asking why it was removed.

In January 2024, Conor was taken back to a prison in Virginia that previously housed the country's most infamous terrorists (mugshot above) for violating his pre-sentencing bond conditions which included him taking a mandatory “psycho-sexual evaluation” and staying away from international contacts with any minors with him only using the Internet with strict monitory. The violation was allegedly for having used a VPN, but BF veteran “emo” claimed on their Telegram channel that the violation was him reportedly selling the BF database for 5,000 USD in July while desperate for cash (perhaps he should have accepted Corey's offer) before “emo” leaked a password-protected zip file of the database in May 2024. The messages were later deleted and I sadly didn’t properly archive them, but there were their contents:
In July 2023 pompompurin desperate for money reached out to his old friend @mxdelyn offering to sell the database to him for around 5000 usd. Breaking his bond condition. However @mxdelyn was too poor to afford the database so he reached out to another person, the former BreachForum staff member dedale aka gliz. Gliz however was also poor (a common trend in this story) and had another individual I will leave unnamed as a courtesy provide the money. So this person then gave the money to dedale who then gave the money to @mxdelyn to buy the database from pom. So TLDR pompompurin sold out his own user for $5000.. sad

Pompompurin pled guilty and co-operated with the feds during every step of the proceedings, Despite prosecutors asking for a 15-year jail sentence, he was sentenced to two years of probation as well as 18 years of supervision after his defense team used the classic ‘tism defense. Federal prosecutors filed an appeal to the Fourth Circuit, which is still ongoing. In a sentencing transcript, he confirms that he’ll cooperate against former BF staff (“five or six co-conspirators”) as part of his plea deal. He is now a registered sex offender in the State of New York.
1731136619575.png
Let's finish this with a diss track on pompompurin made by e-girl puppy on BF. (Puppy/Bianca is known for selling fansigns on the forum for 10$ and getting 200$ from emo that she blew on a crypto casino according to thekilob).
1731136744841.png
TheKilob accusation (The screenshot embedded in the post is no longer available and hasn't been archived by anyone)
1731136845907.png

Cr4ck4 the FBI agent

In a series of Telegram posts made by "emo", who claims to have access to the BreachForums database sold by Conor, it's revealed that the FBI Online Covert Employee (OCE) mentioned in the indictment was known as "Cr4ck4" both on RF and BF. Cr4ck4 reportedly targetted forum users thekilob (Gianmarco Fiacchi), expo2020, jbl, jigsaw, a_d_r_a_s_t_e_a, Jared__Fazah and shadowhacker.

The logs revealed by "emo" show Cr4ck4, who used the e-mail "cr4ck4@protonmail.com", always used Tor, ProtonVPN, or in most instances NordVPN. The logs also include a dump of his private messages (attached), where he's seen begging to buy databases and combolists but mainly data leaked from government organizations (NATO, AFP, etc..).

On March 8th, 2023, Cr4ck4 bought the infamous D.C. Health Link database which included health data for members of Congress. The D.C. Health Link database is leaked by Denfur the literal next day. Cr4ck4's boss is probably FBI SA John Longmire, who authored the affidavit against pompompurin. SA Longmire, who wrote in an affidavit that he arrested pompompurin, had some press coverage for leading the investigation against Roger Clemens, where he was described as a "star of the agency". His work in the agency was apparently mentioned on a family website before being taken down after a request for comment from a journo.
Check the attachments to see the all the messages
>hey if you still have fullz available send pricing and a few lines of sample, im interested.
>hey interested in this combolist. still available?
>Hey, i am interested in this but maybe not all of it. You have separate pricing for each bit of data? Thanks.
>hey sent you telegram. New .gov still up for sale?

1731137095251.png
January 31st, 2022 - Omnipotent, the administrator of RaidForums is arrested after travelling to the UK to visit his mother who was dying due to cancer.

March 16th, 2022 - Pompompurin launches BreachForum to replace the now Defunct RaidForums.

March, 2022 - An unnamed man connected to the operation of RaidForums is arrested in Croydon, United Kingdom. The NCA seized £5,000 in cash, and an undisclosed amount of US dollars, and froze cryptocurrency assets worth more than $500,000. The unnamed individual has since been released under investigation. This man is speculated to be one of the administrators Jaw or Moot. (https://archive.md/h9dli)

April 12th, 2022 - RaidForums is official seized by the FBI, Omnipotent is indicted with six criminal counts, including conspiracy, access device fraud and aggravated identity theft.

July 2nd, 2022 - Pompompurin middleman's a transaction between forum member 'jigsaw' and an FBI online covert employee (OCE) 'Cr4ck4'. Cr4ck4 purchases a database "expo2020" from jigsaw using pom's middleman service.

November, 2022 - RaidForums member "DataBox" is arrested. (https://databreaches.net/2023/06/19/former-raidforums-member-databox-sentenced-to-prison/)

November 29th, 2022 - The last breached database backup that was available to pompompurin is generated, it is unclear if the FBI have access to later snapshots of the breached database. Note that it is this backup that was attempted to be sold by 'breached_db_person'.

January, 2023 - Umbreon a notorious hacker from RaidForums and BreachForum is arrested in the Netherlands.

March 6th, 2023 - DC Health Link, a health insurance company that provides coverage to members of congress is breached by IntelBroker, the data is put up for sale on Breached.

March 8th, 20203 - Cr4ck4 purchases the DC Health Link database. Later a letter sent from Kevin McCarthy and Hakeem Jefferies to the executive director of DC Health Link "Ms. Mila Kofman" reveals that the FBI had purchased the DC Health Link database from IntelBroker. This unintentionally exposes Cr4ck4 as a FBI OCE. (https://archive.md/VWA2n)

March 9th, 2023 - Forum member Denfur leaks the DC Health Link database.

March 14th, 2023 - ViLE a hacking/doxing group owned by the admin of DoxBin 'kt' has two members indicted for breaching a DEA online portal and attempting to use a Bangladeshi LE email to send a fake EDR to ToonTown Rewritten. In the criminal complaint 'kt' is listed as a criminal conspirator and DoxBin is stated to be platform used for extortion. "Victims are extorted into paying CC-1 (kt) to have their information removed from Forum-1 (DoxBin)". (https://archive.md/7IBem)

March 15th, 2023 - Pompompurin is arrested in New York and is charged with conspiracy to commit access device fraud. (https://archive.md/kxgq2)

March 16th, 2023 - Baphomet after noticing pom's unusual absence restricts his access to the forum and backend servers. Later in the day, the case against pom is unsealed.

March 21st, 2023 - Baphomet, the only other administrator of BreachForum decides to shutdown the forum. (https://web.archive.org/web/20230329203357/https://baph.is/updates/finalupdate.txt.asc)

March 22nd, 2023 - Baphomet releases an update stating "Again, the Breached forum will not be coming back. If it's back for any reason, you need to assume that is an attempt to target our users and is not safe" (https://web.archive.org/web/20230613170647/https://baph.is/updates/safe.txt.asc)

June 12th, 2023 - BreachForum 2.0 launches, now administered by ShinyHunters.

June 12th, 2023 - A message appears on the old BreachForum 1.0 domains warning users that Breached will never return and to use any forums claiming to be breached with caution. (https://web.archive.org/web/20230612202650/https://breached.vc/)

June 16th, 2023 - Baphomet reneges on his previous statement that Breached would not be returning and states that the group leaving messages on the domain are a "group who glows". (https://web.archive.org/web/20230616174047/https://baph.is/updates/safest.txt.asc)

June 17th, 2023 - BreachForum 2.0 suffers a data breach. The user table is dumped to webroot as dump.sql and is discovered by an affiliate of a rival hacking forum 'Onniforums', members of Onniforums use the data to hijack BreachForum member accounts to promote their forum. ShinyHunters states the cause of the leak was a misconfigured backup script.

June 23rd, 2023 - The original BreachForum 1.0 domains and other domains owned by Pompompurin are seized by the FBI.

July 10th, 2023 - Pompompurin signs a plea deal agreeing to plead guilty to the charges of conspiracy to commit access device fraud, solicitation for the purpose of offering access devices, and possession of child pornography. (https://archive.md/8Lge3)

July 26th, 2023 - The BreachForum 1.0 database is submitted whole to Troy Hunt of Have I Been Pwned with the source being attributed to "breached_db_person". A thread selling the BreachForum 1.0 database is created on the forum, breached_db_person begins leaking prominent members records from the user table.

January 3rd, 2024 - Pompompurin is arrested for violating his bond agreement. "In addition, as previously detailed, the Government received information from a messaging and social media platform indicating that the defendant was engaged in a sustained pattern of violations of his bond conditions even after entering a guilty plea in this case". (https://archive.md/wjgC1)

January 16th, 2024 - The United States recommends to the court that Pompompurin should receive a sentence of 188 months imprisonment. (https://archive.md/wjgC1)

January 19th, 2024 - Pompompurin is sentenced to 2 years of house arrest and 20 years of supervised release. (Dead Link)

April 24th, 2024 - An unsealed court transcript reveals pompompurin has agreed to assist the FBI in arresting forum members and co-conspirators (breached staff). (Archive1 | Archive2)

May 15th, 2024 - DoxBin's administrator 'Operator' is claimed to be kidnapped. Several videos of a man claimed to be an Operator being beaten are published to Telegram, including one of the alleged kidnappers accessing DoxBin through the Operator's account.

May 15th, 2024 - BreachForum 2.0's backend at VSYS is seized by the FBI. The FBI states they are reviewing the sites backend data. Baphomet an admin of both iterations of BreachForum is arrested and has his Telegram account is then hijacked by law enforcement.

(source 1, source 2)

ShinyHunters & Baphomet / Pepijn van der Stap?

1731137825569.png
Following Pompompurin's arrest, administrator Baphomet took over the site and relaunched it with the help of the infamous ShinyHunters, who were responsible for notorious data breaches including AT&T, Wattpad, Microsoft, and Animal Jam.

According to an indictement, ShinyHunters members include Abdel-Hakim El Ahmadi (Zac; Jordan Keso), Sébastien Pierre Émile Raoult (Sezyo Kaizen), and Gabriel Archédir François Kimiaie-Asadi Bildstein (Kuroi; GnosticPlayers), who seems to be half Jewish and half Iranian judging by his surname. Gabriel Kimiaie-Asadi Bildstein is a brave "proud trans woman" according to his HackerOne.

Kimiaie-Asadi Bildstein first gained in 2018 fame as "Kuroi_SH" when he hacked a VEVO portal with Nassim Benhaddou (Prosox), they both spent a night in jail after being arrested in France in 2020 before getting released. Both Kuroi and Prosox were part of a community dedicated to defacing websites, apparently causing enough drama that a hate blog was made in 2017.

According to ((Vinny Troia)), Kuroi (as Nclay) and Prosox were part of a group called GnosticPlayers alongside Canadians Dennis "Cr00k" Karvouniaris, Christopher "WhitePacket" Meunier, and Frenchman Maxime "RawData" Thalet-Fischer. The report made by Vinny says that WhitePacket is gay for some reason, the hate blog also says that Prosox is gay and is Kuroi's lover. Both claims are probably not true.

Bildstein (as Nclay) bragged to Vinny that he would escape extradition to the U.S. if he stayed in his home country of France. He also sent his ID to Vinny to prove that he was Kuroi for some reason.
1731137866166.png1731137884720.png1731137904387.png
After being indicted in 2022, Bildstein and El Ahmadi were detained in France and had their electronics seized. Bildstein was heard by FBI agents at his local police station and was released. He has yet to be indicted in France and probably won't face much consequences because he's trans, autistic, and was hospitalized a few times. Raoult was arrested in Morocco and struck a plea deal where he'd serve 3 years in a U.S. federal prison.
1731138123376.png
In May 2024, BreachForums was seized by the FBI with the help of the national police in Ukraine, Iceland, the UK, New Zealand, and the regional police in Zürich, Switzerland. Some artists on the BF Telegram chat suspect that Baph was a New Zealander who is cooperating with the feds since there is no public announcement from law enforcement about his arrest. After the seizure, the FBI opened a Telegram account to receive tips from BreachForums users snitching on each other.
(forwarded message from “FBI Supp”)
1731138217271.png
1731138233073.png
Please ‘splain me how the feds are ‘bout to block his ass?

In January 2023, two months before Pompompurin's arrest, a 21-year-old Dutchman from Zandvoort named Pepijn van der Stap was arrested in connection with a three-man data breach and blackmail ring led by RaidForums user "DataBox", identified as 25-year-old Erkan Sezgin of Almere. DataBox is notable for breaching into a database of 9 million Austrian taxpayers and was sentenced to 36 months in prison with 3 years probation. Van der Stap was released on bond and is pending a court date, he claimed in an interview to have used the usernames Lizardom, Egoshin, Espeon, Umbreon, Togepi, OFTF, and Rekt on RaidForums and BreachForums. He also claimed to have been a frequent user of the /baph/ 8chan board. According to BF user "emo" on Telegram, BF administrator Baphomet claimed to have been an admin on /baph/, where he later sourced his username. "emo" is convinced that Umbreon is Baphomet.
In January 2023 Pepijn Van der Stap AKA Umbreon was arrested in the Netherlands, 2 months later Conor Brian Fitzpatrick was arrested in the US. In an interview with databreaches.net Umbreon stated that he in the past used the alias 'Baphomet' and that he got the alias from a bulletin board he used. The bulletin board he was referring to was likely the Baphomet board on 8chan which was nuked by the 8chan administration after a number of doxes on federal judges were posted to the board. Anyone who has spent a significant amount of time around the BreachForum's administrator Baphomet knows that he also claimed to have gotten his alias from the Baphomet 8chan board. He also claimed to another BreachForum member that he was an administrator on the board. A Very strange coincidence!
1731138326470.png1731138351650.png
At the end of May 2024, ShinyHunters confirmed in a forum post that Baph was arrested and that the FBI obtained the BreachForums database from his arrest. ShinyHunters revealed that they managed to transfer the BreachForums domain from NiceNIC which led to an entire data center being seized to obtain escrow data, this led to three FBI agents ('Sean', 'Carlos', and SA McKelvey) doxing themselves. Less than a month later and after the site was taken down for a while, ShinyHunters fucking gave up and handed moderation over to a certain 'Anastasia'.

Gianmarco Fiacchi / thekilob / KiloB24 / Juncle

1731138548974.png1731138572215.png
1731138603082.png
The resident troll on BreachForums, thekilob was banned a number of times off the forums for being a nuisance including on the forum's current iteration despite bragging that he wouldn't get banned. He also runs VileBin (a DoxBin clone probably named after ViLe). He's a massive user of BreachForums, he was the most active user on all three instances of BF and accumulated over 1,200 posts on the forum's latest iteration under Baphomet.
1731138642121.png
He enjoys mini-modding the forums and was banned under pompompurin for doubting that Baphomet would be able to run BF if it gets taken down (it did and he did), and expressed his desire to run a splinter site. Interestingly enough, pompompurin owns thekilob.com and the feds made it now redirect to a seized page. Kilob himself has been apparently dating an e-girl named Cuddly judging by the mutual forum signatures.

After a disagreement with user IntelBroker, thekilob was framed by IntelBroker for the infamous D.C. Health Link breach which ended up with the Associated Press newswire reporting that thekilob was responsible for the breach. Considering that the breach included the health data of U.S. senators and the fact that thekilob has no tech skills whatsoever, he quickly denied having any relation with the breach.

In 2022, the home of Gianmarco Fiacchi aka thekilob was raided by police in Monterotondo, Italy. According to a search warrant probably released by him, he was accused of having distributed child porn on Tor message boards under the username "Juncle". He was doxed around the same time as the raid thanks to the OGUsers breach, revealing that he was going to school in Tirana, Albania.

A meta page on BreachForums immortalizes the raid against thekilob. Something worth noting is that sloppy redaction on the search warrant shows that the year of birth of the child porn suspect ends with a "1", which wouldn't fit Gianmarco (04/04/2004) but rather his father Federico Fiacchi (04/03/1961), who works as a diplomat for the Ministry of Foreign Affairs. I give the benefit of the doubt and this is probably due to the fact that Gianmarco lives with his parents. A later news article revealed that the investigation was focused on Gianmarco and led to no charges being filed.
1731138701647.png
PROSECUTOR'S OFFICE
AT THE COURT OF ROME

P.P.48017/2022 Noti F.G.N.R.
DECREE FOR SEARCH OF PERSONAL LOCATION, COMPUTER SYSTEMS AND SEIZURE AND CONTEXTUAL COMMUNICATION pursuant to art. 369 bis CPP (ARTT 247 1 bis 250549 C.P.P-art. 369 bis (CPP)

The Public Prosecutor, Dr. Eugenio ALBAMONTE, Deputy Public Prosecutor at the Court of Rome, having read the documents of the proceedings, penalty indicated in the epigraph against FIACCHI [REDACTED] born in Rome on [REDACTED], resident there effectively domiciled in Monterotondo (RM) in [REDACTED] Street;

For the crimes referred to in articles. 600 ter and 600 quater criminal code ascertained in Rome on 12.19.2022, with reference to the dissemination on the TOR network using the nickname "Juncle", of material with child pornography content;

Having seen the documents of the criminal proceedings indicated above relating to the results of the investigative activity carried out by the Postal and Communications Police Service - CNCPO;
Having read the information with reference N.300D2/MIPG751/2021 CAT 1000 of 19.12.2022 - which shows the identification of the user called "Juncle" present on the Tor network, namely FIACCHI [REDACTED];

Having noted that there is reasonable reason to believe that sources of evidence relating to the crimes for which proceedings are being prosecuted may be found at FIACCHI's home as well as in other rooms and vehicles or places available to him, in particular, video files and/or or image files containing child pornography content shared and/or disclosed online by any means, as better described in the relevant information;
furthermore considered that things or traces pertinent to the crime, as well as images and videos, can be found in mobile phones, personal computers (both fixed station and portable), notebooks, netbooks, hard disks of any format, pen drives, magnetic and optical media and videos, cameras, video cameras, also of any format, as well as in said tools and supports, material of a child pornography nature and/or any other documentation or trace relating to the conduct for which one is proceeding may be found (e-mail correspondence, chat, presence and use of computer programs aimed at the dissemination and exchange of files and/or suitable for preventing the identification of access data to computer networks, etc.).

Having seen articles. 250 et seq. of the Criminal Code;
Having seen articles 247 c.1 bis of the Criminal Code as amended by law no. 48/2008 which provides:
"1-bis. When there is reasonable reason to believe that data, information, computer programs or traces in any case pertinent to the crime (images or films of a child pornographic nature and any type of computer and paper material and in general documentation relating to the illicit activity indicated above carried out by the 'suspected) are in a computer or telematic system, even if protected by security measures, a search is ordered, adopting technical measures aimed at ensuring the conservation of the original data and preventing its alteration".
Having seen articles 252 and 253 of the Criminal Code;
In June 2024, Gianmarco Fiacchi aka thekilob was raided once more at his parents' other homes in Rome's Olympic Village and Fiano Romano after the third BreachForums seizure. He posted a picture of him cross-dressing (above) with the search warrant before handing over a backpack with two 3D-printed guns with bullets and gunpowder and was immediately arrested on weapons charges, a dagger was also found in his house.

He had planned to go to Romania to visit his mom, but cops found a ton of gore including videos of beheadings and blacks getting lynched as well as Telegram chat logs about far-right terrorists Brenton Tarrant and Tobias Rathjen (a teen groomed by Terrorgram once more?). While the cops don't have evidence that he was planning an immediate terrorist attack, Fiacchi is still held in the Napoléonian Regina Coeli penitentiary awaiting trial on weapons charges and remained silent during his interrogation. A target list with 47 names including Jeff Bezos and Mark Zuckerberg was found on his computer.

1731138833817.png

Doxbin
1731138911051.png
1731139296396.png
Note: There are two versions of Doxbin, the first one, the original, hosted on Tor and seized by the feds, and the other one you're probably well aware of hosted on Clearnet.

Doxbin was a dox-pasting archive located on Tor for anons, hackers, and other assorted irc faggots to go around and flex their abilities. Unlike other services such as Pastebin, Doxbin didn't remove shit at the first sign of a complaint from someone on the Internet, so your dox were guaranteed to stay up. The OG Doxbin was owned by Nachash in late 2011, Nachash left the scene in 2015 and the inactive twitter handle @loldoxbin is controlled by a close friend of Nachash. Intangir a.k.a Antichrist from LizardSquad located in the Netherlands, was the co-admin of the OG Doxbin

This is how the site looked like
(https://preservetube.com/watch?v=zfv5RPnJRos)

The first mention of Doxbin was created shortly after the arrival of a paste-uploading website called '10littleniggers', which was created in 2009/2010 and allegedly owned by some 808chan.org retard who was a close friend of r000t (Blair Henry Strater), another script-kiddie from the old Internet era. However, soon Doxbin would become a subject of internal staff drama

Michael Dean Major / Hann / cutepin / troof / rcv / marcdoubt
1731144514711.png1731144993054.png

Michael injecting heroin during the Tinychat chat room session

Michael Dean Major aka Hann is a heroin-addicted script kiddie and a huge sperg with a long history of being an attention whore, for the sake of this OP we'll only gonna focus on his involvement with the OG Doxbin.

After being doxed by Lulzsec, Michael turned to the 808chan people. One of them, as it so happens, started Doxbin. After begging, lying about his doxing capabilities, and employing emotional blackmail, Michael was snuck in as "troof" and given root on the Doxbin. He then proceeded to do nothing useful and instead IRCed from it and got it nulled.

Later, after being given a list of names to get SSNs for (a relatively straightforward task, for someone who bragged about having a "connect" who would gladly give him whatever he requested), he again proceeded to do nothing useful and claimed that his connection must have died. He was also invited to participate in releases numerous times, owing to his supposed doxing skill, but declined each time on the grounds that he doesn't know how to dox.

Finally, after massive IRC drama that was 100% his fault, Doxbin's founder was given an ultimatum. Instead of picking between Nachash and Michael, he decided to resign and willed the site over to Nachash. When Michael was informed of this, he begged like a dog for the site staff to remain as it was, and was told "I'll think about it." During the next 48 hours (While Nachash was still thinking about it), he managed to beg, whine, and socialize his way into getting the doxb.in domain, claiming it was his idea to register it, despite the fact that registering it was discussed before he was ever brought in. Once the domain was effectively stolen back, Michael was unceremoniously booted. It was later found out his history from the other nickname, Hann, causing another sperg out in the IIRC

With his unacceptable events occurring and massive IRC drama around Hann, the former Doxbin owner decided to resign; handing ownership of Doxbin over to Nachash. Nachash and his co-bitch Intangir stepped in by overtaking the site and making Doxbin a well-known name by openly allowing credit card and bank fraud; along with harassing some random lawyer from Texas.

Due to Nachash's lack of webdev ability, the Doxbin PHP source was leaked by th3j35t3r. Nachash then released the source publicly as retaliation and a 'fuck you' to th3j35t3r, causing another slap fight between them on Twitter.

As Nachash reached 4 years of owning Doxbin, he relinquished full ownership to Intangir; who did nothing important; and they later both left their internet shenanigans behind to pursue a life. A lot of drama circulated around why Nachash's Doxbin servers were seized by the feds during 'Operation Onymous', the reason behind the seizure is still not clear, and there is no legally justified reason for the seizure. The only reason found was "because they could". This is where the OG Doxbin's story comes to an end

The current Doxbin was made in early 2018 by kt & Brenton under the domain name doxbin.org, as a place to store personal doxes, as alternative platforms were not satisfactory. However, they will too soon become a subject of internal staff drama

Arion Kurtaj / Lapsus$ / teapot / BreachBase / White

1731146594406.png1731146614535.png1731146975307.png

Edit created by Vile
Arion Kurtaj aka White / Breachbase is a 17-year-old Minecraft hacker turned skid who's currently in jail for leaking GTA 6. Originally starting his internet presence being obsessed with Minecraft servers and fantasizing about being the next big hacker to walk the RIU streetz, he later became friends with Miku & other young people who were involved in the selling/trading private 0day community. Arion slowly began making money to further expand his exploit collection. After a few years, his net worth accumulated to well over 300BTC (Close to 14 MIL USD). Of course, things don't always go to plan, and he gambled a large amount to impress like-minded idiots. The rest was left open in an RDP which was compromised, twice. Arion previously co-founded a group with Miku called 'Infinity Recursion' (Early 2021)

Doxbin was briefly owned by White, when he bought it from kt & Brenton in November 2021. In a matter of 3 months, he completely destroyed any reputation the site had, along with breaking many functions that made Doxbin great. kt & Brenton decided to buy the website back (for 20% of the cost previously). After the deal, White knew he made a mistake; he decided to lock the registrar's account & steal the Discord vanity in an attempt to get on kt's nerve. Which ultimately failed, as they got the vanity back within 2 hours. He then attempted to publicly advertise a bounty of $100,000 for kt's dox on the main Doxbin Twitter
1731147543523.png
5 hours later, kt gains access to the Twitter account to start mocking White on his very awful internet security & OPSEC skills
1731147589528.png
Due to kt not having the ability to change the email/password on the account, the only option left was to forcefully suspend the account.

White proceeded to drop the entire Doxbin database, which ultimately cost him $75,000 USD, and also revealed his identity, lol This prompted kt and members of his group Vile to drop a huge dox paste about him on Doxbin. Not only 2 days later, the door started knocking. Upon pulling up to White's mothers house, she was approached by some very nice gentlemen who proceeded to ask where Mr Arion was. Once knowing Arion was not there, the men began their journey, 20 minutes down the road to Arion's father's house. They were met with a police vehicle waiting at the house, quickly making their getaway via KiNG Uber driver, this didn't work and Arion got arrested

OGUsers
1731150450552.png
OGUsers is a forum whose main "business" practice has been a blight on social media webmasters and regular users alike for many years. Founded in its current iteration in 2017, the forum is centered almost entirely around the sale and trade of social media accounts with rare usernames (colloquially referred to as "OGs") which typically garner attention among its users for being either very short, consisting only of a single dictionary word, or any other reason for which it may look cool for ADHD-riddled script kiddies to have, such as @xx, @drug, @rainbow, @10 etc.

As one can imagine from such a racket, these accounts more often than not tend to be stolen due to the username having already been registered by chance in the early days of a site's existence, and typically left dormant by its original owner who would have rapidly lost interest in their site of choice. However, this isn't to say that actively using your account would prevent it from being sought-after. Many of these account peddlers have made a conceited effort in the past to obtain such rare accounts, ranging from often-annoying but relatively harmless pestering towards the account owner with offers to buy the username, to actively malicious tactics such as hacking / social engineering and even forceful measures such as swatting, all for the sake of a coveted "OG" username

Unsurprisingly this kind of website attracts some very "special" people

Taylor Christian Newsome / Sleep The God / Vv3 / igfilmsv2 / DoXeD

1731151098545.png1731151121575.png
The very dictionary definition of "wigger" and poster boy for white trash, is fuelled entirely by desperation and amphetamines. Taylor Christian Newsome is a 28-year-old meth-snorting, roleplay hacker from the 2013+ XBOX scene. From being a prominent name in the skid-hacking community to becoming the white 'Beetlejuice' with meth teeth. Name-dropping people he doesn't know to act more important than he actually is. He Flexes public JS/CSS files and thinks he hacked/rooted a website, yet only knows how to use automatic pen-testing tools. His larp ended up with him getting his shit kicked by Vile on Doxbin about which he still upset to this day. He is a #DropKiwifarms advocate and has claimed to have hacked Kiwifarms several times, his hatred of Kiwifarms has brought him to be friends with Elaine Miller, and like all of her other friends, he's a pedophile


Graham Ivan Clark / Kirk / Open / OpenHCF
1731151797181.png1731151863221.png
A very detailed documentary on him, recommended to watch​

Graham Ivan Clark aka Open / Kirk is 21 year old Minecraft YouTuber/hacker turned Skid, who become known for hijacking Xitter 2020 for a doubling money scheme, however, before that, he was known sim-swapper on OGUser.

Clark created his channel on August 24th, 2016, and would post Minecraft HCF content. He had the Minecraft username "Open" and he gained around 12,000 subscribers in 2016 and early 2017. Clark would become infamous in the community for hosting fake giveaways and scamming his fans. He would also be caught faking a number of his videos using alt accounts and DDOSing players on the servers he played (source/archive)

Over the course of 2018-2020, Clark would engage in various Sim-Swapping attacks stealing around $3,000,000 dollars in bitcoin. In 2019 at the age of 16 Clark had stolen 164 Bitcoin from a Seattle-based angel investor, which would put him under the investigation by the authorities. Clark was raided by the Secret Service in April but they were only able to recover 100 Bitcoin.
 

Attachments

Last edited:

Ransomware groups

Nowadays, the majority of non-state threat actors are fueled by cold hard cash, this is mainly because the "lulz" factor that once fueled earlier cyber attacks simply isn't worth the prospect of spending dozens of years in an American prison. In the late 2010s, an rise of ransomware groups hailing from post-Soviet countries emerged with the same modus operandi: find a vulnerable enterprise system or rogue employee willing to install malware, exfiltrate/encrypt data off as many hard drives as you can, threaten to leak/delete sensitive company data if they don't pay up. Of course, this led to infighting between rival Russian cybercrime gangs which took place on the Russian cybercrime forum XSS.

LockBit
1731154783179.png
>FBI pwned me
The most notorious of them all, LockBit, was founded in 2019 and operates on multiple fronts: affiliates would pay an entry fee to LockBit and recieve copies of the LockBit software to infect computers with, the affiliates would then find vulnerable machines to ransom with LockBit staff handling negociations with victims and splitting the earnings 50/50.

On January 24, 2024, LockBitSupp, who ran the LockBit group, was banned and labeled a scammer on Russian cybercrime forums XSS.is and Exploit. The admin of XSS.is claims that LockBitSupp threatened to have them murderd a number of times. LockBitSupp claims the ban was because "they are jealous of me because how rich and successful I am” and "there is a communism on this forum and their goal is to dispossess the rich".
1731154806929.png
1731154824430.png
Contrary to LockBitSupp's theory of XSS.is admins being commies who want to eat the rich, the ban was probably because of a complaint made by affiliate "michon" who gave LockBit access to a target. Instead of sharing the profits (apparently 4 million USD), LockBit extorted the target on their own without "michon" getting a slice of the pay. No honor among thieves.
1731154845521.png
Amid LockBit affiliates quickly losing trust in the program after their ban on XSS.is, the British National Crime Agency and the FBI seized their Tor blog in February 2024 with a countdown promising to reveal LockBitSupp's identity.
1731154864318.png1731154880688.png
In typical fed fashion, the countdown led to nothing but a riddle which caused a couple of journos to seethe after waiting two days for a cat emoji.
1731154898455.png1731154917065.png
Three months later, in May, the exact same thing happened except the feds kept on their promise and revealed the identity of a few Lockbit affiliates, developers, and LockBitSupp himself. According to the NCA and the FBI, LockBitSupp is 31-year-old Dimitry Yuryevich Khoroshev of Voronezh, Russia. He was indicted on 26 federal charges and was sanctioned in the UK, Australia, and the USA. In typical LockBitSupp fashion, he denied everything and said the FBI was just "bluffing".
1731154943660.png
>"FBI is lying, I am not Dimon [Dimitri], feel bad for the real Dimon))) oh jeez, he's gonna get fucked for my sins)))"

Interestingly enough, the FBI managed to secure the arrest and conviction of some LockBit affiliates including two affiliates in Ukraine and Poland. 20-year-old Ruslan Magomedovich Astamirov, a Chechen arrested in Arizona, was indicted and unmasked as LockBit affiliates "betterpay" and "eastfarmer". Another affiliate, 34-year-old Mikhail Vasiliev was arrested in Bradford, Ontario and was unmasked as LockBit affiliates "ghostrider" and "digitalworld99". Vasiliev pled guilty to all charges and was sentenced to four years in prison (mainly for owning two illegal handguns), the judge called him a "cyber-terrorist" motivated by greed; you can read his verdict here. Let's now take a look at the LockBit ringleaders according to the feds.

Dimitry Yuryevich Khoroshev / LockBitSupp / putincrab

Mikhail Pavlovich Mateev / Wazawaka / Boriscelcin

Ivan Gennadievich Kondratiev / Bassterlord / National Hazard Agency

1731154975087.png1731154992815.png1731155027837.png
Despite his denials, LockBitSupp is more than likely Dimitry Khoroshev. Little is known about his life before LockBit, he used to build custom Counter-Strike servers for money at 14 under the username DarkBot4. He then went on to serve in the Internal Troops of Russia under the Rosgvardiya (homo selfie under). Even though Khoroshev is married (to a woman!), he has an account on a dating site as "Andrey" where his description is just "sex", what a gentleman.
1731155049846.png1731155067314.png1731155087661.png
Another prominent figure in the Russian ransomware gang is developer Mikhail Matveev or "Wazawaka". He helped develop and spread ransomware for LockBit, Babuk, and Hive. He also likes posting selfie videos where you can't tell if he's drunk or just Russian. He has a Twitter account under the name of former president Boris Yeltsin and started selling t-shirts of his FBI wanted poster. He claims to have severed his own left ring finger after losing a bet, but it's more likely that he lost it in 2017 during a server cabinet installation accident.
1731155112395.png1731155129392.png1731155145877.png


The most notorious LockBit affiliate, Ivan Kondratiev aka "Bassterlord", runs the affiliate group "National Hazard Agency" which infected computers with ransomware from GandCrab, REvil, and Conti before focusing entirely on LockBit. He was born in Lugansk, Ukraine (now the Russian Luhansk People's Republic) and lives in Brianka and Novomoskovsk, Tula Oblast. He bragged on XSS.is that he had "mutual love and great sex" since he had "[LockBit] on my dick".
1731155249039.png
He wrote a scathing review against the BlackCat group for targeting countries in the CIS before asking to get banned from XSS.is in 2023. Since his indictment in February 2024, Bassterlord has claimed that the FBI fell for a "fake identity" (that somehow shows up on the Russian ROSPASSPORT database) and has sold a ransomware manual to recoup his losses from the FBI's cryptocurrency seizures.
1731155307095.png1731155333905.png
Outside of his cybercriminal career, Ivan Kondratiev is a pretty unremarkable person. He has a dating profile where he says he can "afford everything and even more" and was an Edward Snowden fanboy in his 2016 VK profile.
1731155368325.png1731155383519.png

The Skid Hunters

Vincenzo "Vinny" Troia / Night Lion Security / soundcard

1731155404743.png1731155421703.png1731155434686.png
Vincenzo "Vinny" Troia is an "ethical hacker" and an "investigator" who's become very hated in the community due to him completely failing at all the mentioned jobs. In order to make himself out to be something he's not he latches onto other security researchers (and even criminal hackers) to give himself credibility. He used Bob Diachenko during the Elasticsearch breaches to make it seem like he has some technical know-how but it's obvious that Bob did all the heavy lifting for those. He took advantage of Nclay's mental instability in order to promote himself and his business. Vinny seems to think that he's doing some form of "undercover" work like he's a "secret agent" but he is not a member of law enforcement and is often working with the criminals he claims to be against. This has been his pattern of behavior since he became involved in the blackhat communities in 2017 under the pseudonym "soundcard" where he was actively selling stolen data on the forum KickAss (source) (Expose on Vinny written by someone anonymous)

Brian Thomas Krebs / Krebs on Security

1731155479407.png
1731155499612.png
Brian Thomas Krebs is the investigator who mainly covers cybercrime and the people involved in it. He's a bit more respected in the community than Vinny although he does have his own batch of haters which point out his missteps he made during several investigations. For example, a ransomware group Scatter Spider reach out to both Vx-underground and Krebs, while vx-underground wanted to protect his privacy, Krebs didn't give a single fuck and IDed him as Tyler Buchanan, 22, of Dundee, Scotland. This confirms a DoxBin paste from five years ago.

Darknet marketplaces

Marketplaces on the darknet significantly evolved since the era of the Silk Road, most discussion is held on Dread.

Alexandre Cazes / Alpha02 / AlphaBay

1731155521067.png1731155535971.png1731155552672.png
1731155570936.png
>addicted to rawdogging #RealMenDontDateSingleMoms

A Quebecker sexpat from Trois-Rivières living in Bangkok, Thailand, Alexandre Cazes created the infamous AlphaBay dark web market. Alex grew up without a dad and later complained that he "lacked any masculine experience" until he was 18. As a teenager, he made an e-mail with the username pimp_alex_91@hotmail.com which he used literally everywhere. He also made accounts on a number of French forums under the username Alpha02 (since he's an alpha male) with his real name.

Alex used his Alpha02 alter-ego to get into credit card fraud or "carding", where he became a notorious user on the Tor Carding Forum where he sold a 16-page "University of Carding Guide". In 2014, in the wake of the Silk Road takedown, he created a Tor marketplace named AlphaBay (Alpha02 + eBay) with his top janny "DeSnake" and initially made for trading credit card data. Over time, AlphaBay's scope expanded to drugs and contraband with his stated goal to "become the largest eBay-style underworld marketplace". AlphaBay literally had no limit other than child abuse, murder for hire, and data stolen from Russia. The sheer scale of AlphaBay made Alpha02 filthy rich, with his net worth being over 23 million USD.

In the marketplace's first three months, welcome and password recovery e-mails were sent through Alex's personal pimp_alex_91 e-mail address. In 2015, Alpha02 said that he was "absolutely certain my opsec is secure", saying that he was safe in an "offshore country". Less than a year later, law enforcement obtained a copy of an early AlphaBay password recovery e-mail signed by pimp_alex_91, allowing them to identify Alpha02 as Alexandre Cazes.
1731155593439.png
(17-year-old Alex the HUSTLE KING with his honkey swag; source)

According to a biography he wrote for a visa application, Alexandre Cazes skipped 2nd grade at his elementary school "due to being too advanced" and later dropped out of college. He worked at a McDonald's part-time but was fired "for not fitting in with the gang" then was fired from another Québec fast-food chain for "excessively eating on the job". He found a job at an insurance company and left "because the pay was too low and the work hours too long", he was fired once more from a Canadian telecom firm for "not fitting in the gang" again. Thai police says he had an IQ of 142 at age 14.

Alex then held a summer job between college semesters that lasted a month because "one of the shareholders hated me for having got the job without a diploma and I got fired when they found out that I was seeing his wife". The way Alex describes his failures at work shows that he's an autistic narc who wouldn't take any responsibility for his acts, which will later become relevant.

He was a frequent user of the Roosh V forums under the username "Rawmeo", where he was a certified rawdogger and "professional cheater" (forum signature above). He bragged that he secretly records "EVERY new sex intercourse with a girl with a hidden camera in my room" because of his fear of 'false' rape allegations, with the vids "stored encrypted hard drive, ready to be pulled in case the shit hits the fan". He was a true alpha male (hence his username), refusing to do web design work or rent real estate to gay couples. Here is his guide to picking up Thai chicks if you guys are interested in starting your sexpat career.

In July 2017, he was indicted in U.S. federal court and was arrested in Thailand for charges including international drug trafficking and money laundering. He hanged himself with a bath towel in a Thai police station eight days later, leaving behind his wife and three-week-old daughter. He also left behind a shitton of offshore property which mostly got seized by the U.S. government, this included 3 million USD in a Dubai bank account. A few bank accounts and companies do not show up in court dockets and have yet to be seized as far as it's known, which could make for a nice treasure hunt.
After Cazes' death, DeSnake took control of AlphaBay and brought it back in 2021 so the "AlphaBay name" gets remembered as more than "the marketplace which got busted". DeSnake ran the site pretty well until 2023 when the site vanished in a suspected exit scam. As the disappearance of DeSnake coincided with the Turkey-Syria earthquake, people presumed that he was dead but that's likely bullshit. DeSnake, who's probably Russian, claimed that he was "out of reach" of Western law enforcement and "traveled to several continents" with no problem.

Rui-Siang Lin (林睿庠) / Pharoah / Incognito Market

1731155616846.png1731155634140.png
>YES, THIS IS AN EXTORTION !!!

Incognito Market was just a run-of-the-mill darknet market ran by "pharaoh". Incognito was pretty unremarkable in of itself except for the fact that they had a server-side feature which "auto-encrypted" private messages to send it to vendors, which obviously got backdoored.

In April 2024, to the pleasure of people who bet on the Archetyp deadpool, Incognito Market disabled withdrawals and exit-scammed. This would usually be the end of the story, but pharaoh went the extra mile despite having stolen millions of dollars and mass-extorted buyers and sellers threatening to leak the data obtained from the "auto-encryption" feature, pissing off a bunch of users on dread including drug dealers. A number of vendors caved in and gave money to Pharaoh for the data not to leak, which it never did.
1731155655398.png
A 23-year-old Taiwanese national, Rui-Siang Lin, was indicted as pharaoh after being unmasked after he used his driver's license for KYC on a crypto exchange to launder money from an address directly linked to the market. He also used the Incognito Market address to purchase a novel domain name for his personal site (rs.me). Not only that, he published the DDoS mitigator used for the Incognito Market on GitHub with his real name.

According to his LinkedIn, Lin worked as an "IT diplomatic specialist" for the Taiwanese Ministry of Foreign Affairs working in Saint Lucia. In May 2024, Lin was arrested at John F. Kennedy International Airport during a layover on a flight from St. Lucia to Taiwan. He faces 35 years in federal prison.

Related Threads:
 
Last edited:
pom doing this:
This led to a lasting feud between Pom and Troia, which culminated in Pom exploiting a faulty external FBI e-mail server and sending off e-mails under the FBI domain name to a number of sysadmins warning about the "threat actor" Vinny Troia who was using "multiple global accelerators" and "fastflux technologies" for his attacks. He also sent an e-mail to journo Brian Krebs (also mentioned later) claiming responsibility for the incident and warning him to take immediate action as "we located a botnet being hosted on your forehead".

Despite this being highly embarrassing for the FBI, Pom was never charged for the incident
and his run in with the Federal assets at path.net lead me to my tinfoil hat theory that the CP was planted on him.
 
  • Thunk-Provoking
Reactions: Cowboy Kim
You will never be a real hacker. You have no code, you have no social engineering skills, you have no pwns. You are an incompetent retard twisted by scripts and Ritalin into a crude mockery of autism’s perfection.

All the “validation” you get is two-faced and half-hearted. Behind your back real hackers mock you. Your parents are disgusted and ashamed of you, your “friends” laugh at your faildox attempts behind their keyboards.

90s hackers are utterly repulsed by you. Decades of flamewars have allowed 1337s to sniff out frauds with incredible efficiency. Even skids who “pass” write code that's borderline inoperable on a modern OS. Your syntax structure is a dead giveaway. And even if you manage to get a mark to run your code, he’ll flip his shit and alt+f4 the second he sees the command prompt pop up.

This is your fate. This is what you chose. There is no turning back.
 
Despite his denials, LockBitSupp is more than likely Dimitry Khoroshev

Another prominent figure in the Russian ransomware gang is developer Mikhail Matveev or "Wazawaka"

Are these guys safe from the FBI since they live in Russia? I know they don't really give a fuck about cybercrime if its against western assets which is lulzy as fuck.

Great rewrite! Looking forward to seeing this leave PG.
 
You will never be a real hacker. You have no code, you have no social engineering skills, you have no pwns. You are an incompetent retard twisted by scripts and Ritalin into a crude mockery of autism’s perfection.

All the “validation” you get is two-faced and half-hearted. Behind your back real hackers mock you. Your parents are disgusted and ashamed of you, your “friends” laugh at your faildox attempts behind their keyboards.

90s hackers are utterly repulsed by you. Decades of flamewars have allowed 1337s to sniff out frauds with incredible efficiency. Even skids who “pass” write code that's borderline inoperable on a modern OS. Your syntax structure is a dead giveaway. And even if you manage to get a mark to run your code, he’ll flip his shit and alt+f4 the second he sees the command prompt pop up.

This is your fate. This is what you chose. There is no turning back.
> You will never be a real hacker.
> you have no social engineering skills
> Implying social engineering is hacking
 
> You will never be a real hacker.
> you have no social engineering skills
> Implying social engineering is hacking
Social engineering is a very important part of old-school hacking, yes. Fancy botnets and zero-days are fine and all, but the weakest point in security will always be the retard in HR who plugs in every USB drive she sees or the guard who lets anyone with a clipboard and a look of intent walk past into the server closet.
 
All of the people who are involved in this "area" of the internet almost always share the same characteristics. They're all autistic, but not intelligent enough to do anything with said autism.
1731268240431.png
This means that they are mere dorks, and not nerds, in colloquial language.

Good OP, by the way.
 
Social engineering is a very important part of old-school hacking, yes. Fancy botnets and zero-days are fine and all, but the weakest point in security will always be the retard in HR who plugs in every USB drive she sees or the guard who lets anyone with a clipboard and a look of intent walk past into the server closet.
> but the weakest point in security will always be the retard in HR who plugs in every USB drive she sees or the guard who lets anyone with a clipboard and a look of intent walk past into the server closet.
Let's be completely honest, falling for SE is practically never a guarantee, and SE'ing requires convincing someone to do something they otherwise wouldn't, which is extremely hard, especially if you're an ultra autistic hacker with a retard stutter on the phone.

SE does have its place, but it's mostly useful when you have a large pool of targets so you don't need to rely on one person being stupid enough to fall for it. As in, one in a hundred people will fall for SE so you need to phish 100 people in some company to get in.

The actual weakest link most of the time though is whatever is publicly facing in the network. There are millions of databreaches literally just caused by some retard in IT misconfiguring some database, or RDP, or VPN and publicly exposing it to the internet with default creds or just not updating it when it's vuln. Cybersec rejects honestly just say that the person is the weakest link in security because they're incapable of the actual hard work of hacking. In reality most data breaches (except for a few targeted ransomware ones like MGM) are the result of either some retarded misconfiguration or some direct exploit in publicly facing applications. This is only becoming the case more and more now that companies are outsourcing dev work to India.
 
Fantastic OP, only thing to add is the weird furry group that "hacked" into the project 2025 and also the crimew guy (although I think he might have a thread too), especially as they were responsible for taking money from pakistani banks, leaking the medical info of faroe islands and I believe the group was disbanded at some point for zoophilia accusations. Only thing I can recommend.

Cannot wait to see this get out of prospering grounds! As mentioned before, would be interesting to see the developments both of Russia and also (not mentioned) china/east asian hacking groups.
 
This was long overdue. Congratulations.
All of the people who are involved in this "area" of the internet almost always share the same characteristics. They're all autistic, but not intelligent enough to do anything with said autism.
View attachment 6631041
This means that they are mere dorks, and not nerds, in colloquial language.

Good OP, by the way.
In other words, skids.
also the crimew guy (although I think he might have a thread too),
Indeed he does - I believe it's in Stinkditch or Prospering Grounds.
edit: Found it. https://kiwifarms.st/threads/till-k...etescape-antiproprietiary-cybertillie.156088/
 
Last edited:
All of the people who are involved in this "area" of the internet almost always share the same characteristics. They're all autistic, but not intelligent enough to do anything with said autism.
View attachment 6631041
This means that they are mere dorks, and not nerds, in colloquial language.

Good OP, by the way.
All of that people want to be some kind of bully on the internet, just to end in the exile or in jail.
 
  • Agree
Reactions: Trombonista
Back