According to Jon Di Maggio from @Analyst1:
- Bassterlord is a ransomware affiliate who runs his team, known as the National Hazard Agency. Originally, he was a junior. team member, but as time progressed, he moved up the ranks and is now its leader.
- Bassterlord partnered with at least four ransomware gangs: REvil, RansomEXX, Avadon and LockBit.
- Bassterlord is a Caucasian male around 27 years old, born, raised, and living in Lugansk, Ukraine. He operates on Russian underground forums under the monikers “Fisheye,” “Bassterlord,” “Buster,” and “National Hazard Agency,” which is also the name of his team.
@Analyst1 First things first, I searched the email sinner4iter@gmail.com on . It gives us a lot of online profiles. predictasearch.com
@Analyst1 In the data breaches tab of the report, we can see that his email was in a Twitter leak. It gives us his Twitter handle @It9111 predictasearch.com
@Analyst1 @It9111 A phone number linked to this email can be found in another leak. Time to pivot.
@Analyst1 @It9111 The email is also in the 000webhost leak (2015) and it gives the following location (48.511,38.6722) in Bryanka, Luhansk Oblast, Ukraine
@Analyst1 @It9111 In the report, we can also see the phone hint of the Apple account linked to this email. It's probably the same phone mentioned before (both ends with 38) predictasearch.com
@Analyst1 @It9111 A user with the same name than the profile (Koyerd Uhvwi) leaves a review about a dental clinic in Новомосковск ok.ru novomoskovsk.fooby.ru/company/stomat…
@Analyst1 @It9111 The profile states that he lives in Алексинский район. The dental clinic address is Россия, Тульская область, Новомосковск, Комсомольская улица, 36/14, 1 этаж.
@Analyst1 @It9111 In multiple leaks his personal address is available: Россия, Тульская обл, Новомосковский р-н, г Новомосковск, 301664, Маяковского ул, д. 10/2, кв. 59
And yes, it's a 12 min walk to go the dental clinic
- Yes, we have identified the correct individual, and he is aware of it. He has attempted to delete evidence since the publication of the tweet.
- Again, it’s not a one-man job. We have also identified the other members of the team.
- They are aware of it. They sent 500 million requests to predictasearch.com over the last three days.
- Trust the process. A report has been sent to the concerned authorities, and they will do their excellent work as usual.
They created a new Telegram channel. The last post they forwarded is from a channel called "Russian Partisan." This is not surprising according to our initial findings.
I've identified the people responsible for the DDoS attack on X yesterday. I'm currently in Washington and will be at the Eisenhower Building tomorrow (for another matter). Would you be interested in meeting?
In the meantime, let me explain
It's OSINT time!
@elonmusk Yesterday, a group called "Dark Storm Team" claimed responsibility for a DDoS attack on Twitter.
Their leader, MRHELL112 on Telegram, has previously used usernames like Darkcrr, GLITCHAT1, and GLITCHcracker.
@elonmusk In a Telegram channel about "DDoS Attack Services," DrSinaway is mentioned alongside Darkcrr.
DrSinaway’s TG bio also references a group called CyberSorcerers.
Après avoir dit que le texte est trop large un tweet plus haut on parle “des services” ? Il n’y avait pas un mot plus large dans le dictionnaire de la French Tech ?
Non il n’y a pas de backdoor qui respecte les libertés et la vie privée. C’est un MENSONGE.