According to Jon Di Maggio from @Analyst1:
- Bassterlord is a ransomware affiliate who runs his team, known as the National Hazard Agency. Originally, he was a junior. team member, but as time progressed, he moved up the ranks and is now its leader.
- Bassterlord partnered with at least four ransomware gangs: REvil, RansomEXX, Avadon and LockBit.
- Bassterlord is a Caucasian male around 27 years old, born, raised, and living in Lugansk, Ukraine. He operates on Russian underground forums under the monikers “Fisheye,” “Bassterlord,” “Buster,” and “National Hazard Agency,” which is also the name of his team.
@Analyst1 First things first, I searched the email sinner4iter@gmail.com on . It gives us a lot of online profiles. predictasearch.com
@Analyst1 In the data breaches tab of the report, we can see that his email was in a Twitter leak. It gives us his Twitter handle @It9111 predictasearch.com
@Analyst1 @It9111 A phone number linked to this email can be found in another leak. Time to pivot.
@Analyst1 @It9111 The email is also in the 000webhost leak (2015) and it gives the following location (48.511,38.6722) in Bryanka, Luhansk Oblast, Ukraine
@Analyst1 @It9111 In the report, we can also see the phone hint of the Apple account linked to this email. It's probably the same phone mentioned before (both ends with 38) predictasearch.com
@Analyst1 @It9111 A user with the same name than the profile (Koyerd Uhvwi) leaves a review about a dental clinic in Новомосковск ok.ru novomoskovsk.fooby.ru/company/stomat…
@Analyst1 @It9111 The profile states that he lives in Алексинский район. The dental clinic address is Россия, Тульская область, Новомосковск, Комсомольская улица, 36/14, 1 этаж.
@Analyst1 @It9111 In multiple leaks his personal address is available: Россия, Тульская обл, Новомосковский р-н, г Новомосковск, 301664, Маяковского ул, д. 10/2, кв. 59
And yes, it's a 12 min walk to go the dental clinic
Only one country was represented at Kim Jong Un's New Year's Eve party. Can you guess which one?
At the Rungrado Stadium, Kim hosted a grand celebration. Before the fireworks, officials enjoyed a private party near the stadium
One attendee's face stood out 🕵️♂️
It’s OSINT time!
South Korean media focused on a 2-second clip of Kim Yo Jong, Kim Jong Un's sister, seen publicly with what seemed to be her children for the first time.
But they missed something important 👀
I came across the official video of the private party before the celebration. It shows key figures stepping out of their cars, mingling, and chatting around tables.
Something immediately caught my eye. Do you see it too?
Hackers claim to have breached Gravy Analytics, a US location data broker selling to government agencies.
They shared 3 samples on a Russian forum, exposing millions of location points across the US, Russia, and Europe.
It's OSINT time! 👇
The samples include tens of millions of location data points worldwide.
They cover sensitive locations like the White House, Kremlin, Vatican, military bases, and more.
Time to dig in!
Visualizing such a massive amount of location data is no easy task.
Google Earth Pro crashed at 500k location points, and our OSINT platform hit its limit at 1.5 million. Even if it is "just" a sample, rendering the entire dataset at once is a real challenge.
5 days ago, an Instagram account shared a video from North Korea with the caption: "A brave tourist secretly captures restricted views of downtown North Korea"
On Friday, December 20, 2024, the U.S. DOJ charged Rostislav Panev, a dual Russian-Israeli national, as a LockBit ransomware developer. Arrested in Israel, he awaits extradition to the U.S.