Baptiste Robert Profile picture
Jan 8 27 tweets 10 min read Read on X
Hackers claim to have breached Gravy Analytics, a US location data broker selling to government agencies.

They shared 3 samples on a Russian forum, exposing millions of location points across the US, Russia, and Europe.

It's OSINT time! 👇 Image
The samples include tens of millions of location data points worldwide.

They cover sensitive locations like the White House, Kremlin, Vatican, military bases, and more.

Time to dig in! Image
Image
Image
Visualizing such a massive amount of location data is no easy task.

Google Earth Pro crashed at 500k location points, and our OSINT platform hit its limit at 1.5 million. Even if it is "just" a sample, rendering the entire dataset at once is a real challenge. Image
To address the burning question: no, I didn’t find any data points from Epstein Island 😁 Image
Your mobile apps are sharing your location with companies like Gravy Analytics.

For instance, here are the locations of Tinder users in the UK. Image
I extracted the package names of Android apps that "leak" user locations.

Yes, 3455 apps.

And remember, this is just a "sample."

gist.github.com/fs0c131y/f498b…Image
The locations in these samples are tied to an advertising ID: AAID for Android and IDFA for iOS.

By isolating a target's advertising ID, you can trace their location history.

For instance, this individual in Sevastopol stayed at this hotel. Image
Image
While Europe spends years debating data regulations, the sad reality remains.

Maybe it’s time to (actually) take action? Image
These samples also include an extract of the reference databases they use.

Now imagine: plotting military bases alongside millions of location data points on the same map.

You could potentially deanonymize military personnel worldwide. Image
Protect yourself, open your phones:
- On Android: Go to Settings < Privacy < Ads < Delete advertising ID
- On iOS: Settings < Privacy & Security < Tracking < Allow Apps to Request To Track Image
Image
This isn’t your typical data leak, it’s a national security threat.

By mapping military locations in Russia alongside the location data, I identified military personnel in seconds.

Again, this is just a "sample". Image
Image
Image
The threat actor could potentially release the entire dump within a few hours.

If that happens, I’ll update the thread. Don’t forget to bookmark it! 😉

Stay tuned... Image
Additional notes:

👉 The total size of the sample is 1.4 GB, containing 30,449,271 locations

👉 Based on the hacker’s claim of having 10 TB of history, the entire dataset would likely contain approximately 217,494,792,857 locations. 🤪
The sample’s location data is relatively recent, covering January 5, 2024, through January 2, 2025.

However, please note that only half of the entries include a timestamp.

[I corrected my previous tweet] Image
It doesn't make much of a difference, but I found older locations dated August 10, 2023, and September 17, 2023. Image
Time for some fun! I can now geofence 30M locations.

Got an "interesting" spot in mind? Drop it in the comments, and I'll check it out.

Here's an example: data points around the White House and their movements across the globe! Image
No results for area 51 😅
Example of deanonymization:
- Dec 29, 7:08 PM: Seen at Columbus Circle, NYC.
- Later: Returned home to a TN town with a registered locksmith business.
- Next day: Visited his mother, Carol. His father was an USAF vet and passed 3 years ago.

Yes, you can be tracked. Image
Image
Image
Image
For privacy, disable location and Wi-Fi when not needed to avoid being tracked.

If an app shows ads, uninstall it. It likely shares your location with third parties.
Q: What platform is shown in the screenshots?
A: It’s the @PredictaLabOff OSINT platform, designed for law enforcement (non-public). For public tools, check out predictasearch.com and predictagraph.com.
@PredictaLabOff Q: Do these apps send my location directly to Gravy Analytics?
A: Not directly. Advertisers use complex systems to target ads based on your profile. Ultimately, companies like Gravy Analytics collect and resell your data, including to government agencies.
@PredictaLabOff Q: Should I put on my foil hat now?
A: Not really. This isn’t new and is well-known to specialists. If you value your privacy, following the advice in the thread is already a solid step forward.
@PredictaLabOff Q: Is this leak special somehow?
A: Yes, such a large volume of data being public is rare. But it’s just a fraction, Gravy Analytics processes 7 billion locations daily, while this leak contains “only” 30 million.
@PredictaLabOff Q: But what about GDPR and regulations?
A: There’s a gap between political debates and reality. This thread offers just a small glimpse of how your data is actually handled.
The sample includes a "users" file, a SQL dump of the "customers" table, featuring names like Google, Uber, eBay, Grindr, Babel Street, LiveRamp, Spotify, ...

Gravy Analytics has some major clients 👀 Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Baptiste Robert

Baptiste Robert Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @fs0c131y

Jan 19
The IP address of DrugHub, a well-known dark web drug marketplace, has been exposed.

The website owner made a critical OPSEC blunder.

It's OPSEC time!
On the website's /info/market-links page, three links are provided:
- The primary .onion address
- A clearnet link
- A permanent mirror Image
Currently, drughub[.]xx is protected by Cloudflare, but two months ago, it was hosted on the IP address 186.2.171.6. Image
Image
Read 9 tweets
Jan 14
Worried about a TikTok ban? Americans are now flocking to Xiaohongshu (REDnote), another Chinese app.

Spoiler: Yes, it tracks its users.

Time to dive in! ⬇️ Image
When creating an account, you must verify your phone number by entering a code received via SMS.

The request sent to Xiaohongshu's server includes your phone number (of course), along with your IDFA and IDFV. Image
Image
What’s an IDFA? The Identifier for Advertisers (IDFA) is a unique device ID assigned by Apple to every iOS device.

Many actors, like data brokers, use it to profile you, track your location, and more.

Read 13 tweets
Jan 10
Only one country was represented at Kim Jong Un's New Year's Eve party. Can you guess which one?

At the Rungrado Stadium, Kim hosted a grand celebration. Before the fireworks, officials enjoyed a private party near the stadium

One attendee's face stood out 🕵️‍♂️

It’s OSINT time!
South Korean media focused on a 2-second clip of Kim Yo Jong, Kim Jong Un's sister, seen publicly with what seemed to be her children for the first time.

But they missed something important 👀
I came across the official video of the private party before the celebration. It shows key figures stepping out of their cars, mingling, and chatting around tables.

Something immediately caught my eye. Do you see it too?
Read 17 tweets
Dec 28, 2024
5 days ago, an Instagram account shared a video from North Korea with the caption: "A brave tourist secretly captures restricted views of downtown North Korea"

Can we geolocate this footage?

It's GEOINT time!
I paused the video to screenshot this pink building. A quick Google Lens search reveals two matching photos of the location:
- alamyimages.fr/un-agent-de-po…
- flickr.com/photos/tobeyfo… Image
Image
Image
Image
The second link includes a street name and points to this location: 39.00493900995318, 125.73642620392643. Image
Image
Read 11 tweets
Dec 23, 2024
On Friday, December 20, 2024, the U.S. DOJ charged Rostislav Panev, a dual Russian-Israeli national, as a LockBit ransomware developer. Arrested in Israel, he awaits extradition to the U.S.

It's OSINT time! Image
You know the drill: with predictasearch.com and predictagraph.com, I traced and mapped Rostislav Panev's complete digital footprint.

Explore the graph here: predictagraph.com/graph/snapshot… Image
First things first, here’s the official information available:
- DOJ Press Release: justice.gov/opa/pr/united-…
- Superseding Complaint: justice.gov/opa/media/1381… Image
Image
Read 14 tweets
Oct 31, 2024
Two days ago, @TheJusticeDept announced an international disruption effort against the current version of RedLine Infostealer.

It's #OSINT time!
In the redacted complaint, Maxim Rudometov is identified as one of the developers of RedLine: justice.gov/usao-wdtx/medi…

Using Predicta Graph and #OSINT techniques, I’ve retraced each step taken by the @FBI. For full details, check out the complete graph!

predictagraph.com/graph/snapshot… Image
On March 4, 2020, a blogger named Foxovsky published a post on RedLine and its creators .

In his post, he mentioned two usernames connected to the stealer: Dendimirror and Alinchokweb.archive.org/web/2020031104…Image
Read 21 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(