Reading view

Who Benefited from the Aisuru and Kimwolf Botnets?

Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we’ll dig through digital clues left behind by the hackers, network operators and services that appear to have benefitted from Kimwolf’s spread.

On Dec. 17, 2025, the Chinese security firm XLab published a deep dive on Kimwolf, which forces infected devices to participate in distributed denial-of-service (DDoS) attacks and to relay abusive and malicious Internet traffic for so-called “residential proxy” services.

The software that turns one’s device into a residential proxy is often quietly bundled with mobile apps and games. Kimwolf specifically targeted residential proxy software that is factory installed on more than a thousand different models of unsanctioned Android TV streaming devices. Very quickly, the residential proxy’s Internet address starts funneling traffic that is linked to ad fraud, account takeover attempts and mass content scraping.

The XLab report explained its researchers found “definitive evidence” that the same cybercriminal actors and infrastructure were used to deploy both Kimwolf and the Aisuru botnet — an earlier version of Kimwolf that also enslaved devices for use in DDoS attacks and proxy services.

XLab said it suspected since October that Kimwolf and Aisuru had the same author(s) and operators, based in part on shared code changes over time. But it said those suspicions were confirmed on December 8 when it witnessed both botnet strains being distributed by the same Internet address at 93.95.112[.]59.

Image: XLab.

RESI RACK

Public records show the Internet address range flagged by XLab is assigned to Lehi, Utah-based Resi Rack LLC. Resi Rack’s website bills the company as a “Premium Game Server Hosting Provider.” Meanwhile, Resi Rack’s ads on the Internet moneymaking forum BlackHatWorld refer to it as a “Premium Residential Proxy Hosting and Proxy Software Solutions Company.”

Resi Rack co-founder Cassidy Hales told KrebsOnSecurity his company received a notification on December 10 about Kimwolf using their network “that detailed what was being done by one of our customers leasing our servers.”

“When we received this email we took care of this issue immediately,” Hales wrote in response to an email requesting comment. “This is something we are very disappointed is now associated with our name and this was not the intention of our company whatsoever.”

The Resi Rack Internet address cited by XLab on December 8 came onto KrebsOnSecurity’s radar more than two weeks before that. Benjamin Brundage is founder of Synthient, a startup that tracks proxy services. In late October 2025, Brundage shared that the people selling various proxy services which benefitted from the Aisuru and Kimwolf botnets were doing so at a new Discord server called resi[.]to.

On November 24, 2025, a member of the resi-dot-to Discord channel shares an IP address responsible for proxying traffic over Android TV streaming boxes infected by the Kimwolf botnet.

When KrebsOnSecurity joined the resi[.]to Discord channel in late October as a silent lurker, the server had fewer than 150 members, including “Shox” — the nickname used by Resi Rack’s co-founder Mr. Hales — and his business partner “Linus,” who did not respond to requests for comment.

Other members of the resi[.]to Discord channel would periodically post new IP addresses that were responsible for proxying traffic over the Kimwolf botnet. As the screenshot from resi[.]to above shows, that Resi Rack Internet address flagged by XLab was used by Kimwolf to direct proxy traffic as far back as November 24, if not earlier. All told, Synthient said it tracked at least seven static Resi Rack IP addresses connected to Kimwolf proxy infrastructure between October and December 2025.

Neither of Resi Rack’s co-owners responded to follow-up questions. Both have been active in selling proxy services via Discord for nearly two years. According to a review of Discord messages indexed by the cyber intelligence firm Flashpoint, Shox and Linus spent much of 2024 selling static “ISP proxies” by routing various Internet address blocks at major U.S. Internet service providers.

In February 2025, AT&T announced that effective July 31, 2025, it would no longer originate routes for network blocks that are not owned and managed by AT&T (other major ISPs have since made similar moves). Less than a month later, Shox and Linus told customers they would soon cease offering static ISP proxies as a result of these policy changes.

Shox and Linux, talking about their decision to stop selling ISP proxies.

DORT & SNOW

The stated owner of the resi[.]to Discord server went by the abbreviated username “D.” That initial appears to be short for the hacker handle “Dort,” a name that was invoked frequently throughout these Discord chats.

Dort’s profile on resi dot to.

This “Dort” nickname came up in KrebsOnSecurity’s recent conversations with “Forky,” a Brazilian man who acknowledged being involved in the marketing of the Aisuru botnet at its inception in late 2024. But Forky vehemently denied having anything to do with a series of massive and record-smashing DDoS attacks in the latter half of 2025 that were blamed on Aisuru, saying the botnet by that point had been taken over by rivals.

Forky asserts that Dort is a resident of Canada and one of at least two individuals currently in control of the Aisuru/Kimwolf botnet. The other individual Forky named as an Aisuru/Kimwolf botmaster goes by the nickname “Snow.”

On January 2 — just hours after our story on Kimwolf was published — the historical chat records on resi[.]to were erased without warning and replaced by a profanity-laced message for Synthient’s founder. Minutes after that, the entire server disappeared.

Later that same day, several of the more active members of the now-defunct resi[.]to Discord server moved to a Telegram channel where they posted Brundage’s personal information, and generally complained about being unable to find reliable “bulletproof” hosting for their botnet.

Hilariously, a user by the name “Richard Remington” briefly appeared in the group’s Telegram server to post a crude “Happy New Year” sketch that claims Dort and Snow are now in control of 3.5 million devices infected by Aisuru and/or Kimwolf. Richard Remington’s Telegram account has since been deleted, but it previously stated its owner operates a website that caters to DDoS-for-hire or “stresser” services seeking to test their firepower.

BYTECONNECT, PLAINPROXIES, AND 3XK TECH

Reports from both Synthient and XLab found that Kimwolf was used to deploy programs that turned infected systems into Internet traffic relays for multiple residential proxy services. Among those was a component that installed a software development kit (SDK) called ByteConnect, which is distributed by a provider known as Plainproxies.

ByteConnect says it specializes in “monetizing apps ethically and free,” while Plainproxies advertises the ability to provide content scraping companies with “unlimited” proxy pools. However, Synthient said that upon connecting to ByteConnect’s SDK they instead observed a mass influx of credential-stuffing attacks targeting email servers and popular online websites.

A search on LinkedIn finds the CEO of Plainproxies is Friedrich Kraft, whose resume says he is co-founder of ByteConnect Ltd. Public Internet routing records show Mr. Kraft also operates a hosting firm in Germany called 3XK Tech GmbH. Mr. Kraft did not respond to repeated requests for an interview.

In July 2025, Cloudflare reported that 3XK Tech (a.k.a. Drei-K-Tech) had become the Internet’s largest source of application-layer DDoS attacks. In November 2025, the security firm GreyNoise Intelligence found that Internet addresses on 3XK Tech were responsible for roughly three-quarters of the Internet scanning being done at the time for a newly discovered and critical vulnerability in security products made by Palo Alto Networks.

Source: Cloudflare’s Q2 2025 DDoS threat report.

LinkedIn has a profile for another Plainproxies employee, Julia Levi, who is listed as co-founder of ByteConnect. Ms. Levi did not respond to requests for comment. Her resume says she previously worked for two major proxy providers: Netnut Proxy Network, and Bright Data.

Synthient likewise said Plainproxies ignored their outreach, noting that the Byteconnect SDK continues to remain active on devices compromised by Kimwolf.

A post from the LinkedIn page of Plainproxies Chief Revenue Officer Julia Levi, explaining how the residential proxy business works.

MASKIFY

Synthient’s January 2 report said another proxy provider heavily involved in the sale of Kimwolf proxies was Maskify, which currently advertises on multiple cybercrime forums that it has more than six million residential Internet addresses for rent.

Maskify prices its service at a rate of 30 cents per gigabyte of data relayed through their proxies. According to Synthient, that price range is insanely low and is far cheaper than any other proxy provider in business today.

“Synthient’s Research Team received screenshots from other proxy providers showing key Kimwolf actors attempting to offload proxy bandwidth in exchange for upfront cash,” the Synthient report noted. “This approach likely helped fuel early development, with associated members spending earnings on infrastructure and outsourced development tasks. Please note that resellers know precisely what they are selling; proxies at these prices are not ethically sourced.”

Maskify did not respond to requests for comment.

The Maskify website. Image: Synthient.

BOTMASTERS LASH OUT

Hours after our first Kimwolf story was published last week, the resi[.]to Discord server vanished, Synthient’s website was hit with a DDoS attack, and the Kimwolf botmasters took to doxing Brundage via their botnet.

The harassing messages appeared as text records uploaded to the Ethereum Name Service (ENS), a distributed system for supporting smart contracts deployed on the Ethereum blockchain. As documented by XLab, in mid-December the Kimwolf operators upgraded their infrastructure and began using ENS to better withstand the near-constant takedown efforts targeting the botnet’s control servers.

An ENS record used by the Kimwolf operators taunts security firms trying to take down the botnet’s control servers. Image: XLab.

By telling infected systems to seek out the Kimwolf control servers via ENS, even if the servers that the botmasters use to control the botnet are taken down the attacker only needs to update the ENS text record to reflect the new Internet address of the control server, and the infected devices will immediately know where to look for further instructions.

“This channel itself relies on the decentralized nature of blockchain, unregulated by Ethereum or other blockchain operators, and cannot be blocked,” XLab wrote.

The text records included in Kimwolf’s ENS instructions can also feature short messages, such as those that carried Brundage’s personal information. Other ENS text records associated with Kimwolf offered some sage advice: “If flagged, we encourage the TV box to be destroyed.”

An ENS record tied to the Kimwolf botnet advises, “If flagged, we encourage the TV box to be destroyed.”

Both Synthient and XLabs say Kimwolf targets a vast number of Android TV streaming box models, all of which have zero security protections, and many of which ship with proxy malware built in. Generally speaking, if you can send a data packet to one of these devices you can also seize administrative control over it.

If you own a TV box that matches one of these model names and/or numbers, please just rip it out of your network. If you encounter one of these devices on the network of a family member or friend, send them a link to this story (or to our January 2 story on Kimwolf) and explain that it’s not worth the potential hassle and harm created by keeping them plugged in.

  •  

Why Effective CTEM Must be an Intelligence-Led Program

Blogs

Blog

Why Effective CTEM Must be an Intelligence-Led Program

Continuous Threat Exposure Management (CTEM) is a continuous program and operational framework, not a single pre-boxed platform. Flashpoint believes that effective CTEM must be intelligence-led, using curated threat intelligence as the operational core to prioritize risk and turn exposure data into defensible decisions.

SHARE THIS:
Default Author Image
January 6, 2026

Continuous Threat Exposure Management (CTEM) is Not a Product

Since Gartner’s introduction of CTEM as a framework in 2022, cybersecurity vendors have engaged in a rapid “productization” race. This has led to inconsistent market definitions, with a variety of vendors from vulnerability scanners to Attack Surface Management (ASM) providers now claiming to be an “exposure management” solution.

The current approach to productizing CTEM is flawed. There is no such thing as a single “exposure management platform.” The enterprise reality is that most enterprises buy three or more products just to approximate what CTEM promises in theory. Even with these technologies, organizations still require heavy lifting with people, process, and custom integrations to actually make it work.

The Exposure Stack: When One Platform Becomes Three (or More)

A functional CTEM approach typically requires multiple platforms or tools, including: 

  • Continuous Penetration/Exploitation Testing & Attack Path Analysis for continuous pentesting, attack path validation, and hands-on exposure validation.
  • Vulnerability and Exposure Management for vulnerability scanning, exposure scoring, and asset risk views.
  • Intelligence for deep, curated vulnerability, compromised credentials, card fraud, and other forms of intelligence that goes far beyond the scope of technology-based “management platforms”.

In some cases, organizations may also use an ASM vendor for shadow IT discovery, a CMDB for asset context, and ticketing integrations to drive remediation. This multi-platform model is the rule, not the exception. And that raises a hard truth: if you need three or more products, plus a dedicated team to implement CTEM, you need an intelligence-led CTEM program.

CTEM is an Operational Discipline, Not a Single Product

The narrative that CTEM can be packaged into a single product breaks down for three critical reasons:

1. CTEM is a Program, Not a Platform

You cannot buy a capability that requires full-stack asset visibility, contextualized threat actor data, real-world validation, and remediation orchestration from one tool. Each component spans a different domain of expertise and data. A vulnerability scanner, alone, cannot validate exploitability, a pentest service has a tough time scaling to daily monitoring, and generic threat intelligence feeds cannot provide critical business context.

However, CTEM requires orchestration of all these components in one operational loop. No single product delivers this comprehensively out of the box; this is why CTEM must be viewed as a continuous program, not a one-size-fits-all product.

2. Human Expertise is Irreplaceable

Vendors often advertise automation, however, key intelligence functions are still powered by and reliant on human analysis. Even with best-in-class AI tools in place, security teams are depending on human insights for:

  • Triaging noisy CVE lists
  • Cross-referencing exposure data with asset inventories
  • Manually validating if risks are real
  • Prioritizing based on threat intelligence and internal context
  • Writing custom logic and integrations to bridge platforms together

In other words, exposure management today still relies on human insights and expertise. So while vendors advertise “automation and intelligence,” what they’re really delivering is a starting point. Ultimately, AI is a force multiplier for threat analysts, not a replacement.

3. Risk Without Intelligence Is Just Data

Most platforms treat exposure like a math problem. But real risk isn’t just CVSS (Common Vulnerability Scoring System) scores or asset counts, it requires answering critical, intelligence-based questions:

  1. How likely is this vulnerability to be exploited, and what’s the impact if it is?
  2. How likely is this misconfiguration to be exploited, and what is its impact?
  3. How likely is this compromised credential to be used by a threat actor, and what is the potential impact?

These answers require intelligence, not just data. Best-in-class intelligence provides security teams with confirmed exploit activity in the wild, context around attacker usage in APT (Advanced Persistent Threat) campaigns, and detailed metadata for prioritization where CVSS fails. That is why Flashpoint intelligence is leveraged by over 800 organizations as the operational core of exposure management, turning exposure data into defensible decisions.

CTEM Productization vs. CTEM Reality

If your risk strategy requires continuous penetration and exploit testing, vulnerability management, threat intelligence, and manual prioritization and validation, you’re not buying CTEM; you’re building it. At Flashpoint, we’re helping organizations build CTEM the right way: driven by intelligence, and powered by integrations and AI.

The Intelligence-Led Future of Exposure Management

Flashpoint treats CTEM for what it really is, as a program that must be constructed intelligently, iteratively, and contextually.

That means:

  • Using threat and vulnerability intelligence to drive what actually gets prioritized
  • Treating scanners, ASM platforms, and pentesting as inputs, not outcomes
  • Building processes where intelligence, context, and validation inform exposure decisions, not just ticket creation
  • Investing in platform interconnectivity, not just feature checklists

Using Flashpoint’s intelligence collections, organizations can achieve intelligence-led exposure management, with threat and vulnerability intelligence working together to provide context and actionable insights in a continuous, prioritized loop. This empowers security teams to build and scale their own CTEM programs, which is the only realistic approach in a cybersecurity landscape where no single platform can do it all.

Achieve Elite Operation Control Over Your CTEM Program Using Flashpoint

If you’re evaluating exposure management tools, ask yourself:

  • What happens when we find a critical vulnerability and how do we know it matters?
  • Can this platform correlate attacker behavior with our asset landscape?
  • Does it validate risk or just report it?
  • How many other tools will we need to buy just to complete the picture?

The answers may surprise you. At Flashpoint, we’re helping organizations build CTEM the right way, driven by intelligence, powered by integration, and grounded in reality. Request a demo today and see how best-in-class intelligence is the key to achieving an effective CTEM program.

Request a demo today.

The post Why Effective CTEM Must be an Intelligence-Led Program appeared first on Flashpoint.

  •  

Flashpoint’s Top 5 Predictions for the 2026 Threat Landscape

Blogs

Blog

Flashpoint’s Top 5 Predictions for the 2026 Threat Landscape

Flashpoint’s forward-looking threat insights for security and executive teams, provides the strategic foresight needed to prepare for the convergence of AI, identity, and physical security threats in 2026.

SHARE THIS:
Default Author Image
December 2, 2025

As the global threat landscape accelerates its transformation, 2026 marks an inflection point requiring defensive strategies to fundamentally shift. The volatility observed in 2025 has paved the way for an era soon to be defined by AI-weaponized autonomy, information-stealing malware, systemic instability of public vulnerability systems, and the complete convergence of digital and physical risk.

Flashpoint offers a unique window into these complexities, providing organizations with the foresight needed to navigate what lies ahead. Drawing from Flashpoint’s leading intelligence and primary source collections, we highlight five key trends shaping the 2026 threat landscape. These insights aim to help organizations not only understand what’s next but also build the resilience needed to withstand and adapt to emerging challenges.

Prediction 1: Agentic AI Threats Will Weaponize Autonomy, Forcing a New Defensive Standard

2026 will see continued evolution of AI threats, with future attacks centering on autonomy and integration. Across the deep and dark web, Flashpoint is observing threat actors move past experimentation and into operational use of illegal AI. 

As attackers train custom fraud-tuned LLMs (Large Language Models) and multilingual phishing tools directly on illicit data, these AI models will become more capable. The criminal intent shaping their misuse will also become more sophisticated. Additionally, 2026 will see a greater marketplace for paid jailbreaking communities and synthetic media kits for KYC (Know Your Customer) bypass.

These advancements are enabling criminals to move beyond simple tools and engage in scaled, autonomous fraud operations, leading to two major shifts:

  1. Agentic AI is becoming the true flashpoint: Threat actors will be using agentic systems to automate reconnaissance, generate synthetic identities, and iterate on fraud playbooks in near real-time. In this SaaS ecosystem, AI will help attackers leverage subscription tiers and customer feedback loops at scale.
  2. The attack surface will shift to focus on AI Integrations: Organizations are increasingly plugging LLMs into live data streams, internal tools, identity systems, and autonomous agents. This practice often lacks the same security vetting, access controls, and monitoring applied to other enterprise systems. As such, attackers will heavily target these integrations, such as APIs, plugins, and system connections, rather than the models themselves.

The ubiquity of automation has dramatically increased attack tempo, leaving many security teams behind the curve. While automation can replace repetitive tasks across the enterprise, organizations must not make the critical mistake of substituting human judgement for AI at the intelligence level.

This is paramount because a critical threat in 2026 is Agentic AI autonomy weaponized against soft targets—API integrations and identity systems. The only winning defense will be human-led and AI-scaled, prioritizing purposeful use to keep organizations ahead of this exponential risk.

Josh Lefkowitz, CEO at Flashpoint

These evolving AI threats will force a fundamental shift in defensive strategies. Defenders will have to shift to deploying systems around AI rather than trust them on their own.

Prediction 2: Identity Compromise via Infostealers Will Become the Foundation of Every Attack

Infostealers will become the entry point, the data broker, the reconnaissance layer, and the fuel for everything that comes after a cyberattack. This shift is already in motion and is accelerating rapidly: in just the first half of 2025, infostealers were responsible for 1.8 billion stolen credentials, an 800% spike from the start of the year. However, 2026 will redefine the malware’s role, making its most valuable output being access, rather than disruption.

Infostealers will become the upstream event that powers the rest of the attack chain. Identity and session data will be increasingly targeted, since it gives attackers immediate access into victim environments. Ransomware, fraud, data theft, and extortion will simply be downstream ways to monetize.

This upstream approach defines the new reality of the attack chain, which is already operational. Nearly every major stealer strain Flashpoint observes now exfiltrates the following:

  • Autofill PII (personable identifiable information)
  • Saved addresses
  • Phone numbers
  • Internal URLs
  • Browsing history
  • Cloud app tokens

An organization’s attack surface is no longer just composed of their own networks. It is the entire digital identity of their employees and partners. This new reality requires security teams to take a new approach. Instead of attempting to block attacks, they must proactively detect compromised credentials before they are weaponized. This will be the difference between reacting to a data breach and preventing one.

The infostealer economy has fully industrialized the attack chain, making initial compromise a low-cost commodity. Multiple security incidents in 2025 tie back to credentials found in infostealer logs. This reality has underscored the critical importance of digital trust—specifically, verifying who can access what resources. For 2026, identity is the perimeter to watch, and security teams must proactively hunt for compromised credentials before they’re weaponized.

Ian Gray, Vice President of Intelligence at Flashpoint

Prediction 3: CVE Volatility Will Force Redundancy in Vulnerability Intelligence

The temporary funding crisis at CVE in April 2025 and the subsequent CISA stopgap extension through March 2026 exposed the systemic fragility of a centralized vulnerability intelligence model. With the future of the CVE/NVD system hanging in the balance, 2026 will be defined by the urgent need for redundancy and diversification in vulnerability intelligence.

In today’s vulnerability intelligence ecosystem, nearly every organization’s vulnerability management framework relies on CVE and NVD—including its “alternatives” such as the EUVD (European Union Vulnerability Database). The CVE system has grown into a critical global cybersecurity utility, relied upon by nearly all vulnerability scanners, SIEM platforms, patch management tools, threat intelligence feeds, and compliance reports. A complete shutdown of CVE would result in a widespread loss of institutional infrastructure.

The next generation of security needs to be built on practices that are resilient, diversified, and intelligence-driven. It should be focused on providing insights that can be used to take action such as threat actor behavior, likelihood of exploitation in the wild, relevance to ransomware campaigns, and business context. Security teams will need to leverage a comprehensive source of vulnerability intelligence such as Flashpoint’s VulnDB that provides full coverage for CVE, while also cataloging more than 100,000 vulnerabilities missed by CVE and NVD.

Prediction 4: Executive Protection Will Remain a Critical Challenge as Cyber-Physical Threats Converge

The continued blurring of lines between cyber, physical, and geopolitical threats will elevate the risk to organizational leadership, turning executive protection into a holistic intelligence function in 2026. The rise of information warfare combined with physical world convergence means the threat to key personnel is no longer purely digital.

In the aftermath of the tragic December 2024 assassination of United Healthcare’s CEO, Flashpoint has seen the continued circulation and glorification of “wanted-style posters” of executives in extremist communities. Additionally, Flashpoint has seen nation-state actors participate, using espionage and influence to target high-value individuals.
Organizations must adopt an integrated approach that connects insights from threat actor chatter and a wealth of other OSINT sources. This fusion of intelligence is essential for applying frameworks to ensure the safety of leadership and key personnel.

Prediction 5: Extortion Shifts to Identity-Based Supply Chain Risk

2025 was marked by several large-scale extortion campaigns, demonstrating how the threat landscape is rapidly evolving. Ransomware operations have shifted into a straight extortion play. Flashpoint has observed a surge in new entrants to the ransomware market, accompanied by a decline in the quality and decorum of ransomware groups.

Furthermore, vishing campaigns attributed to “Scattered Spider” have highlighted weaknesses in identity, trust, and verification. Campaigns from “Scattered LAPSUS$ Hunters” have also exposed vulnerabilities in third-party integrations. These attacks culminated in extortion, showcasing that modern attacks will target trusted users and trusted applications for initial access, and will forgo ransomware in place of data access.

As this shift continues into 2026, threat actors will increasingly focus their efforts on exploiting human behavior and identity systems. Instead of attempting to spend resources on breaking network perimeters, attackers will instead socially engineer employees to gain access to corporate systems at scale. This change in TTPs will undoubtedly greatly increase supply chain risk, especially for third parties.

Charting a Path Through an Evolving Threat Landscape with Flashpoint Intelligence

These five predictions highlight the transformative trends shaping the future of cybersecurity and threat intelligence. Staying ahead of these challenges demands more than just reactive measures—it requires actionable intelligence, strategic foresight, and cross-sector collaboration. By embracing these principles and investing in proactive security strategies, organizations can not only mitigate risks but also seize opportunities to enhance their resilience.

As the threat landscape continues to rapidly evolve, staying informed and prepared are critical components of risk mitigation. With the right tools, insights, and partnerships, security teams can navigate the complexities ahead and safeguard what matters most.

Request a demo.

The post Flashpoint’s Top 5 Predictions for the 2026 Threat Landscape appeared first on Flashpoint.

  •  

Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’

A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year by regularly stealing data from and publicly mass extorting dozens of major corporations. But the tables seem to have turned somewhat for “Rey,” the moniker chosen by the technical operator and public face of the hacker group: Earlier this week, Rey confirmed his real life identity and agreed to an interview after KrebsOnSecurity tracked him down and contacted his father.

Scattered LAPSUS$ Hunters (SLSH) is thought to be an amalgamation of three hacking groups — Scattered Spider, LAPSUS$ and ShinyHunters. Members of these gangs hail from many of the same chat channels on the Com, a mostly English-language cybercriminal community that operates across an ocean of Telegram and Discord servers.

In May 2025, SLSH members launched a social engineering campaign that used voice phishing to trick targets into connecting a malicious app to their organization’s Salesforce portal. The group later launched a data leak portal that threatened to publish the internal data of three dozen companies that allegedly had Salesforce data stolen, including ToyotaFedExDisney/Hulu, and UPS.

The new extortion website tied to ShinyHunters, which threatens to publish stolen data unless Salesforce or individual victim companies agree to pay a ransom.

Last week, the SLSH Telegram channel featured an offer to recruit and reward “insiders,” employees at large companies who agree to share internal access to their employer’s network for a share of whatever ransom payment is ultimately paid by the victim company.

SLSH has solicited insider access previously, but their latest call for disgruntled employees started making the rounds on social media at the same time news broke that the cybersecurity firm Crowdstrike had fired an employee for allegedly sharing screenshots of internal systems with the hacker group (Crowdstrike said their systems were never compromised and that it has turned the matter over to law enforcement agencies).

The Telegram server for the Scattered LAPSUS$ Hunters has been attempting to recruit insiders at large companies.

Members of SLSH have traditionally used other ransomware gangs’ encryptors in attacks, including malware from ransomware affiliate programs like ALPHV/BlackCat, Qilin, RansomHub, and DragonForce. But last week, SLSH announced on its Telegram channel the release of their own ransomware-as-a-service operation called ShinySp1d3r.

The individual responsible for releasing the ShinySp1d3r ransomware offering is a core SLSH member who goes by the handle “Rey” and who is currently one of just three administrators of the SLSH Telegram channel. Previously, Rey was an administrator of the data leak website for Hellcat, a ransomware group that surfaced in late 2024 and was involved in attacks on companies including Schneider Electric, Telefonica, and Orange Romania.

A recent, slightly redacted screenshot of the Scattered LAPSUS$ Hunters Telegram channel description, showing Rey as one of three administrators.

Also in 2024, Rey would take over as administrator of the most recent incarnation of BreachForums, an English-language cybercrime forum whose domain names have been seized on multiple occasions by the FBI and/or by international authorities. In April 2025, Rey posted on Twitter/X about another FBI seizure of BreachForums.

On October 5, 2025, the FBI announced it had once again seized the domains associated with BreachForums, which it described as a major criminal marketplace used by ShinyHunters and others to traffic in stolen data and facilitate extortion.

“This takedown removes access to a key hub used by these actors to monetize intrusions, recruit collaborators, and target victims across multiple sectors,” the FBI said.

Incredibly, Rey would make a series of critical operational security mistakes last year that provided multiple avenues to ascertain and confirm his real-life identity and location. Read on to learn how it all unraveled for Rey.

WHO IS REY?

According to the cyber intelligence firm Intel 471, Rey was an active user on various BreachForums reincarnations over the past two years, authoring more than 200 posts between February 2024 and July 2025. Intel 471 says Rey previously used the handle “Hikki-Chan” on BreachForums, where their first post shared data allegedly stolen from the U.S. Centers for Disease Control and Prevention (CDC).

In that February 2024 post about the CDC, Hikki-Chan says they could be reached at the Telegram username @wristmug. In May 2024, @wristmug posted in a Telegram group chat called “Pantifan” a copy of an extortion email they said they received that included their email address and password.

The message that @wristmug cut and pasted appears to have been part of an automated email scam that claims it was sent by a hacker who has compromised your computer and used your webcam to record a video of you while you were watching porn. These missives threaten to release the video to all your contacts unless you pay a Bitcoin ransom, and they typically reference a real password the recipient has used previously.

“Noooooo,” the @wristmug account wrote in mock horror after posting a screenshot of the scam message. “I must be done guys.”

A message posted to Telegram by Rey/@wristmug.

In posting their screenshot, @wristmug redacted the username portion of the email address referenced in the body of the scam message. However, they did not redact their previously-used password, and they left the domain portion of their email address (@proton.me) visible in the screenshot.

O5TDEV

Searching on @wristmug’s rather unique 15-character password in the breach tracking service Spycloud finds it is known to have been used by just one email address: cybero5tdev@proton.me. According to Spycloud, those credentials were exposed at least twice in early 2024 when this user’s device was infected with an infostealer trojan that siphoned all of its stored usernames, passwords and authentication cookies (a finding that was initially revealed in March 2025 by the cyber intelligence firm KELA).

Intel 471 shows the email address cybero5tdev@proton.me belonged to a BreachForums member who went by the username o5tdev. Searching on this nickname in Google brings up at least two website defacement archives showing that a user named o5tdev was previously involved in defacing sites with pro-Palestinian messages. The screenshot below, for example, shows that 05tdev was part of a group called Cyb3r Drag0nz Team.

Rey/o5tdev’s defacement pages. Image: archive.org.

A 2023 report from SentinelOne described Cyb3r Drag0nz Team as a hacktivist group with a history of launching DDoS attacks and cyber defacements as well as engaging in data leak activity.

“Cyb3r Drag0nz Team claims to have leaked data on over a million of Israeli citizens spread across multiple leaks,” SentinelOne reported. “To date, the group has released multiple .RAR archives of purported personal information on citizens across Israel.”

The cyber intelligence firm Flashpoint finds the Telegram user @05tdev was active in 2023 and early 2024, posting in Arabic on anti-Israel channels like “Ghost of Palestine” [full disclosure: Flashpoint is currently an advertiser on this blog].

‘I’M A GINTY’

Flashpoint shows that Rey’s Telegram account (ID7047194296) was particularly active in a cybercrime-focused channel called Jacuzzi, where this user shared several personal details, including that their father was an airline pilot. Rey claimed in 2024 to be 15 years old, and to have family connections to Ireland.

Specifically, Rey mentioned in several Telegram chats that he had Irish heritage, even posting a graphic that shows the prevalence of the surname “Ginty.”

Rey, on Telegram claiming to have association to the surname “Ginty.” Image: Flashpoint.

Spycloud indexed hundreds of credentials stolen from cybero5dev@proton.me, and those details indicate that Rey’s computer is a shared Microsoft Windows device located in Amman, Jordan. The credential data stolen from Rey in early 2024 show there are multiple users of the infected PC, but that all shared the same last name of Khader and an address in Amman, Jordan.

The “autofill” data lifted from Rey’s family PC contains an entry for a 46-year-old Zaid Khader that says his mother’s maiden name was Ginty. The infostealer data also shows Zaid Khader frequently accessed internal websites for employees of Royal Jordanian Airlines.

MEET SAIF

The infostealer data makes clear that Rey’s full name is Saif Al-Din Khader. Having no luck contacting Saif directly, KrebsOnSecurity sent an email to his father Zaid. The message invited the father to respond via email, phone or Signal, explaining that his son appeared to be deeply enmeshed in a serious cybercrime conspiracy.

Less than two hours later, I received a Signal message from Saif, who said his dad suspected the email was a scam and had forwarded it to him.

“I saw your email, unfortunately I don’t think my dad would respond to this because they think its some ‘scam email,'” said Saif, who told me he turns 16 years old next month. “So I decided to talk to you directly.”

Saif explained that he’d already heard from European law enforcement officials, and had been trying to extricate himself from SLSH. When asked why then he was involved in releasing SLSH’s new ShinySp1d3r ransomware-as-a-service offering, Saif said he couldn’t just suddenly quit the group.

“Well I cant just dip like that, I’m trying to clean up everything I’m associated with and move on,” he said.

The former Hellcat ransomware site. Image: Kelacyber.com

He also shared that ShinySp1d3r is just a rehash of Hellcat ransomware, except modified with AI tools. “I gave the source code of Hellcat ransomware out basically.”

Saif claims he reached out on his own recently to the Telegram account for Operation Endgame, the codename for an ongoing law enforcement operation targeting cybercrime services, vendors and their customers.

“I’m already cooperating with law enforcement,” Saif said. “In fact, I have been talking to them since at least June. I have told them nearly everything. I haven’t really done anything like breaching into a corp or extortion related since September.”

Saif suggested that a story about him right now could endanger any further cooperation he may be able to provide. He also said he wasn’t sure if the U.S. or European authorities had been in contact with the Jordanian government about his involvement with the hacking group.

“A story would bring so much unwanted heat and would make things very difficult if I’m going to cooperate,” Saif said. “I’m unsure whats going to happen they said they’re in contact with multiple countries regarding my request but its been like an entire week and I got no updates from them.”

Saif shared a screenshot that indicated he’d contacted Europol authorities late last month. But he couldn’t name any law enforcement officials he said were responding to his inquiries, and KrebsOnSecurity was unable to verify his claims.

“I don’t really care I just want to move on from all this stuff even if its going to be prison time or whatever they gonna say,” Saif said.

  •  

G2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat Intelligence

Blogs

Blog

G2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat Intelligence

Breaking down Flashpoint’s rankings in G2’s 2023 fall reports, including customer testimonials

SHARE THIS:
Default Author Image
September 13, 2023

Flashpoint has earned multiple trust badges from G2’s Fall 2023 Reports, affirming our unwavering commitment to delivering timely, contextual intelligence to our clients so they can take rapid, decisive action to stop threats and reduce risk. Here are some highlights from G2’s reports.

‘Leader’ and ‘High Performer’

G2 awarded Flashpoint a “Leader Badge”—ranking us #1 in the Enterprise Americas Regional Grid for Threat Intelligence. Specifically, customers highlighted the value of Flashpoint’s finished intelligence reports, with 98 percent of customers emphasizing its utility.

‘The Platform itself is a great tool’

—CTI analyst on Ignite

94% ‘Likely to Recommend’

In G2’s Enterprise Relationship Index for Threat Intelligence, Flashpoint has the highest score for “Most Likely to Recommend,” with 94 percent of surveyed customers endorsing Flashpoint as an intelligence partner. 

Flashpoint also exceeded the index’s performance averages in all categories, including “Ease of Doing Business With” and “Quality of Support.” 

‘Flashpoint has been a great partner of ours for many years, and the trust we’ve built with their team of managers and analysts is excellent.

—Fraud Intelligence Lead, Fortune 500 Technology Company

Related reading: Flashpoint a Strong Performer in External Threat Intelligence Forrester Wave

Leader in Dark Web Monitoring

In G2’s Americas Regional Grid® Report, 99 percent of surveyed customers highlighted Flashpoint’s dark web monitoring capabilities.

Additionally, 90 percent of customers emphasized Flashpoint’s ticketing and RFI services, showcasing our commitment to the intersections between data, intelligence, and professional services support. 

‘Flashpoint offers the greatest amount of data regarding the criminal underground in relation to their peers. The data is well sorted, well presented, and easy to search.

— SVP, DFIR Investigations, Public Sector

‘An Excellent Intelligence Tool’

Hear from our customers by reading Flashpoint review on G2, or sign up for a free trial today to see how “great” threat intelligence can help your organization reduce risk and mitigate threats.

Request a demo today.

  •  

The Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering

Blogs

Blog

The Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering

We sit down for a Q&A with Michael Raypold to discuss the launch of the Flashpoint Firehose, our new data-as-a-service solution

SHARE THIS:
Default Author Image
July 31, 2023
Firehose QA Michael Raypold

1. Tell me about the Flashpoint Firehose. What needs and challenges was it built to address?

Michael Raypold: The Flashpoint Firehose is a data-as-a-service solution that delivers a constant stream of data from various sources, ranging from social media platforms to messaging apps and illicit communities. It also includes numerous sources from APAC, Europe, the Middle East, and Africa—all vital data sources that are often underrepresented among other providers.

The Firehose delivers access to all ingested data from Flashpoint’s unique collections that data companies, federal systems integrators (FSIs), and large-scale national security teams need in order to build high-quality data and AI tools to enhance global situational awareness, generate timely intelligence, and advance national security initiatives.

With Firehose access, customers can pull key segments of Flashpoint data into their own infrastructure without needing to query our APIs. This unlocks the ability to train large language models or build machine learning models, enabling product development. This is especially important for many of our OEM partners.

2. Why is Flashpoint especially positioned to offer this type of solution?

Threat actors aren’t constrained by borders, and a diverse data set is imperative for organizations working in the cyber and physical security domains. Because of this, Flashpoint has dedicated the last 13 years to building out its collections capabilities and in-house analyst team to deliver actionable intelligence from a wide range of publicly and commercially available information data sources. As a result, Flashpoint has become the industry leader in delivering solutions for cyber threat intelligence, vulnerability management, physical security intelligence, and national security teams.

3. What are some of the unique capabilities of the Firehose?

The Firehose excels in the following primary categories:

  1. Speed: Once the data is ingested by the Flashpoint Firehose, it is delivered to the customer in real-time or near-real-time. This is especially important for customers building products where speed is paramount, such as an alerting dashboard.
  1. Data: Flashpoint focuses heavily on the variety, breadth, and depth of its data, which is incredibly important for our customers who require comprehensive coverage of the information landscape.
  1. Flexibility: The Firehose is designed to enable users to manipulate the data according to their specific needs.

To ease adoption, Flashpoint has also enriched all of the Firehose content with geospatial inference and language detection, making it easier for users to draw actionable insights and pivot off of Flashpoint’s unique selectors.

4. Tell me more about the ML enrichments.

Once collected and structured, the data undergoes enrichment through named entity recognition and machine learning, providing geospatial insight and language detection, offering customers additional ways to filter and query the data while delivering immediate value. This data can then integrate seamlessly into custom products and be indexed according to the customer’s requirements.

5. As an engineer yourself, what excites you the most about the Firehose?

When building high-quality intelligence products, engineers are often limited by the breadth, depth, and availability of the data they can query or make actionable for their customers. This problem is exacerbated when they have to make API queries to third-party providers. 

The ability to ingest Flashpoint data in real time and have end-to-end control over the storage, enrichment, and querying of that data enables really exciting product opportunities. The Firehose allows engineers to ingest data into their own infrastructure and enable a crisper product experience.

The ability to build a notification or alerting pipeline off of a data stream is one possibility that’s unlocked with a Firehose versus a REST API. Others will find that the Firehose is uniquely positioned for anomaly detection, dashboarding, data visualization, training large language models, or extending internal and proprietary data sets to craft a truly differentiated experience.

We’re innovating entirely with our partners in mind, to fulfill their data requirements. The Flashpoint Firehose was built to serve as a force multiplier for their data-driven products, enabling them to realize their visions and value faster.

Learn more about the Flashpoint Firehose here.

Request a demo today.

  •  

Why We Built Flashpoint Ignite: Unity, Power, and Performance

Blogs

Blog

Why We Built Flashpoint Ignite: Unity, Power, and Performance

Flashpoint’s Chief Product and Engineering Officer, Patrick Gardner, introduces Flashpoint Ignite—our new platform to accelerate cross-functional threat detection and risk mitigation for CTI, Vulnerability, National Security, and Physical Security teams

SHARE THIS:
Default Author Image
April 24, 2023
Why we built Flashpoint Ignite: Unity, Power, and Performance

Flashpoint has long been known for its industry-leading data collection and finished intelligence. After two major acquisitions in 2022, we have powerful far-reaching visibility with more technology than ever, which presents us with an amazing challenge—how do we put these components together in a way that unlocks even more value for our customers?

Our answer: Ignite—Flashpoint’s brand new, team-tailored, lightning-fast intelligence platform.

What is the Flashpoint Ignite Intelligence Platform?

The Flashpoint Ignite platform is a technology ecosystem that delivers tailored intelligence across multiple security functions in a combined workspace. It enables security teams to connect and remediate risk faster with access to Flashpoint’s extensive intelligence, along with analytical tools to rapidly find relevant data as well as the ability to request custom intelligence support in just a few clicks. 

Ignite is the home of our new Cyber Threat Intelligence, Physical Security Intelligence, Vulnerability Management, and National Security Intelligence solutions, and it provides a unified experience across the organization. With a holistic view of risk in one place, security and intelligence practitioners can finally close the gap between data, intelligence, and action.

“In an overwhelming information landscape, we are doing everything possible to make our customers’ jobs easier.”

Patrick Gardner

Why Did We Build the Flashpoint Ignite Platform?

When I joined Flashpoint in September 2022, I felt like a kid in a candy store. We have an incredible amount of information and capabilities. Our strategy is to make it easy and fast to surface that value for our customers to tackle various challenges. We built Ignite to support this goal and to help our customers solve their challenges more effectively. 

The main pillars we aim to address with the Flashpoint Ignite platform are:

  • Improving user experience by making it intuitive, faster, customizable, and easier to find relevant information.
  • Incorporating custom intelligence requests into the platform to allow users to manage and track their reports in a single unified location.
  • Integrating all of our data so users can see threats end-to-end.

Key Ignite Features

Each solution under the Ignite platform has its own set of powerful features specially designed to support different teams’ intel missions, each of which contribute to an organization’s overarching security objective to protect assets, infrastructure, and stakeholders from cyber and physical threats. 

The real power of Ignite is how we bring these capabilities together with common features across all solutions:

  • Universal Search: Ignite allows users to easily and quickly navigate through the vast landscape of collections and intelligence to find the information they need across text, video, conversations, and images with a single search across all data.  
  • Alerting: Ignite enables users to create intuitive and highly customizable alerts directly from their searches to inform them when pertinent information is uncovered.
  • Reports: Ignite helps teams inform decision-making and prioritize efforts to protect their organizations with a sleek news-style finished intelligence experience that makes it easy to find the content most relevant to your organization’s risk profile and mitigation strategy.

How Ignite Powers Results

In an overwhelming information landscape, we are doing everything possible to make our customers’ jobs easier. These are the main outcomes we aim to deliver with Ignite: 

Enabling teams to achieve more with an integrated Flashpoint experience

  • Ignite delivers a range of solutions to support various security teams while providing the extensibility to integrate and interoperate with other solutions. Teams can easily obtain the information they need to move information forward and remediate risk faster. 

Providing dependable intelligence for everyone

  • We gather data from all different corners of the internet, cut through the noise, and find the answers our customers need to do their jobs faster. Whether they need visibility into the deep and dark web, OSINT/surface web, vulnerabilities, breach data, or geospatial intelligence–our finished intelligence reports and raw collections are right at our users’ fingertips.

Closing the gap between data, intelligence, and action

  • Users can quickly assess their data across all products, streamline workflows, adapt, and take decisive action. Ignite connects multiple tools, so whether our customers are deep in investigative work or consuming reports to stay on top of trends, they can stay ahead of the changing threat landscape.

What’s Next?

With all the strengths Flashpoint has, there’s so much opportunity and we’ve only scratched the surface. Ignite provides a highly flexible and robust technology layer for us to build lightning-fast, easily searchable solutions for teams across the security organization. 

In the future, customers can expect better integrations, more powerful enrichments, increased data correlation, new visualizations, and more relevant information automatically recommended through situational awareness, alleviating the need to spend excess time and resources seeking it out.

Frequently Asked Questions (FAQs)

What is Flashpoint Ignite and why should my organization use it?

Flashpoint Ignite is a unified intelligence platform that brings together cyber threat intelligence, physical security, vulnerability management, and national security data into one workspace. Your organization should use it to eliminate data silos and accelerate the time it takes to detect and remediate risks. By consolidating all of Flashpoint’s industry-leading data into a single, lightning-fast ecosystem, Ignite allows your teams to see threats from end to end.

Flashpoint Ignite SolutionTeam Benefit
Cyber Threat IntelligenceAccelerates investigations into dark web actors and malware.
Physical Security IntelligenceProvides situational awareness for executives and global facilities.
Vulnerability ManagementPrioritizes patching based on real-world exploitability data.

How does Flashpoint Universal Search improve analyst efficiency?

Flashpoint Universal Search improves efficiency by allowing analysts to query the platform’s vast collections of text, video, images, and technical data with a single search. Instead of toggling between different tools or datasets, Universal Search within Flashpoint Ignite surfaces all relevant information instantly. This “one-stop” search capability acts as a force multiplier, giving analysts back the time and energy they used to spend on manual data aggregation.

  • Unified Results: See dark web chatter, technical indicators, and media in one view.
  • Format Flexibility: Search for keywords within videos and images using OCR and logo detection.
  • Speed-to-Insight: Reduces the steps required to validate a threat and move toward action.

Why is the unified experience in Flashpoint Ignite better than using separate tools?

The unified experience in Flashpoint Ignite is better because it closes the dangerous gap between data, intelligence, and action. Using separate tools often leads to missed correlations and slower response times. In Flashpoint Ignite, security and intelligence practitioners can view cyber and physical risks side-by-side, ensuring that every decision is backed by a holistic understanding of the organization’s risk profile.

Traditional Multi-Tool ApproachFlashpoint Ignite Unified Experience
Fragmented DataFully integrated data across all security functions.
Slower TriageAccelerated remediation through cross-functional workflows.
Higher ComplexitySimplified news-style reporting and intuitive custom alerts.

Request a demo today.

  •  

The Risk-Reducing Power of Flashpoint Video Search

Blogs

Blog

The Risk-Reducing Power of Flashpoint Video Search

An essential investigative component, Flashpoint’s industry-first video search technology surfaces logos, text, explicit content, and other critical intelligence for CTI, Fraud, Brand Protection, and Physical Security teams

SHARE THIS:
Default Author Image
April 21, 2023

Video as Essential Threat Intelligence

When advertising and selling their services, or boasting about their exploits, threat actors will often post media, including video, to illicit communities that serve as proof points for potential buyers and partners.

They showcase sensitive information and stolen goods, including: stolen identities, compromised bank accounts, checks, and stolen credit cards; gift cards and receipts; fake, unlicensed merchandise; ATM skimmers and shimmers, guns and drugs, exploit code, RDP access, brand impersonation, physical security threats, and much more.

Now, video use amongst threat actors is on the rise, as media-rich, mobile-first communication is becoming a primary mode of communication in illicit communities. Gaining visibility into this threat landscape is essential intelligence to CTI, Fraud, Brand Protection, and Physical Security teams, among other practitioners whose job it is to protect against exposure to fraud, corporate brand abuse, and acts of violence: 

Even better is having a way to search this media across text, images, and video in order to identify potential threats. Flashpoint offers all three—and our new video search analysis is a unique offering on the market.

What is Flashpoint Video Search Technology?

Building on the success of our OCR capability for images, security teams can now surface threats in videos posted by threat actors using object detection, logo detection, text extraction, and explicit content detection directly within the Flashpoint Intelligence Platform.

Security teams across various industries in public and private sectors have realized the value of searching for, and being alerted on, images of company assets that pop up on open-source and darknet communities. Flashpoint’s video search analysis expands the scope of coverage, offering additional insights into a fast-growing medium used by threat actors.

What Can It Identify?

Video search analysis gives teams the ability to search for and generate keyword specific alerts for text, logos, and organizational assets inside videos across Flashpoint intelligence collections. Flashpoint’s new video search analysis helps to identify: 

  • Labels and objects, including products, locations, activities, and animal species
  • Logos, including a library of more than 100,000 brand-specific media
  • Text, including the detection and extraction of text within an input video using OCR
  • Explicit content, including adult content in videos, which is generally defined as inappropriate for people under the age of 18

What Can Flashpoint Video Search Identify?

Video search analysis equips security teams with the additional tools and intelligence they need in their missions of preventing fraud and protecting their organization.

Financial Fraud

Search for a bank or institution name to discover videos with that particular logo or text in them. Locate a threat actor boasting about ATM access, logos or text on a check or receipts, or of a physical brick and mortar building. Video search analysis can be used to uncover instances of threat actors engaging in using ATMs to extract cash, duplicating false checks, credit card fraud, and POS skimmers. 

Additionally, Flashpoint financial services customers have found countless instances of potentially fraudulent accounts, checks, and cards using image OCR—and our new video search analysis functionality will only enhance and increase the ability to prevent financial fraud. One Flashpoint financial services customer detected more than $4M in illicitly marketed assets, including checks and compromised accounts, using our OCR capabilities.

Physical Security 

Enhance executive protection by monitoring for specific personally identifiable information (PII) related to employees, executives, and organizations. With this, physical security teams can work to prevent acts of violence and crimes or threats at points of interest, events, or physical locations. 

Brand Protection

Monitor for an organization’s brand in videos shared by illicit actors, including the ability to identify insider threats via videos of compromised web servers, compromised customer accounts, and stolen merchandise. 

Access Flashpoint Video Search Today

Learn more about how Flashpoint’s industry-first video search technology can help your teams surface logos, text, explicit content, and other critical intelligence.

Frequently Asked Questions (FAQs)

What is Flashpoint Video Search and how does it help investigators?

Flashpoint Video Search is an industry-first technology within the Flashpoint Intelligence Platform that allows users to search for specific objects, text, and logos inside video files. It helps investigators by surfacing critical intelligence from videos posted in illicit communities, such as threat actors boasting about stolen bank accounts, showing off illegal weapons, or demonstrating how to use POS skimmers.

Flashpoint Video Search CapabilityInvestigative Benefit
Logo DetectionIdentifies a library of 100,000+ brand logos inside video frames.
Text Extraction (OCR)Reads and pulls text, such as names on checks or credit cards, from video.
Object LabelingDetects physical items like ATM skimmers, guns, or specific products.

How does Flashpoint Video Search assist in preventing financial fraud?

Flashpoint Video Search assists in preventing financial fraud by allowing banks and institutions to scan for their brand names and assets in videos shared on the dark web. Fraud teams can use Flashpoint to find threat actors showcasing “proof” of their exploits, such as videos of cash being extracted from compromised ATMs or close-ups of stolen checks and credit cards, enabling the bank to cancel those assets immediately.

  • Asset Recovery: Surfaces compromised accounts and cards before they can be fully exploited.
  • Skimmer Detection: Identifies videos showing the installation or use of physical POS skimmers.
  • Risk Mitigation: Helps organizations detect and prevent millions of dollars in potential losses.

Why is Flashpoint Video Search unique for brand and physical protection?

Flashpoint Video Search is unique for brand and physical protection because it provides visibility into a fast-growing medium that traditional text-based search tools miss. Physical security teams can use Flashpoint to detect threats against executives or facilities by monitoring for specific faces or locations in videos. Brand protection teams can identify insider threats by finding videos of stolen merchandise or compromised corporate servers that are being marketed for sale.

Protection TypeFlashpoint Application
Brand ProtectionFinds videos of counterfeit products or brand impersonation attempts.
Executive ProtectionMonitors for leaked PII or visual threats against high-profile personnel.
Physical SecurityIdentifies threats at specific physical locations, events, or points of interest.

Request a demo today.

  •  

Risk Intelligence Index: Cyber Threat Landscape by the Numbers

Blogs

Blog

Risk Intelligence Index: Cyber Threat Landscape by the Numbers

Flashpoint’s monthly look at the cyber risk ecosystem affecting organizations around the world, including intelligence, news, data, and analysis about ransomware, vulnerabilities, insider threats, and takedowns of illicit forums and shops.

SHARE THIS:
Default Author Image
April 13, 2023
Table Of Contents
subscribe to our newsletter

Ransomware

Flashpoint’s latest ransomware infographic paints a sobering picture of the evolving threat landscape, as cybercriminals employ increasingly sophisticated—and effective—tactics. Last month, our analysts observed a total of 397 ransomware attacks.

Key takeaways for the state of ransomware

  • Organizations in the United States bore the brunt of ransomware attacks, accounting for a staggering 211 incidents—a 66 percent increase compared to last month.
  • The top three industries targeted by ransomware were Professional Services, Internet Software & Services, and Construction & Engineering.
  • Clop ransomware has emerged as one of the most active ransomware groups, securing the second spot in March’s top 10 ranking. Last month, Clop garnered attention by exploiting a remote code execution vulnerability—allegedly enabling them to acquire data from over 100 organizations, although they only disclosed a few victim names on their blog.

Vulnerabilities

According to our intelligence, 2,245 new vulnerabilities were reported in March, with 379 of them being missed by the Common Vulnerabilities and Exposures (CVE) and National Vulnerability Database (NVD).

Key takeaways for the state of vulnerability intelligence

  • Approximately 34 percent of March’s disclosed vulnerabilities are rated as high-to-critical in severity, which if exploited, could pose a significant risk to an organization’s security posture.
  • Over 78 percent of March’s vulnerabilities are remotely exploitable, meaning that if threat actors are able to leverage these issues, they can execute malicious code no matter where the device is located.
  • Nearly 29 percent of March’s vulnerabilities already have a documented public exploit, which drastically lessens the difficulty to exploit.
  • Vulnerability Management teams can potentially lessen workloads by nearly 88 percent by first focusing on actionable, high severity vulnerabilities—i.e., vulnerabilities that are remotely exploitable, that have a public exploit, and a viable solution; 253 of March’s vulnerabilities meet this criteria.

Insider Threat

The tactic of recruiting insiders has become immensely popular amongst threat actors aiming to breach systems and/or commit ransomware attacks.

In March, our analysts collected 5,586 posts advertising insider services—both from threat actors seeking insiders and malicious employees offering their services. Of those, 1,127 were unique posts from individuals in illicit and underground communities.

Key takeaways for the state of insider threat intelligence

  • In March, Flashpoint tracked 5,586 posts related to insider threats activity—both from threat actors attempting to solicit insider-facilitated access and from disgruntled employees offering their services. Of the total, 1,127 were unique postings.
  • At this time, the Telecom industry is the most targeted sector, followed by Financial and Retail.
  • Looking into the state of insider threats further, Flashpoint found that the majority of insider threat related postings originated from inside the organization with malicious insiders offering their services. Most of this activity came from the Telecom sector. 

Takedowns

In March 2023, there were numerous takedowns, voluntary shutdowns, and arrests affecting ransomware, markets, account shops, card shops, and individual cybercriminals. Here are the high-profile takedowns.

Breach Forums

On March 21, 2023, mid-tier hacking forum Breach Forums was shut down following the arrest of its administrator, Conor Brian Fitzpatrick (aka “pompompurin”), six days prior.

Read the court doc here.

Worldwiredlabs

On March 3, a US Magistrate Judge issued a seizure warrant for Worldwiredlabs[.]com, a domain used by cybercriminals to sell malware, including remote access trojan (RAT) “NetWire,” which is capable of targeting and infecting major computer operating systems.

On March 7, an international law enforcement effort led to the seizure of Worldwiredlabs. The FBI had begun its investigation in 2020, and uncovered that it was the only known online distributor of NetWire.

Read the court doc here.

Get best-in-class intel

The following data is derived from the Flashpoint Intelligence Platform and VulnDB, the most comprehensive and timely source of vulnerability intelligence available. Sign up for a free trial today.

Request a demo today.

  •  

Flashpoint in 2023: A Note From Our CEO

Blogs

Blog

Flashpoint in 2023: A Note From Our CEO

How Flashpoint will improve, innovate, and inspire in 2023

SHARE THIS:
Default Author Image
January 12, 2023

Harnessing the OSINT revolution

To me, 2022 was the year of OSINT, a time when open-source intelligence (finally) got its time in the sun. This is due in large part to Russia’s full-scale invasion of Ukraine—a hybrid war nearing the one-year mark that’s being waged across cyber and physical battlefields. In fact, the war between Russia and Ukraine has become the poster child for how truly essential and impactful OSINT can be, especially during a modern military engagement.

To be clear, Ukrainians and organizations active in Ukraine face the most acute risks. But this war is also actively impacting even those who are not physically present in Ukraine, including commercial entities and world governments. For these organizations, gaining reliable, timely, and actionable intelligence is a constant test—one that Flashpoint is helping hundreds of clients tackle daily. 

OSINT has long been a mission-critical investigatory tool in the security and intelligence community, especially in the public sector, and 2022 proved that out. Malware, insider threats, data breaches, financial and cryptocurrency fraud, violent extremism, social engineering schemes, and ransomware continued to plague organizations of all sizes across the public and private sectors. 

Strengthened by our 2022 acquisitions of Risk Based Security and Echosec Systems, Flashpoint is now the commercial leader in open-source intelligence, which CIA Deputy Director for Digital Innovation Jennifer Ewbank calls “one of our richest sources of insight and our INT of first resort.” 

Today, more than 730 customers globally rely on our intelligence, expertise, and technology—leaning on Flashpoint to form a bulwark between their assets and risk. In 2023, Flashpoint will continue to invest in OSINT’s revolutionary effect in order to continue to deliver on our mission. Here’s how.

Roadmap 2023

In the last 12 months we’ve delivered new products, features, and functionalities to our clients that make our data and intelligence even more actionable. This includes: 

In 2023, Flashpoint will deliver products that make it even easier for security teams of all sizes and sophistication levels to leverage OSINT, as well as our complete suite of risk intelligence tools, to find and stop threats quickly. To accomplish this, our roadmap is focused, in part, on putting all the right OSINT into a single platform that empowers different security teams to take the right actions tailored to their mission to reduce risk. 

More than simply supporting a single team, Flashpoint is able to empower teams across organizations to reduce their overall holistic risk across both the cyber and physical domains. Security programs that take holistic perspectives of addressing risk will be best prepared to prevent and mitigate an expanding threat landscape. 

UX improvements

In the year ahead, we’ll be releasing a redesign of our entire user experience with more intuitive navigation, situational awareness to guide teams to the most important intelligence to discover threats quickly, and blazing fast search rebuilt from the ground up with proprietary data science models to deliver the most relevant results up front. 

Whether in the commercial sector on a Cyber Threat Intelligence (CTI), Vulnerability Management, or Physical Security team or in the public sector in Defense, Law Enforcement, or National Security, our upcoming experience is going to save teams and organizations time and cost in detecting and mitigating threats. 

Intelligence classes

Furthermore, in order to make our intelligence more accessible and easily discoverable by teams, Flashpoint will be releasing mission-based intelligence classes. The dizzying array of intelligence and data sources can make it difficult to find the most relevant intelligence. 

Today, teams need to know which data sources to search in combination with what is relevant for their specific security mission, ranging from vulnerabilities, financial fraud, threat actors, and many more. Flashpoint is changing that with clearly defined intelligence classes that are tied directly to mission to help find the relevant intelligence quickly and easily.

OSINT’s continued impact

In addition to our products and solutions supporting the private sector, we’re also very proud that our OSINT is supporting public sector missions as well. Whether Defense, Law Enforcement, or National Security, Flashpoint’s data and intelligence have been applied to save lives and reduce risk, reflecting the profoundly positive impact OSINT can make in our world. 

In addition, different security teams leverage the same OSINT data in different ways, based on their missions, and Flashpoint will help connect the dots for teams to collaborate in reducing risk benefiting the entire organization. OSINT’s impact crosses teams, industries, and the private and public sectors. As threat intelligence continues to evolve, OSINT has become a must-have in informing and assessing risk. 

Noted Ewbank, “When you think about the future of the intelligence business…you should first think about open source.” 

To a safe and successful year ahead

All of these upcoming improvements highlight that in 2023, Flashpoint’s risk intelligence platform will be the essential tool for security teams of all sizes and maturities who recognize that intelligence works best in a multi-team approach to reduce risk holistically. 

We are excited to roll out these improvements throughout the year to help our customers protect their employees, customers, assets, and stakeholders in the face of the threats we will undoubtedly face in 2023. While certainly there will be threats to face in the new year, I’m optimistic that as a security community, we will again rise to the challenge, and that 2023 will be a successful year for the good guys. 

In the end, this is the name of the game: leveraging intelligence to close gaps in an organization’s risk profile. This was, as ever, Flashpoint’s focus in 2022. And it will continue to be our focus in 2023. 

Thank you to our Flashpoint customers, partners, and team for a successful 2022—we are proud to partner with our customers to help them and the broader community reduce their risk. And, of course, I’d like to wish the entire community a very happy, healthy, and safe new year!

Request a demo today.

  •  

Why We Acquired Echosec Systems: The OSINT Revolution

Blogs

Blog

Why We Acquired Echosec Systems: The OSINT Revolution

Flashpoint CEO Josh Lefkowitz on the Echosec acquisition and the proven, foundational importance of open source intelligence

SHARE THIS:
Default Author Image
August 4, 2022

It’s our mission as intelligence providers to some of the world’s most discerning clients to help them stay ahead of the threats that could impede their focus on protecting their people, places, and assets everywhere. 

Today thus marks a key moment in our evolution as a company. I’m delighted about our acquisition of Echosec Systems, whose team and technology are world class and whose intelligence will help us continue to help companies reduce risk holistically across teams. 

Here’s why I’m so excited to be able to bring Echosec’s open-source, social media, and geospatial intelligence to a wider audience, and where we go from here.

The Importance of OSINT

I began my career in the wake of 9/11 analyzing the activities of terrorist groups to support numerous national security investigations and prosecutions. My experiences in this domain spurred the recognition that open source intelligence (OSINT) could be an invaluable counterterrorism tool. When we realized that OSINT in the modern era couldn’t be done without automating data collection and analytics at scale, Flashpoint was born.

The online spaces where threat actors congregate and operate have evolved dramatically since the early 2000s and now include illicit communities, criminal marketplaces, paste sites, and foreign-language forums across the deep and dark web. Furthermore, there’s much intelligence to be gleaned from publicly available information (PAI) and OSINT derived from social media, including geospatial data, social sentiment, and other real-time information that can support mission requirements for national security, public safety, and commercial security teams.

Today, OSINT is a proven and foundational element to the intelligence community. 

As Jennifer Ewbank, Deputy Director for Digital Innovation at the CIA, said recently: “Many questions that once had to be answered by more secretive intelligence collection are now answered with a few clicks on a mobile device.” 

She added, “OSINT is the INT of first resort, informing every aspect of the intelligence community’s mission. When you think about the future of the intelligence business…you should first think about open source.”

And the most dynamic and impactful intelligence partners, like Flashpoint, are helping organizations leverage technology to harness OSINT at scale, organize it, classify it, make sense of it, and understand when action is warranted.

Why Echosec

This is where Echosec is a leader in giving users the ability to leverage real-time OSINT to drive on-the-ground insights and action. Complemented by Flashpoint’s own OSINT and unique collections, this key acquisition continues our evolution as the leading provider of actionable intelligence, supporting cyber and physical security missions around the world.

Data, Platform, and Compliance

Echosec has built an extraordinarily intuitive and highly user-friendly platform that is helping some of the most demanding and discerning customers address a broad array of threats globally. 

Echosec maintains broad coverage across critical social media platforms worldwide. Their OSINT provides security teams across the public and private sector localized situational awareness in faraway places, helping them better assess geopolitical risk, keep executives from harm, protect populations and places, and respond to crises in an informed and efficient manner.

In addition to best-in-class social media collections, Echosec has maintained a focus on ensuring compliance with all social media platforms. The company’s respect for privacy and security of data subjects was a key factor in our decision to acquire them and falls in line with our own policies. Both Flashpoint and Echosec share an ethos around the importance of ethical and compliant data access to be a trusted intelligence partner. 

Mission and Team

Additionally, the Echosec and Flashpoint missions are very well aligned—notably overlapping around the theme of protection. Our mission alignment is incredibly important as we move forward with the merged companies, as it will ensure continuity and clarity to both organizations’ current and future clients.

Our mission will continue to drive the choices we make as a company so that we can continue to help organizations protect what they value and cherish most, and to do our part to make the world a safer place.

Echosec’s team is a mighty one, and what they’ve built is incredible. I am so excited to bring on a team as talented as they are and whose culture- and mission-driven  values align so well with ours. 

The Future is Now

Buoyed by Echosec’s data, platform, and approach to compliance, coupled with our mutual and value/team alignment, Flashpoint is geared up for huge successes in the coming months and years.

Following on the heels of our Risk Based Security acquisition in January, the integration of Echosec further enables Flashpoint to empower CTI, vulnerability management, and corporate security teams to work together to detect, prioritize, and mitigate the threats across their organization to reduce overall risk more comprehensively. 

In the weeks to come, as we integrate Echosec’s data and technology into the Flashpoint Suite, we can’t wait to share with our customer and peers our extended capabilities, delivering the world’s most robust combination of data, analytics, and automation across a wide range of security use cases.

Frequently Asked Questions (FAQs)

Why did Flashpoint acquire Echosec and how does it improve the platform?

Flashpoint acquired Echosec to integrate world-class OSINT and social media intelligence into its existing threat data ecosystem. This improves the platform by providing a unified view of both cyber and physical risks. Flashpoint users can now monitor dark web forums and real-time social media activity in a single workspace, allowing them to detect threats against their personnel and facilities that traditional cyber intelligence might miss.

Flashpoint FeatureAcquisition Benefit
Location-Based SearchAllows users to monitor security events at specific GPS coordinates.
Broad OSINT AccessConnects dark web chatter with surface web social media trends.
Unified DashboardStreamlines investigations by housing CTI and PSI in one interface.

How does the addition of Echosec technology enhance executive protection?

The addition of Echosec technology enhances executive protection by allowing security teams to monitor for doxing, threats, and travel risks on social media. Flashpoint can now identify when a leader’s travel plans are being discussed in illicit forums and then use Echosec’s geofencing to monitor the safety of the specific hotel or event venue they are visiting. This provides a digital-to-physical protective shield for high-profile personnel.

  • Real-Time Monitoring: Alerts teams to social media posts targeting specific executives.
  • Geofencing: Tracks activity around an executive’s current location or destination.
  • Sentiment Analysis: Identifies rising hostility or planned protests before they reach a leader’s location.

Why is Flashpoint’s “360-degree view of risk” vital for modern enterprises?

Flashpoint’s 360-degree view of risk is vital because modern threats are no longer strictly digital or physical. A threat actor might use social media to coordinate a physical breach of a data center or recruit an insider for a cyberattack. By combining Echosec’s social data with Flashpoint’s deep web collections, enterprises can identify these cross-functional threats in their early stages and mitigate them before they impact the business.

Threat TypeFlashpoint Integrated Response
Physical SecurityUses geofencing to detect on-the-ground threats to corporate offices.
Brand ProtectionTracks both dark web counterfeit sales and social media brand abuse.
Supply ChainMonitors logistics hubs for both cyber vulnerabilities and physical disruptions.

Request a demo today.

  •  
❌