Sample Gmail accounts known to have been involved in the campaign include:
jagdish.meshraam@gmail.com
drsnehapatil64@gmail.com
sinhamuskaan04@gmail.com
jennifergonzales789@gmail.com
payalshastri79@gmail.com
Sample malicious domains known to have been involved in the campaign:
researchplanet.zapto.org
socialstatistics.zapto.org
duniaenewsportal.ddns.net
Sample domain registrant email address accounts known to have been involved in the campaign include:
harpreet.singh1984@yahoo.com
marlenecharlton@outlook.com
abadaba@eml.cc
REUBEN123@RISEUP.NET
Related malicious domains known to have been involved in the campaign include:
hxxp://greenpeacesite.com
hxxp://new-agency.us
hxxp://chivalkarstone.com
hxxp://newmms.ru
hxxp://gayakwaad.com
hxxp://bbcworld-news.net
hxxp://newsinbbc.com
Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Saturday, September 21, 2024
Exposing an Indian Police Spyware Cyber Operation
This analysis is based on this Wired.com story.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment