- Gangexpos
- Among them are severe and teacher
- Stern’s identity was confirmed by the German police
There has been a mysterious filtering revealing the identities of some of the most wanted cybercriminals in the world, including intellectual authors behind Conti and Trickbot Ransomware, infamous groups responsible for some of the greatest extortion in modern history.
Recently, The registration He spoke with an anonymous individual who passes through the Gangoxposados alias, who said they are in a personal mission to “fight an organized society of known criminals worldwide.”
“I am pleased to think that I can free society from at least some of them,” Gangexposed said. “I simply enjoy solving the most complex cases.”
Doxxing Stern
One of the people that Doxxed is severe, the leader of Trickbot and Conti Ransomware Operations. They claim that Stern is actually a Vitaly Nikolaevich Kovalev, a 36 -year -old Russian citizen. His identity was then confirmed by the German police.
“It is suspected that the subject has been the founder of the ‘Trickbot’ group, also known as ‘Spider Wizard’,” said the Federal Criminal Police Office of Germany. “The group used Trickbot malware, as well as other malware variants such as Bazaader, Systembc, Icedid, Ryuk, Conti and Diavol.”
Shortly after, GREGEXPUSED DOXXED another key figure, also known as a teacher. Behind this aka, they claim, there is a 39 -year -old Russian named Vladimir Viktorovich Kvitko. Kvitko supposedly lives in Dubai.
In addition to appointing key figures, filtered chat records, videos and rescue negotiations.
The filter affirms not to be a “type of IT” and that the methodology is based on observing patterns that others have been lost:
“My tools set includes classical intelligence analysis, logic, objective research, OSint methodology, stylometry (I am linguist and philologist), human psychology and the ability to rebuild puzzles that others do not even notice,” they said the publication.
“I am cosmopolitan with many houses, but without a permanent basis: I move between the countries as necessary. My privacy standards are often more strict than those of most of the subjects of my investigations.”
To discover the identities of the infamous cybercounts, they used data obtained through “semi -raised databases, Darknet services (to probe state records through corrupt officials), I already often buy information. I have access to the FSB filtered border control database,” they added, claiming to have bought them from the Darkweb for $ 250,000.
An interesting detail is that they could have claimed at least $ 10 million in FBI rewards, but apparently they have decided against them, leading some means to speculate that they are a former discontent member who only seeks revenge, while others believe that grabbing generosity could also incriminate.