Criminal hacker known as ALTDOS, DESORDEN, GHOSTR and 0mid16B arrested
by DissentDoe - Thursday February 27, 2025 at 12:49 PM
#1
Quote:He called himself ALTDOS when he first contacted DataBreaches in 2020. In 2021 he started contacting this site as DESORDEN. Then in 2024, he contacted this site as GHOSTR, and more recently, as 0mid16B.  Under each new moniker, he denied being the individual DataBreaches knew under previous monikers, even though based on his targets, his approach to proof of claims, and his extortion approaches, it seemed pretty obvious it was the same threat actor.
Now he has been caught.

And the 39-year old man has reportedly confessed. 

Read more at https://databreaches.net/2025/02/27/crim...-arrested/
Data Breach Goddess and Coffee Addict at DataBreaches.net
 Email: info@databreaches.net or breaches@protonmail.ch
Signal: +1 516-776-7756
Reply
#2
rip DESORDEN free the old man
Reply
#3
RIP in Thailand jail
Reply
#4
(02-27-2025, 12:49 PM)DissentDoe Wrote:
Quote:He called himself ALTDOS when he first contacted DataBreaches in 2020. In 2021 he started contacting this site as DESORDEN. Then in 2024, he contacted this site as GHOSTR, and more recently, as 0mid16B.  Under each new moniker, he denied being the individual DataBreaches knew under previous monikers, even though based on his targets, his approach to proof of claims, and his extortion approaches, it seemed pretty obvious it was the same threat actor.
Now he has been caught.

And the 39-year old man has reportedly confessed. 

Read more at https://databreaches.net/2025/02/27/crim...-arrested/

You shouldn't write it like its 100% sure he is the one. You can say you know it with 99% certainty but you literally write it like it has already been confirmed ("He called himself ALTDOS when he first contacted DataBreaches in 2020. In 2021 he started contacting this site as DESORDEN. Then in 2024, he contacted this site as GHOSTR, and more recently, as 0mid16B. ") In typical security researcher fashion, giving yourself extra credit by putting 100% attribution of seperate monikers to the same threat actor. You even admit it "seemed pretty obvious" (which is not a confirmed attribution) but still wrote it down like you were absolutely certain.
Reply
#5
(02-27-2025, 03:42 PM)endless Wrote:
(02-27-2025, 12:49 PM)DissentDoe Wrote:
Quote:He called himself ALTDOS when he first contacted DataBreaches in 2020. In 2021 he started contacting this site as DESORDEN. Then in 2024, he contacted this site as GHOSTR, and more recently, as 0mid16B.  Under each new moniker, he denied being the individual DataBreaches knew under previous monikers, even though based on his targets, his approach to proof of claims, and his extortion approaches, it seemed pretty obvious it was the same threat actor.
Now he has been caught.

And the 39-year old man has reportedly confessed. 

Read more at https://databreaches.net/2025/02/27/crim...-arrested/

You shouldn't write it like its 100% sure he is the one. You can say you know it with 99% certainty but you literally write it like it has already been confirmed ("He called himself ALTDOS when he first contacted DataBreaches in 2020. In 2021 he started contacting this site as DESORDEN. Then in 2024, he contacted this site as GHOSTR, and more recently, as 0mid16B. ") In typical security researcher fashion, giving yourself extra credit by putting 100% attribution of seperate monikers to the same threat actor. You even admit it "seemed pretty obvious" (which is not a confirmed attribution) but still wrote it down like you were absolutely certain.

It already HAS been confirmed, and yes, I really had recognized him when he contacted me as DESORDEN after all our interactions when he posed as ALTDOS. I even mentioned the connection in some of my posts, and his denial that he was the same entity when he started posting as 0mid16B. I was obligated to report he denied it, but it should have been clear from my public hint that I had connected the different monikers: " 0miid16B, who tells DataBreaches that they* have never worked with DESORDEN or ALTDOS, wrote:"    Smile 

The only thing that surprised me about his arrest is his age.
Data Breach Goddess and Coffee Addict at DataBreaches.net
 Email: info@databreaches.net or breaches@protonmail.ch
Signal: +1 516-776-7756
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Hacker extradited to US for stealing $3.3 million from taxpayers lulagain 0 48 10 hours ago
Last Post: lulagain
  LOCK4J (NATOHUB) ARRESTED BY THE SPANISH NATIONAL POLICE AND THE CIVIL GUARD lock4j 7 847 11 hours ago
Last Post: admin123
  epsilon hacker "Chat Noir" arrested for FREE SAS breach Angel_Batista 17 1,973 04-15-2025, 01:34 AM
Last Post: Mamadou123
  Cybersecurity firm buying hacker forum accounts to spy on cybercriminals lulagain 1 227 04-14-2025, 08:50 PM
Last Post: Sythe
  Oracle say no cloud breach, but hacker steal data from old servers – people not buy i baraka75 1 356 04-13-2025, 12:55 PM
Last Post: music

Forum Jump:


 Users browsing this thread: 1 Guest(s)