Can we post about how people were caught?
by memleak - Thursday December 26, 2024 at 01:12 PM
#1
I understand doxing people is not allowed which is a great rule.
I'm wondering if we can talk about how certain people were caught, so that the community can learn from these experiences.
The name's aren't relevant, but the way they were discovered, I think would be useful for the community. Would love to hear the opinion on a mod.
Reply
#2
I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#3
(12-27-2024, 11:42 AM)DredgenSun Wrote: I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...

Yes exactly, all information is public/online and people have spoken about it.
Reply
#4
(12-27-2024, 12:51 PM)memleak Wrote:
(12-27-2024, 11:42 AM)DredgenSun Wrote: I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...

Yes exactly, all information is public/online and people have spoken about it.

I'd like to know on the intricarices of how hackers etc get caught, I'd imagine 9/10 times, it's poor OPSEC
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#5
(12-27-2024, 01:26 PM)DredgenSun Wrote:
(12-27-2024, 12:51 PM)memleak Wrote:
(12-27-2024, 11:42 AM)DredgenSun Wrote: I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...

Yes exactly, all information is public/online and people have spoken about it.

I'd like to know on the intricarices of how hackers etc get caught, I'd imagine 9/10 times, it's poor OPSEC

That is the usual case. It's one of those things where, looking back, you can almost always say it's bad OPSEC because they got caught. What many people don't understand is how to threat model correctly (or complete lack there of), which gets them caught up. They start growing, and never re-invest in adding addition security measures and such. And when they start something, they don't properly set up their operations.

There are a massive amount of lessons in how hackers are caught. LE will try to catch hackers in simple ways, but if they are unable to, depending on how notorious the hacker or group are, they will use other methods to catch them, such as working in collaboration with VPN providers, Tor de-anonymization techniques, and other complicated ways. The biggest difficult for LE is not determining who the hackers are, but proving it court and burning their way of catching the next hacker. Each court document will list what LE did to apprehend the person, and how they figured out who they were. In the case of Lulzsec and older hacker groups, LE worked with HideMyAssVPN who gave over connection logs. For vigilant hackers who then read the court documents, they know now to not use HideMyAss.

Prior to LE releasing this information, they have to make a conscious decision that if they release to the court that they used this particular method to catch this hacker, it could mean all the other hackers could adjust and become more difficult to be caught. Whether switching VPN providers, or going dark completely and recreating a new identity.

So one of my hobbies I have, is when someone gets arrested, read about how they were caught. Usually it's something silly, but sometimes, it's some new technique where people should change or adjust their strategy.
Reply
#6
(12-27-2024, 03:19 PM)memleak Wrote:
(12-27-2024, 01:26 PM)DredgenSun Wrote:
(12-27-2024, 12:51 PM)memleak Wrote:
(12-27-2024, 11:42 AM)DredgenSun Wrote: I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...

Yes exactly, all information is public/online and people have spoken about it.

I'd like to know on the intricarices of how hackers etc get caught, I'd imagine 9/10 times, it's poor OPSEC

That is the usual case. It's one of those things where, looking back, you can almost always say it's bad OPSEC because they got caught. What many people don't understand is how to threat model correctly (or complete lack there of), which gets them caught up. They start growing, and never re-invest in adding addition security measures and such. And when they start something, they don't properly set up their operations.

There are a massive amount of lessons in how hackers are caught. LE will try to catch hackers in simple ways, but if they are unable to, depending on how notorious the hacker or group are, they will use other methods to catch them, such as working in collaboration with VPN providers, Tor de-anonymization techniques, and other complicated ways. The biggest difficult for LE is not determining who the hackers are, but proving it court and burning their way of catching the next hacker. Each court document will list what LE did to apprehend the person, and how they figured out who they were. In the case of Lulzsec and older hacker groups, LE worked with HideMyAssVPN who gave over connection logs. For vigilant hackers who then read the court documents, they know now to not use HideMyAss.

Prior to LE releasing this information, they have to make a conscious decision that if they release to the court that they used this particular method to catch this hacker, it could mean all the other hackers could adjust and become more difficult to be caught. Whether switching VPN providers, or going dark completely and recreating a new identity.

So one of my hobbies I have, is when someone gets arrested, read about how they were caught. Usually it's something silly, but sometimes, it's some new technique where people should change or adjust their strategy.

So your MO is pretty much 'Witness, Adapt, survive'

I mean, yeah... There's ALWAYS a lesson in failure,
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#7
(12-27-2024, 01:26 PM)DredgenSun Wrote:
(12-27-2024, 12:51 PM)memleak Wrote:
(12-27-2024, 11:42 AM)DredgenSun Wrote: I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...

Yes exactly, all information is public/online and people have spoken about it.

I'd like to know on the intricarices of how hackers etc get caught, I'd imagine 9/10 times, it's poor OPSEC

Agree, poor OPSEC.
Reply
#8
(12-27-2024, 04:11 PM)phillybilly Wrote:
(12-27-2024, 01:26 PM)DredgenSun Wrote:
(12-27-2024, 12:51 PM)memleak Wrote:
(12-27-2024, 11:42 AM)DredgenSun Wrote: I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...

Yes exactly, all information is public/online and people have spoken about it.

I'd like to know on the intricarices of how hackers etc get caught, I'd imagine 9/10 times, it's poor OPSEC

Agree, poor OPSEC.

Lessons learned; Better OPSEC
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#9
(12-27-2024, 03:57 PM)DredgenSun Wrote:
(12-27-2024, 03:19 PM)memleak Wrote:
(12-27-2024, 01:26 PM)DredgenSun Wrote:
(12-27-2024, 12:51 PM)memleak Wrote:
(12-27-2024, 11:42 AM)DredgenSun Wrote: I guess this kinda info is okay, you'll mostly find it in articles I'd imagine...

Yes exactly, all information is public/online and people have spoken about it.

I'd like to know on the intricarices of how hackers etc get caught, I'd imagine 9/10 times, it's poor OPSEC

That is the usual case. It's one of those things where, looking back, you can almost always say it's bad OPSEC because they got caught. What many people don't understand is how to threat model correctly (or complete lack there of), which gets them caught up. They start growing, and never re-invest in adding addition security measures and such. And when they start something, they don't properly set up their operations.

There are a massive amount of lessons in how hackers are caught. LE will try to catch hackers in simple ways, but if they are unable to, depending on how notorious the hacker or group are, they will use other methods to catch them, such as working in collaboration with VPN providers, Tor de-anonymization techniques, and other complicated ways. The biggest difficult for LE is not determining who the hackers are, but proving it court and burning their way of catching the next hacker. Each court document will list what LE did to apprehend the person, and how they figured out who they were. In the case of Lulzsec and older hacker groups, LE worked with HideMyAssVPN who gave over connection logs. For vigilant hackers who then read the court documents, they know now to not use HideMyAss.

Prior to LE releasing this information, they have to make a conscious decision that if they release to the court that they used this particular method to catch this hacker, it could mean all the other hackers could adjust and become more difficult to be caught. Whether switching VPN providers, or going dark completely and recreating a new identity.

So one of my hobbies I have, is when someone gets arrested, read about how they were caught. Usually it's something silly, but sometimes, it's some new technique where people should change or adjust their strategy.

So your MO is pretty much 'Witness, Adapt, survive'

I mean, yeah... There's ALWAYS a lesson in failure,

I think if you're doing something where people are looking for you, and you aren't adapting, the only question is, how soon will you get caught.
Reply
#10
(12-29-2024, 12:22 PM)memleak Wrote:
(12-27-2024, 03:57 PM)DredgenSun Wrote:
(12-27-2024, 03:19 PM)memleak Wrote:
(12-27-2024, 01:26 PM)DredgenSun Wrote:
(12-27-2024, 12:51 PM)memleak Wrote: Yes exactly, all information is public/online and people have spoken about it.

I'd like to know on the intricarices of how hackers etc get caught, I'd imagine 9/10 times, it's poor OPSEC

That is the usual case. It's one of those things where, looking back, you can almost always say it's bad OPSEC because they got caught. What many people don't understand is how to threat model correctly (or complete lack there of), which gets them caught up. They start growing, and never re-invest in adding addition security measures and such. And when they start something, they don't properly set up their operations.

There are a massive amount of lessons in how hackers are caught. LE will try to catch hackers in simple ways, but if they are unable to, depending on how notorious the hacker or group are, they will use other methods to catch them, such as working in collaboration with VPN providers, Tor de-anonymization techniques, and other complicated ways. The biggest difficult for LE is not determining who the hackers are, but proving it court and burning their way of catching the next hacker. Each court document will list what LE did to apprehend the person, and how they figured out who they were. In the case of Lulzsec and older hacker groups, LE worked with HideMyAssVPN who gave over connection logs. For vigilant hackers who then read the court documents, they know now to not use HideMyAss.

Prior to LE releasing this information, they have to make a conscious decision that if they release to the court that they used this particular method to catch this hacker, it could mean all the other hackers could adjust and become more difficult to be caught. Whether switching VPN providers, or going dark completely and recreating a new identity.

So one of my hobbies I have, is when someone gets arrested, read about how they were caught. Usually it's something silly, but sometimes, it's some new technique where people should change or adjust their strategy.

So your MO is pretty much 'Witness, Adapt, survive'

I mean, yeah... There's ALWAYS a lesson in failure,

I think if you're doing something where people are looking for you, and you aren't adapting, the only question is, how soon will you get caught.

Plus people will always be of the mind 'It will never happen to me'
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  How Do People Unlock iCloud-Locked iPhones? vkei 21 718 04-15-2025, 04:43 AM
Last Post: vkei
  Are there more bad people or more kind people in the world abd0804 38 3,823 04-13-2025, 04:05 AM
Last Post: nastya_anna
  I want to meet serious people to actually make MONEY breach44832202 13 492 04-06-2025, 06:34 AM
Last Post: Phuckchop
  need help for post a database request CountySorter 4 212 03-31-2025, 12:05 PM
Last Post: termit
  How do you deal with people who discourage you? breachforumst 13 692 03-28-2025, 06:36 AM
Last Post: BSEA

Forum Jump:


 Users browsing this thread: