You can follow the full story medium.com/adhd-attack-...
18.01.2026 23:14 β π 0 π 0 π¬ 0 π 0@cyb3rhawk.bsky.social
Cyb3rhawk leads threat hunting team. Interested in DE&TH, threat intel and DFIR. Always striving to make the daily grind of SOC analysts a breeze. Always eager to learn from others and lookout for new ways to streamline what I learn
You can follow the full story medium.com/adhd-attack-...
18.01.2026 23:14 β π 0 π 0 π¬ 0 π 0Scale indicators:
$350,000 through one wallet (20 days)
891 domains across 48 countries
Multi-language support infrastructure
The attack surface expands as #Web3 adoption increases.
The technical attack is simple.
The #social #engineering makes it work.
Matrimonial platform targeting. Patient relationship building. Native language adaptation.
Standard: #Firebase hosting, CDN distribution, transit wallets, DEX swaps
Custom: #Flutter backend, dynamic #wallet rotation, multi-language support, identity harvesting
More infrastructure than commodity campaigns. Established operation with development resources.
Broader context: analyzed 1,855 #crypto #phishing URLs (Jan 2024 - Dec 2025).
658 unique IPs 891 unique domains 48 countries
Top platforms: Firebase (web.app), Netlify, Vercel Elena case uses: Firebase + Fastly CDN + AWS backend
Wallet timeline:
Most wallets activated: November 2025
Recent activity: Last 7 days
Initial transactions: 19 days ago
One outgoing wallet previously received funds from a wallet flagged as phishing.
Elena''s operation = one campaign among many.
Some Externally Owned Account (EOA) wallets have
a single inbound from the primary wallet. Single outbound to: HitBTC Hot Wallet 4.
HitBTC = known for lax KYC enforcement.
Primary wallet analysis:
In: 119.844 #ETH ($350k+) Out: 119.837 ETH ($350k+) Balance: 0.0064 ETH ($19.36)
High-throughput #transit node. Funds move immediately.
Uses TransitSwap v5 Router (DEX aggregator) to convert ETH β stablecoins (USDT/USDC).
URLscan.io shows t4smydata[.]com hosted a #Malay-language investment site ("Invest J") one year ago.
Same infrastructure. Different language. Different campaign.
This domain gets recycled: Malay β English/Chinese/Japanese/Korean.
Identity verification endpoints and banking info collection detected.
Possible future uses:
Identity fraud
Fake verification to build trust
Data resale on #dark #web markets
Full KYC harvesting capability.
Full infra observed:
Wallets: loadWalletUSDT/BTC/ETH.php Accounts: loginUser.php, registerUser.php, updatePassword.php Financial: createBuyCoin.php, createRecords.php, createWithdrawRecords.php
Identity: updateUserFrontIc.php, updateUserBackIc.php Banking: updateUserBank.php
Three #PHP scripts fetch wallet addresses on demand:
loadWalletUSDT.php
loadWalletBTC.php
loadWalletETH.php
Real-time wallet rotation. Different victims see different addresses.
Console logs in Chinese: "ε¨ App ε
ε΅ζ΅θ§ε¨δΈ"
The Flutter web app loads from t4smydata[.]com (3.0.56.137 - AWS Singapore).
Compiled Dart to #JavaScript. Uses CanvasKit/Skia rendering.
No hardcoded wallet addresses.
Instead: dynamic retrieval via PHP endpoints.
The Firebase page has JavaScript to vet traffic.
Checks user agent for in-app browsers (iOS WebView, Android WebView).
In-app browser? Load the malicious Flutter app. Standard browser? Redirect to legitimate coinbase.com.
#CryptoScam #Firebase #Web3Security
"Elena" sends a link: www[.]bt-trade[.]it[.]com
Basic HTML page. Auto-redirects to Firebase hosting via authCheck() function.
First redirect lands at: bitplus-official[.]web[.]app
Both domains hosted on 199.36.158.100 (Google LLC).
#Infosec #CyberCrime #ThreatHunting #ScamAlert
Tracked a pig butchering operation from the #Indian #Matrimony search app to a wallet drainer.
One wallet. 20 days. $350,000+ in ETH.
Here's the technical breakdown:
#ThreatIntel #CryptoFraud #PigButchering #OSINT #BlockchainAnalysis #DetectionEngineering #CyberThreatIntelligence
Part 1 is live now. The Technical dive drops soon.
medium.com/@cyb3r-hawk/...
We often think victims are "clueless," but these try to exploit our most basic needs for "connection." It opens doors that otherwise would be kept closed.
06.01.2026 18:10 β π 0 π 0 π¬ 1 π 0The shift to crypto wasn't a "pitch." It was a casual mention of her portfolio during a talk about the future. By the time the link arrived, I wasn't talking to a "scammer" but someone who had been helpful, patient, and consistent.
#Infosec #Web3Security #SocialEngineering
I found her "personal" photos active on 5 sites targeting different diaspora groups with the same face.
#OSINT #SouthAsia #Diaspora
The persona, "Elena," followed the common practice of family-facilitated introductions. She spoke the native language, did a voice call, and understood the high baseline of trust in these spaces. No pressure, no red flags. Just days of "getting to know" each other.
06.01.2026 18:10 β π 0 π 0 π¬ 1 π 0I tracked a "Pig Butchering" scammer across several South Asian matrimonial platforms. This wasn't a bot or a crude script. It was a patient, human-led operation that used cultural trust as a weapon
#CyberSecurity #CryptoScam #PigButchering #SocialEngineering #India #Matrimony
As recent SharePoint exploits settled a bit, I wanted to analyze payload variants to understand why attackers made specific choices. ASPX for quick access, DLLs for persistence, and IIS modules for blending in.
21.08.2025 02:19 β π 0 π 0 π¬ 0 π 0The goal of the blog (Soul instead of Shell) is to understand constraints that force payload decisions and how they can help us detect/hunt.
Β Every payload has a soul - and understanding it makes us better hunters.
medium.com/@cyb3r-hawk/...
(urlscan: page.url:http://bitbucket.org task.url:http://blogspot.com)
Hunt:
Who runs netsh + context?
How often Set-MpPreference is used?
Who creates exclusions, and when?
Key TTPs:
AMSI bypass (reflection, AMSIReaper, NukeAMSI)
COM hijacking for persistence
Defender exclusions (paths/exts/procs)
UAC bypass (EnableLUA)
Firewall off (netsh)
Set-MpPreference abuse
C2: Blogspot β bitbucket redirects
Recent #Xworm infections (esp. during tax season) follow a pattern:
mshta.exe β Scheduled Tasks β IEX execution.
#ThreatHunting #DetectionEngineering #MalwareAnalysis #DefenseEvasion
Credential sellers: DaisyCloud (also sells RedLine stealer logs), moderdolboeb, m3g4
Distribution Locations:https://t[.]me/+seHLUhOHbVhMDM0, breachforums, cracking[.]org,hard-tm[.]su, nohide[.]space, darknetarmy[.]com, niflheim[.]world,nulledbb[.]com, niflheim[.]world.
We will end with the Hunting Hypothesis using A.P.E.X (lnkd.in/gJ9BmStA) and Adversary infrastructure queries to discover Lumma panels, C2s, etc.
Telegram distribution via t[.]me/hitbase, t[.]me/sharmamod disguised as IPTV or Netflix access.