Deep Code

contact@decodecybercrime.com

Blog

Cybersecurity insights, resources & best practices.

image

Astrill VPN: Where Online Privacy Crosses the Line into Cybercrime

While online privacy is a fundamental right, legitimate service providers…
image

Investigating VVS $tealer: A Python-Based Discord Malware

A new Discord-targeting stealer called VVS $tealer has recently emerged…
image

From Mauritius to the Deep Web: The AnonRDP.com Exposé

In the ever-evolving realm of cybercrime, one bulletproof service provider…
image

Coinomize: The Bitcoin Mixer with Hidden Ties

The cryptocurrency mixer Coinomize.biz has been active since 2019, operating…
image

The eXch.cx Enigma: Uncovering Its Role in High-Risk Financial Activity

eXch.cx, originally launched in 2014 under the domain eXch.cc, has…
image

Investigating Brazilian Discord Stealers and Their Developers

Introduction A new Brazilian infostealer, Now Stealer has emerged in January…
image

Proton66 OOO (AS198953) – The Leading Bulletproof Hosting Provider in 2024

Cybersecurity researchers and threat intelligence platforms have identified Proton66 OOO…
image

Hack Locally, Sell Globally: Inside Brazil’s Cybercrime Underworld

Brazil’s cybercrime ecosystem is thriving, with hackers and fraudsters targeting…

Newsletter