Deep Code

The Life of a Cybercriminal: IntelBroker

The Life of a Cybercriminal: IntelBroker

Cybercrime is a growing global concern, with financial losses from cyberattacks projected to reach $10.5 trillion annually by 2025. From ransomware attacks that cripple entire organizations to data breaches exposing millions of personal records, cybercriminals are exploiting digital vulnerabilities at an alarming rate.

To carry out these crimes, many cybercriminals rely on tools designed to enhance privacy, such as no-logs VPNs (e.g., Mullvad), secure email services (e.g., ProtonMail or Cock.li), compromised credentials, cryptocurrencies, and even fake documentation. Yet, these individuals often maintain a public persona, flaunting their ideology, reputation, and skills to augment their standing in the underground world.

This blog sheds light on IntelBroker, a notable cyber threat actor, through an Open-Source Intelligence (OSINT) investigation. Here’s what we discovered.

Who is IntelBroker?

IntelBroker has been increasingly active as a cybercriminal since 2022, notorious for targeting major corporations, government entities, and critical infrastructure. Known for exploiting vulnerabilities to steal sensitive data, IntelBroker’s activities are primarily financially motivated, with stolen information often sold on dark web and deep web forums, such as BreachForums.

Key Breaches

IntelBroker has been linked to significant breaches, including:

  • General Electric
  • Los Angeles International Airport
  • U.S. federal agencies
  • Europol

The hacker has also claimed responsibility for exposing sensitive military files, classified documents, and millions of customer records. These breaches have far-reaching consequences, compromising national security, jeopardizing the safety of individuals, and causing significant financial losses for affected organizations. For example, the exposure of military files could reveal strategic vulnerabilities, while leaked customer records often lead to identity theft and fraud.

Although previously involved in ransomware development, IntelBroker’s focus has shifted to data exfiltration and extortion, a strategy that continues to disrupt industries and erode public trust in digital security.

The OSINT Process

To uncover IntelBroker’s identity and operations, we employed a systematic OSINT approach, tailoring our techniques to the complexities of this investigation. While the following methods are foundational to OSINT investigations, we adapted them to account for IntelBroker’s complex operational security (OPSEC), and the platforms they operated:

  1. Username Enumeration and Verification
    Investigating usernames across platforms to establish relevancy, identify patterns, and detect any reused aliases. This step required cross-referencing multiple datasets to ensure accuracy.
  2. Email Registration Analysis
    Tracing registration records for patterns and connections, particularly on forums and platforms frequented by cybercriminals. This often involved overcoming anonymization techniques like disposable email addresses.
  3. Breach Data Investigation
    Pivoting on leaked data points, including IP addresses, emails, and other identifiers found in breach records. This required filtering to isolate actionable intelligence amid large datasets.
  4. Data Mapping with Maltego
    Creating visual relationships between data points to uncover hidden connections. This step highlighted the network IntelBroker relied on, revealing links to other actors and possible aliases.
  5. Evidence-Based Interpretation
    Drawing conclusions from verified data points while addressing challenges like false flags, deliberate misinformation, and overlapping data that could obscure the trail.

This investigation was anything but straightforward. IntelBroker’s use of privacy-enhancing tools and tactics required us to continually adapt our methods, often combining traditional OSINT techniques with bespoke strategies to bypass these barriers. Challenges like incomplete data or misleading breadcrumbs placed by the actor themselves demanded a high degree of critical thinking and corroboration to ensure the integrity of our findings.

IntelBroker’s Digital Footprint

Our investigation uncovered multiple online accounts linked to IntelBroker, revealing extensive activity across platforms:

Platform Username / ID Notable Details
Telegram 1 IntelBroker (ID: 5884414105) Member of @taiwaneseincambodia (offering goods). Registered March 2023
Telegram 2 IntelBrokerBF (ID: 7240373026) Registered December 2023
X.com IntelBrokerBF / ID: 1831749074250256384 XMPP: IntelBrokerBF@thesecure.biz
GitHub IntelBroker (ID: 117920679) Registration Date: 2022-11-10T13:53:17Z
Developer of “Endurance-Wiper” malware
Email: IntelBroker@breached.vc
Reddit Intelbroker (ID: 2qx84am3) Selling intelligence for Bitcoin
Email: spectre01@protonmail.com
Registered December 2018
Instagram Intelbroker (ID: 34232423622) Posts include cash, debit/credit cards, drugs, and travel photos
Followers: 10,815
Following: 7,500
Twitch.tv Intelbroker / ID: 1079976850
PayPal 1 IntelBroker (ID: 677WTNNY4K8YS) Name: Aidan Gonzalez
PayPal 2 IntelBrokerBF (ID: W2YXG34XKX556) Name: Darek Dokuzalski
HackerOne intelbroker Displays the name “Brandon B.”
Joined July 2024
Keybase Intelbroker Bitcoin address: bc1q6uzzurelqx348t6cr775yv9v4x43m88x7djqkf
Devices include TempeOS and Qubes Laptop
PGP Key associated with the email address: miggerkiller44@cock.li
ifunny.co intelbroker 58 subscribers
29 subscriptions

Our investigation identified multiple email addresses connected to IntelBroker.

E-Mail Address Username Notable Details
17intelbroker@proton.me IntelBroker Registration on BreachForums.to
Title: “Floppa Enthusiast”
YouTube account: youtube.com/@Tedwardd
Registered on Dropbox:
dbid:AAAGgAQj0tBX5gHYHZWoBOwHdrTAHVPv0nA
dollaria@proton.me IntelBroker IP address associated ExpressVPN
19intelbroker@proton.me IntelBroker IP address associated ExpressVPN
spectre01@protonmail.com Intelbroker Registered on Raidforums with the below details:
DOB: 12-2-1998
Username: spectre123

Below is a visual representation of the threat actor created using Maltego.

Notable Leads

Names Linked to IntelBroker

  • Aidan Gonzalez
    Found on PayPal account and Instagram boarding passes
  • Brandon Beneventi
    Appears on Instagram boarding passes and correlated with “Brandon B.” on HackerOne

Cryptocurrency Exchange

  • ChangeNOW.io

Our investigation into the Bitcoin address listed on IntelBroker’s Keybase account uncovered transactions sent to a licensed cryptocurrency exchange, which can be subpoenaed for further details.

IntelBroker’s Lifestyle

Social media posts paint a vivid picture of IntelBroker’s lifestyle. Photos feature:

  • US dollars and credit/debit cards (e.g., Chase, PayPal, Wells Fargo).
  • Frequent travel within the U.S. (California, Atlanta, New York).
  • Drugs, luxury cars, and shopping sprees.
  • Domains like bclub[.]tk.

Conclusions

IntelBroker exemplifies how cybercriminals balance anonymity and visibility. While using privacy-enhancing tools to evade detection, their need for recognition often leaves traces. By mapping these breadcrumbs through OSINT, we expose details about their operations, preferred tools, and identity.
This investigation establishes probable evidence that can support further inquiries or law enforcement actions, demonstrating the effectiveness of OSINT in exposing threat actors.

administrator

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *