
Phantom X
@PhantomXSec
Followers
398
Following
201
Media
127
Statuses
400
Security Researcher | Explorer of the Digital Ether | Kimchi Says Hello 🧐. Focused on #Cybercrime #Phishing #APT #ThreatIntel #InfoSec
Joined June 2022
🚨 North Korean APT group responsible for crypto and NFT phishing campaign spanning over 190 domains. Targeting dozens of $ETH and $SOL projects. Uses collections on NFT marketplaces to lure victims to malicious minting sites. 🧵1/. #Phishing #NFT #NorthKorea #cybercrime.
3
26
45
🚨Small cluster of 8 NFT drainer sites found on @Hetzner_Online 162.55.38[.]225, connected to larger campaign. New Telegram notification TTPs discovered. 🧵1/. #Phishing #cybercrime #NFTs
🚨Huge campaign of 900+ Crypto and NFT drainer sites is now linked to this same threat actor. Activity began in January and is still active. Targeting both $ETH and $SOL projects. Full list of domains at the end of the 🧵. 1/. #Phishing #NFT #Cybercrime.
1
6
7
RT @IM_23pds: ⚠️ There are 728 phishing scam sites on this IP.Scam site: .Metascannft[.]xyz.@evilcos @PhantomXSec @SlowMist_Team @1c4m3by….
0
9
0
Another 280 NFT drainer sites located on CloudRadium LLC IP 23.225.152[.]131 are associated with this campaign. Still uses semi-unique TTP of subdomains versus standalone sites. Discovered from code remnants on a domain on 199.33.112[.]228 . 🧵1/. #Phishing #NFT #Cybercrime.
🚨Huge campaign of 900+ Crypto and NFT drainer sites is now linked to this same threat actor. Activity began in January and is still active. Targeting both $ETH and $SOL projects. Full list of domains at the end of the 🧵. 1/. #Phishing #NFT #Cybercrime.
1
3
11
🚨Fifteen phishing domains tied to this massive campaign registered and hosted by @namesilo on 199.33.112[.]228. Slight diversification in lures away from free minting to include the $ETH merge. Full list at the end of the 🧵. 1/. #Phishing #NFT #cybercrime.
🚨Huge campaign of 900+ Crypto and NFT drainer sites is now linked to this same threat actor. Activity began in January and is still active. Targeting both $ETH and $SOL projects. Full list of domains at the end of the 🧵. 1/. #Phishing #NFT #Cybercrime.
4
2
6
Fake @opensea phishing domain 0pensea[.]biz registered and hosted by @namesilo on 199.33.112[.]228. Harvests wallet private keys, keystore and recovery phrases. Collected data is sent to kuchbhi[.]info/post.info. #Phishing #NFT #cybercrime
0
1
4
🚨Phishing domain getdoodles[.]top just went live on 45.12.2[.]67. Semi-unique lure offering cheap floor @doodles. Actor Wallet:.0xc68C8567991e2B5718ff999A70326EF483403bEe. #Phishing #NFT
🚨Cluster of at least 29 NFT drainer sites found on Virtual Systems LLC IP 45.12.2[.]67. All associated with same threat entity. Targeting both $SOL and $ETH projects plus $CEEK. Used Custom Name Servers. 🧵1/. #Phishing #NFT #cybercrime
2
2
4
One upside (for CTI analysts) of using custom Name Servers is the admin contact included in the Start of Authority (SOA) DNS record. In this case, jaspersdfsd1258@gmail.com is the admin contact for all of the Name Servers and probably registered the domains. 7/
1
1
1