News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Unmasking IntelBroker: Kai West’s OPSEC Blunders and the FBI’s Takedown : OpSec | Torhoo darknet markets

Unmasking IntelBroker: Kai West’s OPSEC Blunders and the FBI’s Takedown
If this is correct, the OpSec mistakes here are worse than I expected.

However, the crypto to fiat can be difficult and risky due to banking and financial institution requirements. LE know this and dig in this pot.
/u/GeekOpsec 📢 🍼
2 points
3 weeks ago
According to the DOJ complaint, all the details have been thoroughly documented and verified. It is highly unlikely that the FBI would fabricate such crucial information.
Thanks for the details, good write up!
/u/pimp2go
2 points
3 weeks ago
This retard thought that lying about being a Serbian living in Russia is going to deter the feds lmfao.
/u/[deleted]
2 points
3 weeks ago
It was a dumb cover. If you meet Serbs most of them are prejudice against nationalities instead of skin color. If he wanted to pretend to be a Serb he would have had to change his English word choice and pretend to hate the Albanians or something. Instead he acted like a racist from a Western English speaking country.
/u/spidimcguier
1 points
3 weeks ago
sadly a lot of people think that is a "lead" for the feds when its not... they dig deep until they got you good (like in this scenario)... but this guy was all the time changing it some different eastern european nationality, sometimes he said serbian, sometimes albanian, sometimes bosnian...
/u/ZeUser745
1 points
3 weeks ago
West's ego was his downfall. He made simple human mistakes that could've been easily avoided.
A hacker is not a security guy. Your ability to write a code or exploit vulnerability in the digital environment doesn't make you a security pro. This is a common misconception and it breaks necks. Over and over again, the same story.
Exactly, this pattern repeating among high stake busts. Still, these OpSec fails are amateurish.
Yep. The mistakes are absolutely amateurish. But why ware they even there? Because there is no formal OpSec. If you have it right in front of you, seeing it, you simply won't do it. You cannot keep all of this in your head it has to be visualised.

This is the whole point of OpSec at this stage. Put all the stuff in front of you in a properly structured way and see where the red fields are. If you see the red ocean you won' continue till and until you have it reasonably covered.

But sadly, I can just keep this comment in my clipboard and paste it in 20 minutes again under some other article in an endless loop.
I guess guys that IntelBroker grows into being a high risk taker. In the beginning they come away with poor OpSec and these lazy habits stays. Later in life, when being a high level target for LE, the risk taking is still there and OpSec is ignored or premature. It's kind of sad.
/u/DataIsLaw
1 points
3 weeks ago
i think he got lazy and thats why he made those mistakes. OPSEC is difficult because the human mind is only chasing easy routes.
If it is properly built and the routine of OpSec loop is in place, it can hold the operation for a very long time tight.
/u/DataIsLaw
1 points
3 weeks ago
100% Agree
/u/yoloyolo
1 points
3 weeks ago
retard take from a smooth brain LARP'er. studying OPSEC is like studying sociology at university, its a subject for smooth brains to feel like they are 1337

hackers ARE security "guys", u just have the confirmation bias of seeing the ones who get caught. u arent in hacking communities, you dont know any hackers. ur linkedin style takes on infosec are just bad
Sad to see your mental instability and delusions broadcasted. But at least, when you fuck yourself up, you can use the anonymity feature of the DN, get an another account and try again, with more contentment.

But try to, at least, change the diction a bit next time. The semantics and expression patterns is a bitch that is ready to be fucked the hard way.
/u/yoloyolo
1 points
2 weeks ago
i cant tell if ur being retarded or ur english is just shit but i think ur bugging out or confused?

regardless ur literally the definition of a phoney. learning OPSEC from you would be like learning to be a mechanic from a guy who just watches videos on how to be a mechanic. u have no practical knowledge, no experience u just regurgitate bullshit
No need to promote your mental and emotional issues here. Just take your medications and relax. btw, many greetings from our text-rewriting-LLM.
/u/yoloyolo
1 points
2 weeks ago
ermahgrd wow u are rewriting ur text with an LLM so no one can work out ur alts <333 so smart except no one is after u and you are doing it because ur bored

also how is me pointing out that all you do is bullshit a mental or emotional issue? its genuinely dangerous for people to take advice from you because you dont know what you are talking about. as moonship pointed out in the other thread, all you did was namedrop some NSA shit when it isnt at all relevant to what they are talking about such a fuckin mug its crazy
/u/fake_biz 🍼 P
1 points
1 week ago
I disagree. A 'hacker' should know better. This guy got into those companies because most companies don’t really care about security, and they just pay Indian contractors to
'secure' their external-facing API endpoints. Calling this dude an 'IntelBroker amateur' is being generous. Unless some nation-state-level actor deploys an undisclosed exploit against you—which they don’t do for third-tier hackers like this guy—just
maintaining basic opsec measures should make it impossible for LE to catch you. To me, this clown was just a script kiddie.
Seems like a solid post!

Thanks for taking the time for some proper formatting.. or at least prompting for it ;)
/u/RusselAdler
1 points
3 weeks ago
The intelbroker in the 'interview' with sam bent, and this list of opsec mistakes just throw me off.

I guess he really was just a red teamer.

He couldn't seem to compartmentalize things well enough.
Account linked to his name.
Microsoft and VPNs linked to his irl identity.
Cleartext in his seizable emails?

This lad sucked logs at Opsec
/u/gringo
1 points
3 weeks ago
Perfect OPSEC requires 100% the dotting of all 'i's and crossing of all 't's. This can be a difficult proposition to pull off in the long term. Especially if you do some things while high.
He was like "Finally someone is gonna send me $250!"
/u/Fugazi
1 points
3 weeks ago
Imagine having a Coinbase account linked to your real identity while you are a famous threat actor.
/u/OpSecMind
1 points
3 weeks ago
50 years if convicted, he better have something to offer or work for them US laws are crazy.
Just one more thing that makes me think Satoshi is a fake profile to hide the creation of Bitcoin by some government entity. As the past 5 years or so have passed we've seen all the govs talk about CBDC and we know how BTC is super traceable.
If I had a Bitcoin I'd bet it this is true. No matter where you live in the world, the grip is tightening.
/u/spidimcguier
1 points
3 weeks ago
very bad opsec mistakes, but i feel bad for the guy, spoken to him about 3 or 4 times and he seemed like a genuinely good guy. sad sad.... but i think his ego lately is what caused this downfall.
good recap, appreciate it
/u/orphan 🍼
1 points
3 weeks ago
When the last seizure happened and Baph was "arrested," I was friends with Intelbroker's best friend at the time. He told me that Intel was in London to meet with the Cracked owner, though I didn't actually believe him because I thought he was being fed fake information from Intel to detrace himself. Who would have believed it?

It also didn't cross my mind that such a "famous hacker" could be in the UK of all places. It seemed impossible that he could be that retarded.

Clearly, I was wrong.

Right after the second BF seizure, Intel disappeared for about a week, and nobody was able to contact him. In the BF private matrix room, there was a discussion about what could have possibly happened to him, and the moderator, WillyWonka, told us that Intel had apparently been paranoid for a while. This was later confirmed by the mutual friend Intel and I had, who told me that Intel had "buried" his laptop and was experiencing extreme panic attacks, which was why he was gone.

Again, I thought it was fake because, why would you be in the UK if you were breaching European governments, lol?

It's so funny to me that I probably knew Intel's real location before the feds did. His OPSEC was really pathetic.
/u/NemoFish
1 points
3 weeks ago
Using the same computerc and vpn for hacking activities while he have millions of money?
Security will always be at odds with convenience. Should've created a new online identity completely unrelated to his normal one before launching something as big as BreachForums.
/u/CTI
1 points
3 weeks ago
IntelBroker was arrested in 2018 under the alias PartialDuplex for swatting and bomb threats. He was a member of Apophis Squad. He also used the aliases "GnosticPlayers", "DoxingMethod", "SeekedNow", "TheRealCr4xy", and "kaibandit123".

The UK NCA gave the kid a chance and made him a trainee. He fucking blew it.
/u/barthelemystkitts985
1 points
3 weeks ago
This whole case is just a wild reminder that it only takes a few lazy mistakes to bring everything down. Using Bitcoin instead of Monero, tying exchange accounts to your real name, reusing emails, accessing accounts from the same IPsthese are basic OPSEC failures that shouldn't be happening at that level. He clearly got comfortable thinking his VPN and aliases were enough, but stuff like watching a YouTube video and posting it seconds later under your handle? That’s just sloppy. Once the feds get a few strong links, they don’t stop digging. If you're running high-profile ops and still overlapping your personal and operational identities, you're basically handing them the case on a platter.
/u/innocentmethod 🍼
1 points
2 weeks ago
[*]Behavioral Giveaways: West posted YouTube videos on BreachForums seconds after viewing them, e.g., “ROY BEE - Kiss Me Again” on April 6, 2024, at 05:18 UTC, right after viewing it on his email account


That is some wild correlation there
/u/greenapple0111
0 points
3 weeks ago
I'll say one thing, he looks exactly like you would expect, as soon as I heard the name of his "hacking group" which is probably made out of incels just like him, I put a face to the name, safe to say I was right, he looks like a fucking geek, or someone that would shoot up a public place and write a manifesto about it.

As for his opsec, there isn't much to talk about, he's a pure idiot and should never touch a computer with malicious intents ever again cause he's only gonna hurt himself in the process.

The part where the cops connected his account watching a music video and minutes after posting the same video in the forum was pretty funny and shows how even the smallest things are to be considered.
/u/Halogen66
1 points
3 weeks ago
My jaw literally dropped as I was reading through the part where they linked his YouTube activity to him. Pretty clever of the feds to do.