Who Got Arrested within the Raid on the XSS Crime Forum? – Krebs on Security

0
111

[ad_1]

On July 22, 2025, the European police company Europol stated a long-running investigation led by the French Police resulted within the arrest of a 38-year-old administrator of XSS, a Russian-language cybercrime discussion board with greater than 50,000 members. The motion has triggered an ongoing frenzy of hypothesis and panic amongst XSS denizens in regards to the identification of the unnamed suspect, however the consensus is that he’s a pivotal determine within the crime discussion board scene who goes by the hacker deal with “Toha.” Here’s a deep dive on what’s knowable about Toha, and a brief stab at who obtained nabbed.

An unnamed 38-year-old man was arrested in Kiev final month on suspicion of administering the cybercrime discussion board XSS. Image: ssu.gov.ua.

Europol didn’t identify the accused, however revealed partially obscured pictures of him from the raid on his residence in Kiev. The police company stated the suspect acted as a trusted third celebration — arbitrating disputes between criminals — and guaranteeing the safety of transactions on XSS. A assertion from Ukraine’s SBU safety service stated XSS counted amongst its members many cybercriminals from numerous ransomware teams, together with REvil, LockBit, Conti, and Qiliin.

Since the Europol announcement, the XSS discussion board resurfaced at a brand new handle on the deep internet (reachable solely through the anonymity community Tor). But from reviewing the current posts, there seems to be little consensus amongst longtime members in regards to the identification of the now-detained XSS administrator.

The most frequent remark concerning the arrest was a message of solidarity and help for Toha, the deal with chosen by the longtime administrator of XSS and a number of other different main Russian boards. Toha’s accounts on different boards have been silent because the raid.

Europol stated the suspect has loved an almost 20-year profession in cybercrime, which roughly traces up with Toha’s historical past. In 2005, Toha was a founding member of the Russian-speaking discussion board Hack-All. That is, till it obtained massively hacked a couple of months after its debut. In 2006, Toha rebranded the discussion board to exploit[.]in, which might go on to attract tens of hundreds of members, together with an eventual Who’s-Who of needed cybercriminals.

Toha introduced in 2018 that he was promoting the Exploit discussion board, prompting rampant hypothesis on the boards that the client was secretly a Russian or Ukrainian authorities entity or entrance individual. However, these suspicions have been unsupported by proof, and Toha vehemently denied the discussion board had been given over to authorities.

One of the oldest Russian-language cybercrime boards was DaMaGeLaB, which operated from 2004 to 2017, when its administrator “Ar3s” was arrested. In 2018, a partial backup of the DaMaGeLaB discussion board was reincarnated as xss[.]is, with Toha as its said administrator.

CROSS-SITE GRIFTING

Clues about Toha’s early presence on the Internet — from ~2004 to 2010 — can be found within the archives of Intel 471, a cyber intelligence agency that tracks discussion board exercise. Intel 471 reveals Toha used the identical e mail handle throughout a number of discussion board accounts, together with at Exploit, Antichat, Carder[.]su and inattack[.]ru.

DomainTools.com finds Toha’s e mail handle — toschka2003@yandex.ru — was used to register at the very least a dozen domains — most of them from the mid- to late 2000s. Apart from exploit[.]in and a site known as ixyq[.]com, the opposite domains registered to that e mail handle finish in .ua, the top-level area for Ukraine (e.g. deleted.org[.]ua, lj.com[.]ua, and blogspot.org[.]ua).

A 2008 snapshot of a site registered to toschka2003@yandex.ru and to Anton Medvedovsky in Kiev. Note the message on the backside left, “Protected by Exploit,in.” Image: archive.org.

Nearly all the domains registered to toschka2003@yandex.ru comprise the identify Anton Medvedovskiy within the registration data, aside from the aforementioned ixyq[.]com, which is registered to the identify Yuriy Avdeev in Moscow.

This Avdeev surname got here up in a prolonged dialog with Lockbitsupp, the chief of the rapacious and damaging ransomware affiliate group Lockbit. The dialog came about in February 2024, when Lockbitsupp requested for assist figuring out Toha’s real-life identification.

In early 2024, the chief of the Lockbit ransomware group — Lockbitsupp — requested for assist investigating the identification of the XSS administrator Toha, which he claimed was a Russian man named Anton Avdeev.

Lockbitsupp didn’t share why he needed Toha’s particulars, however he maintained that Toha’s actual identify was Anton Avdeev. I declined to assist Lockbitsupp in no matter revenge he was planning on Toha, however his query made me curious to look deeper.

It seems Lockbitsupp’s question was primarily based on a now-deleted Twitter submit from 2022, when a person by the identify “3xp0rt” asserted that Toha was a Russian man named Anton Viktorovich Avdeev, born October 27, 1983.

Searching the net for Toha’s e mail handle toschka2003@yandex.ru reveals a 2010 gross sales thread on the discussion board bmwclub.ru the place a person named Honeypo was promoting a 2007 BMW X5. The advert listed the contact individual as Anton Avdeev and gave the contact telephone quantity 9588693.

A search on the telephone quantity 9588693 within the breach monitoring service Constella Intelligence finds loads of official Russian authorities data with this quantity, date of beginning and the identify Anton Viktorovich Avdeev. For instance, hacked Russian authorities data present this individual has a Russian tax ID and SIN (Social Security quantity), and that they have been flagged for visitors violations on a number of events by Moscow police; in 2004, 2006, 2009, and 2014.

Astute readers might have seen by now that the ages of Mr. Avdeev (41) and the XSS admin arrested this month (38) are a bit off. This would appear to recommend that the individual arrested is somebody aside from Mr. Avdeev, who didn’t reply to requests for remark.

A FLY ON THE WALL

For additional perception on this query, KrebsOnSecurity sought feedback from Sergeii Vovnenko, a former cybercriminal from Ukraine who now works on the safety startup paranoidlab.com. I reached out to Vovnenko as a result of for a number of years starting round 2010 he was the proprietor and operator of thesecure[.]biz, an encrypted “Jabber” immediate messaging server that Europol stated was operated by the suspect arrested in Kiev. Thesecure[.]biz grew fairly in style amongst most of the high Russian-speaking cybercriminals as a result of it scrupulously saved few data of its customers’ exercise, and its administrator was all the time a trusted member of the group.

The purpose I do know this historic tidbit is that in 2013, Vovnenko — utilizing the hacker nicknames “Fly,” and “Flycracker” — hatched a plan to have a gram of heroin bought off of the Silk Road darknet market and shipped to our house in Northern Virginia. The scheme was to spoof a name from one among our neighbors to the native police, saying this man Krebs down the road was a druggie who was having narcotics delivered to his house.

I occurred to be lurking on Flycracker’s personal cybercrime discussion board when his heroin-framing plan was carried out, and known as the police myself earlier than the smack ultimately arrived within the U.S. Mail. Vovnenko was later arrested for unrelated cybercrime actions, extradited to the United States, convicted, and deported after a 16-month keep within the U.S. jail system [on several occasions, he has expressed heartfelt apologies for the incident, and we have since buried the hatchet].

Vovnenko stated he bought a tool for cloning bank cards from Toha in 2009, and that Toha shipped the merchandise from Russia. Vovnenko defined that he (Flycracker) was the proprietor and operator of thesecure[.]biz from 2010 till his arrest in 2014.

Vovnenko believes thesecure[.]biz was stolen whereas he was in jail, both by Toha and/or an XSS administrator who glided by the nicknames N0klos and Sonic.

“When I was in jail, [the] admin of xss.is stole that domain, or probably N0klos bought XSS from Toha or vice versa,” Vovnenko stated of the Jabber area. “Nobody from [the forums] spoke with me after my jailtime, so I can only guess what really happened.”

N0klos was the proprietor and administrator of an early Russian-language cybercrime discussion board generally known as Darklife[.]ws. However, N0kl0s additionally seems to be a lifelong Russian resident, and in any case appears to have vanished from Russian cybercrime boards a number of years in the past.

Asked whether or not he believes Toha was the XSS administrator who was arrested this month in Ukraine, Vovnenko maintained that Toha is Russian, and that “the French cops took the wrong guy.”

WHO IS TOHA?

So who did the Ukrainian police arrest in response to the investigation by the French authorities? It appears believable that the BMW advert invoking Toha’s e mail handle and the identify and telephone variety of a Russian citizen was merely misdirection on Toha’s half — supposed to confuse and throw off investigators. Perhaps this even explains the Avdeev surname surfacing within the registration data from one among Toha’s domains.

But typically the best reply is the right one. “Toha” is a standard Slavic nickname for somebody with the primary identify “Anton,” and that matches the identify within the registration data for greater than a dozen domains tied to Toha’s toschka2003@yandex.ru e mail handle: Anton Medvedovskiy.

Constella Intelligence finds there’s an Anton Gannadievich Medvedovskiy dwelling in Kiev who will probably be 38 years previous in December. This particular person owns the e-mail handle itsmail@i.ua, as effectively an an Airbnb account that includes a profile picture of a person with roughly the identical hairline because the suspect within the blurred pictures launched by the Ukrainian police. Mr. Medvedovskiy didn’t reply to a request for remark.

My tackle the takedown is that the Ukrainian authorities doubtless arrested Medvedovskiy. Toha shared on DaMaGeLab in 2005 that he had not too long ago completed the eleventh grade and was learning at a college — a time when Mevedovskiy would have been round 18 years previous. On Dec. 11, 2006, fellow Exploit members wished Toha a contented birthday. Records uncovered in a 2022 hack on the Ukrainian public companies portal diia.gov.ua present that Mr. Medvedovskiy’s birthday is Dec. 11, 1987.

The legislation enforcement motion and ensuing confusion in regards to the identification of the detained has thrown the Russian cybercrime discussion board scene into disarray in current weeks, with prolonged and heated arguments about XSS’s future spooling out throughout the boards.

XSS relaunched on a brand new Tor handle shortly after the authorities plastered their seizure discover on the discussion board’s  homepage, however all the trusted moderators from the previous discussion board have been dismissed with out clarification. Existing members noticed their discussion board account balances drop to zero, and have been requested to plunk down a deposit to register on the new discussion board. The new XSS “admin” stated they have been involved with the earlier homeowners and that the adjustments have been to assist rebuild safety and belief inside the group.

However, the brand new admin’s assurances seem to have finished little to assuage the worst fears of the discussion board’s erstwhile members, most of whom appear to be preserving their distance from the relaunched website for now.

Indeed, if there’s one widespread understanding amid all of those discussions in regards to the seizure of XSS, it’s that Ukrainian and French authorities now have a number of years value of personal messages between XSS discussion board customers, in addition to contact rosters and different person knowledge linked to the seized Jabber server.

“The myth of the ‘trusted person’ is shattered,” the person “GordonBellford” cautioned on Aug. 3 in an Exploit discussion board thread in regards to the XSS admin arrest. “The forum is run by strangers. They got everything. Two years of Jabber server logs. Full backup and forum database.”

GordonBellford continued:

And the scariest factor is: this knowledge array isn’t just an archive. It is materials for evaluation that has ALREADY BEEN DONE . With the assistance of contemporary instruments, they see every little thing:

Graphs of your contacts and exercise.
Relationships between nicknames, emails, password hashes and Jabber ID.
Timestamps, IP addresses and digital fingerprints.
Your distinctive writing model, phrasing, punctuation, consistency of grammatical errors, and even typical typos that may hyperlink your accounts on totally different platforms.

They aren’t on the lookout for a needle in a haystack. They merely sifted the haystack by means of the AI sieve and obtained ready-made dossiers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here