Judische: The Anime Girl That Keeps the World's Largest Corporations at Bay

Friend

Professional
Messages
2,653
Reaction score
850
Points
113
A single video frame was a fatal mistake by an elusive cybercriminal.

Hacker Judische made about $2 million by hacking companies and extorting data, according to the attacker himself. At the beginning of the year, Judische staged a series of attacks, hacking into Snowflake's cloud databases and stealing sensitive data. According to some reports, up to 165 companies were hit, including Ticketmaster, Santander Bank and Neiman Marcus. The hacks caused serious consequences for various industries.

One of Judische's most notable attacks was the AT&T data breach, when he and his co-conspirator, John Binns, stole information on millions of users. In the data obtained, it was possible to trace the history of calls and messages of subscribers, which provided the criminals with a rich picture of the personal lives of the victims. Judische and Binns met through SIM Swapping, one of their early scams where criminals hijacked victims' phone numbers to further hack into their online accounts.

Binns was arrested in Turkey after the AT&T hack, but Judische continued its activities, increasing the number of attacks. Judische used the pseudonyms "zfa", "catgwuirrel", "scarlet", and others. The hacker's messages on Telegram are chaotic and threaten cybersecurity researchers. One strategy is so-called "detrace" – where he blames others for his attacks to confuse investigators.

In addition to blackmail, Judische actively interacted with intermediaries who helped him structure data for further extortion. One of these intermediaries was Vinny Troia, who offered Judische his services to sell stolen data. Troia actively corresponded with the hacker's companions, offering options for monetizing the stolen information.

Judische's activities began to attract the attention of cybersecurity specialists. One of the experts, Austin Larsen, a senior threat analyst at Mandiant, focused his efforts on finding traces that the hacker could have left. At the LABScon cybersecurity conference, Larsen will present his findings about the identity and location of the hacker.

As part of the investigation, Larsen examined Judische's public and private Telegram posts, where he was active. Gradually, the researcher began to form an idea of who Judische was and where he might be.

Judische made one critical mistake that allowed investigators to get on the trail of the hacker. During the recording of one of the videos, where Judische allegedly deleted the victim's stolen data, the host name of the computer was in the frame, which helped Larsen track the location of the hacker's server. Using the Censys search engine, Larsen was able to identify the infrastructure that supported Judische's activities. The server was found in Ukraine, and access to it was soon blocked.

The blocking of the infrastructure slowed down the hacker, as now he did not have access to part of the stolen data, which delayed further attempts to blackmail companies. Judische reacted with a storm of angry messages on Telegram, where he complained about the interference of the Ukrainian authorities and claimed that the server was allegedly returned due to a misunderstanding. However, soon after, Mandiant was able to block several more Judische servers.

Larsen and Mandiant's research identified several hundred indicators of compromise associated with Judische's activities. These included IP addresses, hostnames, and other technical tags that helped track the hacker's actions on various platforms.

Based on the collected data, Mandiant was able to form a more complete picture of the attacker's identity. Judische is a young man in his early 20s, presumably from Canada, who is passionate about video games and "catgirls" (a popular image in anime), and can also stay awake for days when hacking via Telegram.

At the moment, investigators from both Mandiant and law enforcement agencies of the United States and other countries, actively continue to investigation, coordinating their actions for the final identification of the hacker and the suppression of his activities.

Source
 
A man suspected of masterminding a major wave of Snowflake hacks has been arrested in Canada. The hacker, who uses the aliases "Judische" and "Waifu", has been linked to more than 165 data breaches, including hacks at AT&T, Ticketmaster and Santander Bank.

The detention was made possible after a lengthy investigation by international law enforcement and cybersecurity experts. According to 404 Media, experts were able to collect important data about the suspect, which made it possible to speed up the capture process. It is noted that Judische contacted journalists from 404 Media in mid-October and expressed concern about a possible arrest, saying that he had destroyed or "spoiled" evidence.

Previously, researchers suggested that the hacker may be in Canada. Confirmation of this appeared after a 404 Media source reported the real name of the suspect - Connor Moka. In the database of the Canadian court, they found a record of the upcoming hearings, in which this name appeared. Later, the Canadian Department of Justice confirmed the arrest based on a request from the United States. It is reported that the arrest was made on October 30, and the case will be considered at a court session on November 5, 2024.

The sources also said that before his arrest, Judische shared details of his journey in the hacker community "The Com" with 404 Media. This is a community of young hackers of English-speaking origin, which is behind a number of high-profile cyberattacks in recent years. The activities of the members of the association include both digital and physical crimes to gain access to other people's accounts and funds.

Police Canada and the FBI declined to comment on the situation.

Source
 
Top