• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’ – Krebs on Safety

Admin by Admin
November 28, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this 12 months by frequently stealing knowledge from and publicly mass extorting dozens of main companies. However the tables appear to have turned considerably for “Rey,” the moniker chosen by the technical operator and public face of the hacker group: Earlier this week, Rey confirmed his actual life identification and agreed to an interview after KrebsOnSecurity tracked him down and contacted his father.

Scattered LAPSUS$ Hunters (SLSH) is regarded as an amalgamation of three hacking teams — Scattered Spider, LAPSUS$ and ShinyHunters. Members of those gangs hail from most of the similar chat channels on the Com, a largely English-language cybercriminal group that operates throughout an ocean of Telegram and Discord servers.

In Could 2025, SLSH members launched a social engineering marketing campaign that used voice phishing to trick targets into connecting a malicious app to their group’s Salesforce portal. The group later launched a knowledge leak portal that threatened to publish the interior knowledge of three dozen corporations that allegedly had Salesforce knowledge stolen, together with Toyota, FedEx, Disney/Hulu, and UPS.

The brand new extortion web site tied to ShinyHunters, which threatens to publish stolen knowledge until Salesforce or particular person sufferer corporations conform to pay a ransom.

Final week, the SLSH Telegram channel featured a suggestion to recruit and reward “insiders,” staff at giant corporations who conform to share inner entry to their employer’s community for a share of no matter ransom fee is in the end paid by the sufferer firm.

SLSH has solicited insider entry beforehand, however their newest name for disgruntled staff began making the rounds on social media on the similar time information broke that the cybersecurity agency Crowdstrike had fired an worker for allegedly sharing screenshots of inner methods with the hacker group (Crowdstrike stated their methods have been by no means compromised and that it has turned the matter over to legislation enforcement companies).

The Telegram server for the Scattered LAPSUS$ Hunters has been trying to recruit insiders at giant corporations.

Members of SLSH have historically used different ransomware gangs’ encryptors in assaults, together with malware from ransomware affiliate applications like ALPHV/BlackCat, Qilin, RansomHub, and DragonForce. However final week, SLSH introduced on its Telegram channel the discharge of their very own ransomware-as-a-service operation known as ShinySp1d3r.

The person chargeable for releasing the ShinySp1d3r ransomware providing is a core SLSH member who goes by the deal with “Rey” and who’s presently one among simply three directors of the SLSH Telegram channel. Beforehand, Rey was an administrator of the info leak web site for Hellcat, a ransomware group that surfaced in late 2024 and was concerned in assaults on corporations together with Schneider Electrical, Telefonica, and Orange Romania.

A latest, barely redacted screenshot of the Scattered LAPSUS$ Hunters Telegram channel description, exhibiting Rey as one among three directors.

Additionally in 2024, Rey would take over as administrator of the most up-to-date incarnation of BreachForums, an English-language cybercrime discussion board whose domains have been seized on a number of events by the FBI and/or by worldwide authorities. In April 2025, Rey posted on Twitter/X about one other FBI seizure of BreachForums.

On October 5, 2025, the FBI introduced it had as soon as once more seized the domains related to BreachForums, which it described as a significant legal market utilized by ShinyHunters and others to visitors in stolen knowledge and facilitate extortion.

“This takedown removes entry to a key hub utilized by these actors to monetize intrusions, recruit collaborators, and goal victims throughout a number of sectors,” the FBI stated.

Extremely, Rey would make a sequence of crucial operational safety errors final 12 months that offered a number of avenues to establish and ensure his real-life identification and site. Learn on to be taught the way it all unraveled for Rey.

WHO IS REY?

In keeping with the cyber intelligence agency Intel 471, Rey was an energetic consumer on varied BreachForums reincarnations over the previous two years, authoring greater than 200 posts between February 2024 and July 2025. Intel 471 says Rey beforehand used the deal with “Hikki-Chan” on BreachForums, the place their first publish shared knowledge allegedly stolen from the U.S. Facilities for Illness Management and Prevention (CDC).

In that February 2024 publish concerning the CDC, Hikki-Chan says they may very well be reached on the Telegram username @wristmug. In Could 2024, @wristmug posted in a Telegram group chat known as “Pantifan” a replica of an extortion e-mail they stated they obtained that included their e-mail deal with and password.

The message that @wristmug lower and pasted seems to have been a part of an automated e-mail rip-off that claims it was despatched by a hacker who has compromised your pc and used your webcam to file a video of you when you have been watching porn. These missives threaten to launch the video to all of your contacts until you pay a Bitcoin ransom, they usually usually reference an actual password the recipient has used beforehand.

“Noooooo,” the @wristmug account wrote in mock horror after posting a screenshot of the rip-off message. “I have to be achieved guys.”

A message posted to Telegram by Rey/@wristmug.

In posting their screenshot, @wristmug redacted the username portion of the e-mail deal with referenced within the physique of the rip-off message. Nonetheless, they didn’t redact their previously-used password, they usually left the area portion of their e-mail deal with (@proton.me) seen within the screenshot.

O5TDEV

Looking out on @wristmug’s slightly distinctive 15-character password within the breach monitoring service Spycloud finds it’s recognized to have been utilized by only one e-mail deal with: cybero5tdev@proton.me. In keeping with Spycloud, these credentials have been uncovered at the least twice in early 2024 when this consumer’s machine was contaminated with an infostealer trojan that siphoned all of its saved usernames, passwords and authentication cookies (a discovering that was initially revealed in March 2025 by the cyber intelligence agency KELA).

Intel 471 exhibits the e-mail deal with cybero5tdev@proton.me belonged to a BreachForums member who glided by the username o5tdev. Looking out on this nickname in Google brings up at the least two web site defacement archives exhibiting {that a} consumer named o5tdev was beforehand concerned in defacing websites with pro-Palestinian messages. The screenshot beneath, for instance, exhibits that 05tdev was a part of a bunch known as Cyb3r Drag0nz Crew.

Rey/o5tdev’s defacement pages. Picture: archive.org.

A 2023 report from SentinelOne described Cyb3r Drag0nz Crew as a hacktivist group with a historical past of launching DDoS assaults and cyber defacements in addition to participating in knowledge leak exercise.

“Cyb3r Drag0nz Crew claims to have leaked knowledge on over 1,000,000 of Israeli residents unfold throughout a number of leaks,” SentinelOne reported. “So far, the group has launched a number of .RAR archives of purported private data on residents throughout Israel.”

The cyber intelligence agency Flashpoint finds the Telegram consumer @05tdev was energetic in 2023 and early 2024, posting in Arabic on anti-Israel channels like “Ghost of Palestine” [full disclosure: Flashpoint is currently an advertiser on this blog].

‘I’M A GINTY’

Flashpoint exhibits that Rey’s Telegram account (ID7047194296) was notably energetic in a cybercrime-focused channel known as Jacuzzi, the place this consumer shared a number of private particulars, together with that their father was an airline pilot. Rey claimed in 2024 to be 15 years outdated, and to have household connections to Eire.

Particularly, Rey talked about in a number of Telegram chats that he had Irish heritage, even posting a graphic that exhibits the prevalence of the surname “Ginty.”

Rey, on Telegram claiming to have affiliation to the surname “Ginty.” Picture: Flashpoint.

Spycloud listed tons of of credentials stolen from cybero5dev@proton.me, and people particulars point out that Rey’s pc is a shared Microsoft Home windows machine positioned in Amman, Jordan. The credential knowledge stolen from Rey in early 2024 present there are a number of customers of the contaminated PC, however that every one shared the identical final title of Khader and an deal with in Amman, Jordan.

The “autofill” knowledge lifted from Rey’s household PC incorporates an entry for a 46-year-old Zaid Khader that claims his mom’s maiden title was Ginty. The infostealer knowledge additionally exhibits Zaid Khader continuously accessed inner web sites for workers of Royal Jordanian Airways.

MEET SAIF

The infostealer knowledge makes clear that Rey’s full title is Saif Al-Din Khader. Having no luck contacting Saif instantly, KrebsOnSecurity despatched an e-mail to his father Zaid. The message invited the daddy to reply by way of e-mail, cellphone or Sign, explaining that his son gave the impression to be deeply enmeshed in a critical cybercrime conspiracy.

Lower than two hours later, I obtained a Sign message from Saif, who stated his dad suspected the e-mail was a rip-off and had forwarded it to him.

“I noticed your e-mail, sadly I don’t assume my dad would reply to this as a result of they assume its some ‘rip-off e-mail,’” stated Saif, who informed me he turns 16 years outdated subsequent month. “So I made a decision to speak to you instantly.”

Saif defined that he’d already heard from European legislation enforcement officers, and had been making an attempt to extricate himself from SLSH. When requested why then he was concerned in releasing SLSH’s new ShinySp1d3r ransomware-as-a-service providing, Saif stated he couldn’t simply instantly stop the group.

“Effectively I cant simply dip like that, I’m making an attempt to scrub up the whole lot I’m related to and transfer on,” he stated.

The previous Hellcat ransomware website. Picture: Kelacyber.com

He additionally shared that ShinySp1d3r is only a rehash of Hellcat ransomware, besides modified with AI instruments. “I gave the supply code of Hellcat ransomware out principally.”

Saif claims he reached out on his personal lately to the Telegram account for Operation Endgame, the codename for an ongoing legislation enforcement operation concentrating on cybercrime companies, distributors and their clients.

“I’m already cooperating with legislation enforcement,” Saif stated. “The truth is, I’ve been speaking to them since at the least June. I’ve informed them almost the whole lot. I haven’t actually achieved something like breaching right into a corp or extortion associated since September.”

Saif steered {that a} story about him proper now might endanger any additional cooperation he could possibly present. He additionally stated he wasn’t certain if the U.S. or European authorities had been in touch with the Jordanian authorities about his involvement with the hacking group.

“A narrative would deliver a lot undesirable warmth and would make issues very tough if I’m going to cooperate,” Saif stated. “I’m not sure whats going to occur they stated they’re in touch with a number of international locations relating to my request however its been like a complete week and I obtained no updates from them.”

Saif shared a screenshot that indicated he’d contacted Europol authorities late final month. However he couldn’t title any legislation enforcement officers he stated have been responding to his inquiries, and KrebsOnSecurity was unable to confirm his claims.

“I don’t actually care I simply need to transfer on from all these things even when its going to be jail time or no matter they gonna say,” Saif stated.



Tags: adminHuntersKrebsLAPSUSMeetReyScatteredSecurity
Admin

Admin

Next Post
In the direction of a Higher Analysis of 3D CVML Algorithms: Immersive Debugging of a Localization Mannequin

In the direction of a Higher Analysis of 3D CVML Algorithms: Immersive Debugging of a Localization Mannequin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Suggestions for utilizing Google Photographs’ Ask button and Ask Photographs options

Suggestions for utilizing Google Photographs’ Ask button and Ask Photographs options

February 11, 2026
ChatGPT Advertisements and the Ethics of AI Monetization

ChatGPT Advertisements and the Ethics of AI Monetization

February 10, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved