This cluster centers on 2382 connected domains tagged as PureHVNC, elf, sh. 572 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 557 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2228 complaints with federal agencies. Geog...
www.freepressjournal.in
First seen Feb 23, 2026
- No SSL certificate
- 6 community reports from users
Campaign Intelligence
This cluster centers on 2396 connected domains tagged as 156-233-71-230, Quakbot, lnk. 586 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 565 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2237 complaints with federal agen...
This cluster centers on 1895 connected domains tagged as BeaverTail, RedLineStealer, password: 2026. 113 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 934 phone numbers (8772427372, 1319641540, 1319641221) with 524 FTC complaints; 683 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2093 complaints wit...
This cluster centers on 2416 connected domains tagged as BABADEDA, WallStealer, meterpreter. 607 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (5086371451, 9366439335, 1842506726) with 570 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2243 complaints with federa...
This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...
This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...
This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...
This cluster centers on 1486 connected domains tagged as None, keylogger. 5 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1364 phone numbers (3124141737, 3163966869, 8553892999) with 17909 FTC complaints; 170 companies (EQUIFAX, INC., TRANSUNION INTERMEDIATE HOLDINGS, INC., BANK OF AMERICA, NATIONAL ASSOCIATION) with 8747332 CFPB complaints; 187 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grup...
Details
Related Domains
Community Reports
Questions about TOR and other privacy related stuff Hi, My cousin got few photos of some documents exposing corruption of a top level politician in our country. He wants to forward it to the AG's office. The problem is that whistleblowers are slaughtered in our country. Few questions about this- - The ISP will know whether one is connected to Tor or a vpn. So, is Tor over vpn recommened or just purely Tor in say Windows? Sure the vpn's cannot be trusted, more on this in the next points, but wouldn't it add an extra layer to bypass to find the sender? - If the answer to the above point is no, then is Tails the best option or is there any better alternative? I am assuming Tails is as easy to use as linux, I mean plug in the external drive, boot it and one's done. Is this correct or are the settings etc. harder for a layman to configure? When one is using Tails, will the ISP know that the person is connected to the Tor network? - Is Tails having an inbuilt vpn or exif/metadata remover from the photos? Yes vpn can be ignored here, but is there a way to figure out if there's an ip leakage or something while using Tails or simply Tor? About the exif/metadata remover, once Tails is booted via an external drive in a pc/laptop, will it allow one to copy photos from another drive to Tails so that it can be attached in a mail? - The richest guy in Asia was sent some extortion mails, which is morally wrong and the perpetrators should be caught and they were within hours https://www.freepressjournal.in/mumbai/mukesh-ambani-receives-repeated-death-threats-via-email-after-ignoring-previous-400-cr-demand-confirms-mumbai-police https://indianexpress.com/article/cities/mumbai/mukesh-ambani-threat-mails-teenager-arrested-9013062/ They got the ip from mailfence, which doesn't have a local server, within hours. Now about the vpn point in the first point, a guy sent a mail to some Governor of a state about a MP involved in corruption. It turns out he was in cahoots with the MP. W
Questions about TOR and other privacy related stuff Hi, My cousin got few photos of some documents exposing corruption of a top level politician in our country. He wants to forward it to the AG's office. The problem is that whistleblowers are slaughtered in our country. Few questions about this- - The ISP will know whether one is connected to Tor or a vpn. So, is Tor over vpn recommened or just purely Tor in say Windows? Sure the vpn's cannot be trusted, more on this in the next points, but wouldn't it add an extra layer to bypass to find the sender? - If the answer to the above point is no, then is Tails the best option or is there any better alternative? I am assuming Tails is as easy to use as linux, I mean plug in the external drive, boot it and one's done. Is this correct or are the settings etc. harder for a layman to configure? When one is using Tails, will the ISP know that the person is connected to the Tor network? - Is Tails having an inbuilt vpn or exif/metadata remover from the photos? Yes vpn can be ignored here, but is there a way to figure out if there's an ip leakage or something while using Tails or simply Tor? About the exif/metadata remover, once Tails is booted via an external drive in a pc/laptop, will it allow one to copy photos from another drive to Tails so that it can be attached in a mail? - The richest guy in Asia was sent some extortion mails, which is morally wrong and the perpetrators should be caught and they were within hours https://www.freepressjournal.in/mumbai/mukesh-ambani-receives-repeated-death-threats-via-email-after-ignoring-previous-400-cr-demand-confirms-mumbai-police https://indianexpress.com/article/cities/mumbai/mukesh-ambani-threat-mails-teenager-arrested-9013062/ They got the ip from mailfence, which doesn't have a local server, within hours. Now about the vpn point in the first point, a guy sent a mail to some Governor of a state about a MP involved in corruption. It turns out he was in cahoots with the MP. W
Questions about TOR and other privacy related stuff Hi, My cousin got few photos of some documents exposing corruption of a top level politician in our country. He wants to forward it to the AG's office. The problem is that whistleblowers are slaughtered in our country. Few questions about this- - The ISP will know whether one is connected to Tor or a vpn. So, is Tor over vpn recommened or just purely Tor in say Windows? Sure the vpn's cannot be trusted, more on this in the next points, but wouldn't it add an extra layer to bypass to find the sender? - If the answer to the above point is no, then is Tails the best option or is there any better alternative? I am assuming Tails is as easy to use as linux, I mean plug in the external drive, boot it and one's done. Is this correct or are the settings etc. harder for a layman to configure? When one is using Tails, will the ISP know that the person is connected to the Tor network? - Is Tails having an inbuilt vpn or exif/metadata remover from the photos? Yes vpn can be ignored here, but is there a way to figure out if there's an ip leakage or something while using Tails or simply Tor? About the exif/metadata remover, once Tails is booted via an external drive in a pc/laptop, will it allow one to copy photos from another drive to Tails so that it can be attached in a mail? - The richest guy in Asia was sent some extortion mails, which is morally wrong and the perpetrators should be caught and they were within hours https://www.freepressjournal.in/mumbai/mukesh-ambani-receives-repeated-death-threats-via-email-after-ignoring-previous-400-cr-demand-confirms-mumbai-police https://indianexpress.com/article/cities/mumbai/mukesh-ambani-threat-mails-teenager-arrested-9013062/ They got the ip from mailfence, which doesn't have a local server, within hours. Now about the vpn point in the first point, a guy sent a mail to some Governor of a state about a MP involved in corruption. It turns out he was in cahoots with the MP. W
Questions about TOR and other privacy related stuff Hi, My cousin got few photos of some documents exposing corruption of a top level politician in our country. He wants to forward it to the AG's office. The problem is that whistleblowers are slaughtered in our country. Few questions about this- - The ISP will know whether one is connected to Tor or a vpn. So, is Tor over vpn recommened or just purely Tor in say Windows? Sure the vpn's cannot be trusted, more on this in the next points, but wouldn't it add an extra layer to bypass to find the sender? - If the answer to the above point is no, then is Tails the best option or is there any better alternative? I am assuming Tails is as easy to use as linux, I mean plug in the external drive, boot it and one's done. Is this correct or are the settings etc. harder for a layman to configure? When one is using Tails, will the ISP know that the person is connected to the Tor network? - Is Tails having an inbuilt vpn or exif/metadata remover from the photos? Yes vpn can be ignored here, but is there a way to figure out if there's an ip leakage or something while using Tails or simply Tor? About the exif/metadata remover, once Tails is booted via an external drive in a pc/laptop, will it allow one to copy photos from another drive to Tails so that it can be attached in a mail? - The richest guy in Asia was sent some extortion mails, which is morally wrong and the perpetrators should be caught and they were within hours https://www.freepressjournal.in/mumbai/mukesh-ambani-receives-repeated-death-threats-via-email-after-ignoring-previous-400-cr-demand-confirms-mumbai-police https://indianexpress.com/article/cities/mumbai/mukesh-ambani-threat-mails-teenager-arrested-9013062/ They got the ip from mailfence, which doesn't have a local server, within hours. Now about the vpn point in the first point, a guy sent a mail to some Governor of a state about a MP involved in corruption. It turns out he was in cahoots with the MP. W
Questions about TOR and other privacy related stuff Hi, My cousin got few photos of some documents exposing corruption of a top level politician in our country. He wants to forward it to the AG's office. The problem is that whistleblowers are slaughtered in our country. Few questions about this- - The ISP will know whether one is connected to Tor or a vpn. So, is Tor over vpn recommened or just purely Tor in say Windows? Sure the vpn's cannot be trusted, more on this in the next points, but wouldn't it add an extra layer to bypass to find the sender? - If the answer to the above point is no, then is Tails the best option or is there any better alternative? I am assuming Tails is as easy to use as linux, I mean plug in the external drive, boot it and one's done. Is this correct or are the settings etc. harder for a layman to configure? When one is using Tails, will the ISP know that the person is connected to the Tor network? - Is Tails having an inbuilt vpn or exif/metadata remover from the photos? Yes vpn can be ignored here, but is there a way to figure out if there's an ip leakage or something while using Tails or simply Tor? About the exif/metadata remover, once Tails is booted via an external drive in a pc/laptop, will it allow one to copy photos from another drive to Tails so that it can be attached in a mail? - The richest guy in Asia was sent some extortion mails, which is morally wrong and the perpetrators should be caught and they were within hours https://www.freepressjournal.in/mumbai/mukesh-ambani-receives-repeated-death-threats-via-email-after-ignoring-previous-400-cr-demand-confirms-mumbai-police https://indianexpress.com/article/cities/mumbai/mukesh-ambani-threat-mails-teenager-arrested-9013062/ They got the ip from mailfence, which doesn't have a local server, within hours. Now about the vpn point in the first point, a guy sent a mail to some Governor of a state about a MP involved in corruption. It turns out he was in cahoots with the MP. W
Questions about TOR and other privacy related stuff Hi, My cousin got few photos of some documents exposing corruption of a top level politician in our country. He wants to forward it to the AG's office. The problem is that whistleblowers are slaughtered in our country. Few questions about this- - The ISP will know whether one is connected to Tor or a vpn. So, is Tor over vpn recommened or just purely Tor in say Windows? Sure the vpn's cannot be trusted, more on this in the next points, but wouldn't it add an extra layer to bypass to find the sender? - If the answer to the above point is no, then is Tails the best option or is there any better alternative? I am assuming Tails is as easy to use as linux, I mean plug in the external drive, boot it and one's done. Is this correct or are the settings etc. harder for a layman to configure? When one is using Tails, will the ISP know that the person is connected to the Tor network? - Is Tails having an inbuilt vpn or exif/metadata remover from the photos? Yes vpn can be ignored here, but is there a way to figure out if there's an ip leakage or something while using Tails or simply Tor? About the exif/metadata remover, once Tails is booted via an external drive in a pc/laptop, will it allow one to copy photos from another drive to Tails so that it can be attached in a mail? - The richest guy in Asia was sent some extortion mails, which is morally wrong and the perpetrators should be caught and they were within hours https://www.freepressjournal.in/mumbai/mukesh-ambani-receives-repeated-death-threats-via-email-after-ignoring-previous-400-cr-demand-confirms-mumbai-police https://indianexpress.com/article/cities/mumbai/mukesh-ambani-threat-mails-teenager-arrested-9013062/ They got the ip from mailfence, which doesn't have a local server, within hours. Now about the vpn point in the first point, a guy sent a mail to some Governor of a state about a MP involved in corruption. It turns out he was in cahoots with the MP. W
Share Your Experience
What's Your Exposure?
Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.
Proton Pass — Unique passwords for every account
After a breach, reused passwords let attackers into your other accounts. Proton Pass generates and stores a unique password for each one.