From Cybercrime Saul Goodman to the Russian GRU – Krebs on Safety


In 2021, the unique Russian cybercrime discussion board Mazafaka was hacked. The leaked person database reveals one of many discussion board’s founders was an legal professional who suggested Russia’s prime hackers on the authorized dangers of their work, and what to do in the event that they acquired caught. A evaluate of this person’s hacker identities reveals that in his time on the boards he served as an officer within the particular forces of the GRU, the international army intelligence company of the Russian Federation.

Launched in 2001 below the tagline “Community terrorism,” Mazafaka would evolve into one of the guarded Russian-language cybercrime communities. The discussion board’s member roster features a Who’s Who of prime Russian cybercriminals, and it featured sub-forums for a variety of cybercrime specialities, together with malware, spam, coding and id theft.

One illustration of the leaked Mazafaka database.

In virtually any database leak, the primary accounts listed are often the directors and early core members. However the Mazafaka person data posted on-line was not a database file per se, and it was clearly edited, redacted and restructured by whoever launched it. Because of this, it may be tough to inform which members are the earliest customers.

The unique Mazafaka is understood to have been launched by a hacker utilizing the nickname “Stalker.” Nevertheless, the bottom numbered (non-admin) person ID within the Mazafaka database belongs to a different particular person who used the deal with “Djamix,” and the e-mail tackle djamix@mazafaka[.]ru.

From the discussion board’s inception till round 2008, Djamix was one in all its most lively and eloquent contributors. Djamix informed discussion board members he was a lawyer, and practically all of his posts included authorized analyses of varied public instances involving hackers arrested and charged with cybercrimes in Russia and overseas.

“Hiding with purely technical parameters is not going to assist in a severe matter,” Djamix suggested Maza members in September 2007. “As a way to ESCAPE the regulation, you should KNOW the regulation. That is a very powerful factor. Technical capabilities can’t overcome intelligence and crafty.”

Stalker himself credited Djamix with holding Mazafaka on-line for therefore a few years. In a retrospective put up printed to Livejournal in 2014 titled, “Mazafaka, from conception to the current day,” Stalker stated Djamix had turn out to be a core member of the group.

“This man is in every single place,” Stalker stated of Djamix. “There’s not a factor on [Mazafaka] that he doesn’t participate in. For me, he’s a stimulus-irritant and due to him, Maza remains to be alive. Our rallying drive!”

Djamix informed different discussion board denizens he was a licensed legal professional who may very well be employed for distant or in-person consultations, and his posts on Mazafaka and different Russian boards present a number of hackers dealing with authorized jeopardy doubtless took him up on this supply.

“I’ve the correct to signify your pursuits in court docket,” Djamix stated on the Russian-language cybercrime discussion board Verified in Jan. 2011. “Remotely (within the type of fixed help and consultations), or in individual – that is mentioned individually. In addition to the price of my companies.”

WHO IS DJAMIX?

A search on djamix@mazafaka[.]ru at DomainTools.com reveals this tackle has been used to register at the very least 10 domains since 2008. These embrace a number of web sites about life in and round Sochi, Russia, the location of the 2014 Winter Olympics, in addition to a close-by coastal city known as Adler. All of these websites say they had been registered to an Aleksei Safronov from Sochi who additionally lists Adler as a hometown.

The breach monitoring service Constella Intelligence finds that the cellphone quantity related to these domains — +7.9676442212 — is tied to a Fb account for an Aleksei Valerievich Safronov from Sochi. Mr. Safronov’s Fb profile, which was final up to date in October 2022, says his ICQ instantaneous messenger quantity is 53765. This is identical ICQ quantity assigned to Djamix within the Mazafaka person database.

The Fb account for Aleksey Safronov.

A “Djamix” account on the discussion board privetsochi[.]ru (“Hiya Sochi”) says this person was born Oct. 2, 1970, and that his web site is uposter[.]ru. This Russian language information website’s tagline is, “We Create Communication,” and it focuses closely on information about Sochi, Adler, Russia and the warfare in Ukraine, with a robust pro-Kremlin bent.

Safronov’s Fb profile additionally provides his Skype username as “Djamixadler,” and it contains dozens of images of him wearing army fatigues together with a regiment of troopers deploying in pretty distant areas of Russia. A few of these images date again to 2008.

In a number of of the pictures, we will see a patch on the arm of Safronov’s jacket that bears the brand of the Spetsnaz GRU, a particular forces unit of the Russian army. Based on a 2020 report from the Congressional Analysis Service, the GRU operates each as an intelligence company — accumulating human, cyber, and indicators intelligence — and as a army group liable for battlefield reconnaissance and the operation of Russia’s Spetsnaz army commando models.

Mr. Safronov posted this picture of himself on Fb in 2016. The insignia of the GRU might be seen on his sleeve.

“In recent times, stories have linked the GRU to a few of Russia’s most aggressive and public intelligence operations,” the CRS report explains. “Reportedly, the GRU performed a key position in Russia’s occupation of Ukraine’s Crimea area and invasion of japanese Ukraine, the tried assassination of former Russian intelligence officer Sergei Skripal in the UK, interference within the 2016 U.S. presidential elections, disinformation and propaganda operations, and among the world’s most damaging cyberattacks.”

Based on the Russia-focused investigative information outlet Meduza, in 2014 the Russian Protection Ministry created its “information-operation troops” for motion in “cyber-confrontations with potential adversaries.”

“Later, sources within the Protection Ministry defined that these new troops had been meant to ‘disrupt the potential adversary’s data networks,’” Meduza reported in 2018. “Recruiters reportedly went on the lookout for ‘hackers who’ve had issues with the regulation.’”

Mr. Safronov didn’t reply to a number of requests for remark. A 2018 treatise written by Aleksei Valerievich Safronov titled “One Hundred Years of GRU Navy Intelligence” explains the importance of the bat within the seal of the GRU.

“A method or one other, the bat is an emblem that unites all lively and retired intelligence officers; it’s a image of unity and exclusivity,” Safronov wrote. “And, basically, it doesn’t matter who we’re speaking about – a secret GRU agent someplace within the military or a sniper in any of the particular forces brigades. All of them did and are doing one crucial and accountable factor.”

It’s unclear what position Mr. Safronov performs or performed within the GRU, nevertheless it appears doubtless the army intelligence company would have exploited his appreciable technical expertise, information and connections on the Russian cybercrime boards.

Looking out on Safronov’s area uposter[.]ru in Constella Intelligence reveals that this area was utilized in 2022 to register an account at a well-liked Spanish-language dialogue discussion board devoted to serving to candidates put together for a profession within the Guardia Civil, one in all Spain’s two nationwide police forces. Pivoting on that Russian IP in Constella reveals three different accounts had been created on the similar Spanish person discussion board across the similar date.

Mark Rasch, a former cybercrime prosecutor for the U.S. Division of Justice, stated there has at all times been an in depth relationship between the GRU and the Russian hacker group. Rasch famous that within the early 2000s, the GRU was soliciting hackers with the talents essential to hack US banks in an effort to procure funds to assist finance Russia’s warfare in Chechnya.

“The man is closely hooked into the Russian cyber group, and that’s helpful for intelligence companies,” Rasch stated. “He might have been infiltrating the group to observe it for the GRU. Or he might simply be a man carrying a army uniform.”

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top