CHAPTER 13Interesting Places to Look

As the name implies, this chapter is all about finding information in unique places. This chapter will also wrap up the story of threat actor Cyper and the events leading up to the discovery of his identity.

What better way to start than with an excerpt of a private XMPP conversation between Cyper and myself. In this conversation, Cyper and I traded information as to how we were able to discover each other using obscure clues.

VT: How did you know it was me?
kickass: lol you use the same macbook
VT: considering i bought this macbook 2 days ago, i dont think so
VT: brand new baby. i9
kickass: but not the name ;)
kickass: anyway answer the questions
kickass: why you think i am that guy
VT: ignoring the fact that your language style changes somewhere towards the end of hell/right before BlackBox, when you guys finally opened KA, your newsbot was something like Cypernews
VT: CYPERCRIME news
VT: that's what it was
kickass: lol
kickass: you are on ka and so you should know cyper is also there ‐ btw have we ban you?
VT: i havent been on KA in a long time
kickass: some tip if you use jabber don't use the same userpic for all accounts and also change you laptop name sometimes ;)

What Cyper was referring to was the “hostname” field in my Jabber client. I didn't realize this at the time, but you have the ability to customize that field, and if left alone, Adium for Mac OSX will use the name of your computer. In this case Cyper knew ...

Get Hunting Cyber Criminals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.