CHAPTER 16Searching Social Media

This chapter focuses on tools and techniques that will help in your discovery of a target's alternate aliases and social media profiles. We will look at different ways to search and find names, aliases, and phone numbers in order to eventually build a threat actor tracking matrix in Chapter 17.

Several examples in this chapter will focus on Nathan Wyatt, who is currently fighting U.S. extradition for crimes associated with The Dark Overlord.

My official position on Wyatt is that I believe he used the alias Arnie, and that the group used him as their patsy. This theory is supported by the following conversation I had with Columbine (who I believe to be a close associate of NSA@rows.io).

Columbine: Yeah I dont know where the real Revolt is now but idc tbh
Columbine: We never spoke that much anyway
Columbine: A lot of the other n****** gone too
Columbine: Like NSA@rows.io
Columbine: They formed thedarkoverload
Columbine: that ransoming group
SoundCard: yeah i know about them well
Columbine: I did hear that Arnie was getting mad at NSA though
SoundCard: i will say that they did a good job with marketing
Columbine: So internal tension between the group
Columbine: Yeah
Columbine: They were really good with that
SoundCard: The drama is funny.
SoundCard: But ok, I'll bite. why?
Columbine: NSA barely did s*** for TDO I heard
Columbine: and still he got the money
Columbine: so Arnie (who did most of the work) got mad
Columbine: Thats ...

Get Hunting Cyber Criminals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.