RipperSec’s Expanding Target List: Ideology, Messaging, and the MegaMedusa Factor

RipperSec emerged as an ideologically motivated hacktivist collective that consistently framed its activity around Muslim identity and pro-Palestinian causes. From its earliest public presence, the group positioned itself less as a conventional cybercrime operation and more as a digital protest movement, using website defacements, denial-of-service attacks, and public statements to broadcast political and religious messaging rather than pursue financial gain.

For a significant period, this ideological positioning translated into a relatively narrow and predictable targeting pattern. RipperSec’s campaigns largely focused on countries and sectors associated with perceived hostility toward Muslim communities or support for Israel, reinforcing its self-image as a cause-driven actor operating on moral and religious grounds.

More recently, that pattern began to shift. New targets appeared that did not immediately align with RipperSec’s earlier focus, accompanied by increasingly explicit justification messages and a growing emphasis on tools, platforms, and operational branding. These developments suggested an evolution in how the group understood its role, its audience, and the scope of its campaigns.

This report examines that transition. It looks at how RipperSec’s ideological foundations shape its messaging, how its operational ecosystem has expanded across platforms, and how these elements converge in the group’s latest wave of activity. Rather than documenting attacks in isolation, the analysis follows the story behind them: the motivations, the infrastructure, and the narratives that now define RipperSec’s expanding target list.

Incident Trigger and Initial Investigation

The investigation was triggered by a noticeable uptick in RipperSec-attributed attacks targeting South Korean government and private-sector entities. This activity stood out because South Korea had not previously featured as a consistent focus within RipperSec’s campaigns, which had traditionally centered on Israel, India, and ideologically aligned adversaries. The appearance of South Korean targets signaled a potential shift that warranted closer examination.

To establish whether this activity reflected isolated incidents or a broader pattern, StealthMole’s Defacement Alert Tool was used as the initial entry point. Running the keyword “RipperSec” across defacement data provided a baseline view of the group’s observable footprint. The results showed that RipperSec had targeted 592 victims between 7 May 2024 and 4 October 2025. While this dataset did not capture every instance of activity, it confirmed that the group maintained a sustained and high-volume presence rather than engaging in sporadic attacks.

With this baseline established, the investigation shifted toward understanding how these attacks were being claimed and framed. StealthMole’s Dark Web Tracker was then used to identify defaced URLs and mirror pages associated with RipperSec. This revealed hundreds of entries across defacement repositories, many of which shared near-identical content. The repeated use of the same messages, slogans, and visual elements indicated a standardized approach, suggesting that visibility and ideological signaling were prioritized over victim-specific customization.

At this stage, the focus was not on attribution or capability assessment, but on identifying where RipperSec communicated, how it presented its actions, and which platforms served as hubs for amplification. These early findings set the foundation for a deeper examination of RipperSec’s infrastructure, messaging evolution, and the mechanisms through which it justified an expanding set of targets.

Telegram Infrastructure and Identity Evolution

Telegram has consistently been the primary platform through which RipperSec communicates, rebrands, and maintains continuity. Rather than relying on a single long-standing channel, the group’s presence has evolved through a series of Telegram channels and community groups that appeared, changed identity, and were eventually abandoned or replaced.

The earliest widely referenced channel was:

  • https://t.me/RipperSec

Although this channel is no longer accessible, StealthMole’s historical Telegram indexing made it possible to review its past states. These archived snapshots show that the channel’s identity was repeatedly modified over time. Titles were changed, and at different points included Russian and Chinese translations of the group’s name, suggesting an attempt to broaden its audience beyond a single linguistic or regional base.

The channel biography also evolved. Earlier versions explicitly framed RipperSec as a Malaysia hacktivist collective. By January 2025, this language had been replaced with a markedly different self-description, presenting the group as a non-governmental and non-profit organization focused on education, research, and pentesting. This shift in tone did not coincide with a reduction in attacks or ideological messaging, but rather appeared to be an effort to reshape outward legitimacy while continuing the same activities.

Within that same January 2025 biography, two additional Telegram accounts were promoted:

  • https://t.me/RipperSecGroup
  • https://t.me/RipperSecIO

This marked a clear expansion from a single broadcast channel into a small Telegram ecosystem.

The channel https://t.me/RipperSecIO (Channel ID: 1914467285) was active during 2024 and functioned as an auxiliary broadcast space. Unlike the main channel, it explicitly advertised external infrastructure, including a GitHub repository and donation links. This indicates that it played a role not just in messaging, but in distributing tooling and supporting monetization efforts.

  • https://github.com/T******o/
  • https://sociabuzz.com/k******a/donate

A later channel using the same handle was explicitly labeled as a Backup Page. By March 2025, this channel was inactive, suggesting it had been deprecated after serving its redundancy purpose.

  • https://t.me/RipperSecIO (Channel ID: 2322296933)

Alongside broadcast channels, RipperSec maintained community-oriented Telegram spaces. The group functioned as a public discussion and onboarding space. Content shared here largely mirrored posts from broadcast channels, including official announcements, platform migration notices, and lists of verified links. The absence of technical coordination or attack planning within the group suggests it was intended primarily for community building and amplification rather than operations.

  • https://t.me/RipperSecGroup (Group ID: 2270997012)

Another channel appeared to serve as a backup or regional presence. Messages posted there included a consolidated list of RipperSec’s official social media and infrastructure links, reinforcing its role as a redundancy channel designed to preserve visibility during account disruptions.

  • https://t.me/RipperSecMY

The most recent stage of RipperSec’s Telegram activity is represented by a new broadcast channel:

  • https://t.me/+x5*************1
  • Channel title: RipperSec II
  • Creation date: 9 November 2025

This channel is currently the most active and signals continuity rather than a break from previous activity. Its earliest messages focused on India, followed by expanded targeting narratives that would later include South Korean entities.

Within RipperSec II, references were made to another channel:

  • https://t.me/Ri********7

Analysis of this channel showed messaging focused on brand control rather than operations. Posts warned about impersonator accounts, listed fake profiles, and redirected users toward what the group described as official channels. RipperSec official account even provided a proper list of impersonators and fake accounts on telegram:

  • @RIPPER_Sec
  • @Ripperseccc
  • @ripperseccs
  • @rippersecx
  • @RipperRPE
  • @rippersec_hack
  • @RipperSec_hacker_group
  • @RIPPERSECl
  • @RipperSec_robot_1
  • @rippersecxx

It also referenced additional infrastructure, including a public chat (@R*******t) and a Keet backup communication option shared via QR code and https://keet.io.

Taken together, this Telegram history shows a group that relies heavily on redundancy, rebranding, and migration,rather than stability. Channels are created, reshaped, and discarded as needed, allowing RipperSec to maintain continuity, preserve its audience, and adapt its identity while gradually expanding the scope of its campaigns.

The South Korea Pivot and Justification Narrative

RipperSec’s move toward targeting South Korean entities did not emerge gradually. Instead, it appeared as a sharp and deliberate addition to an already established campaign framework. This shift became clearly visible through activity on the group’s most recent Telegram channel, RipperSec II, which began circulating attack claims and messaging focused on South Korean government and corporate targets.

  • https://t.me/+x5**********1

At first glance, South Korea appeared to be an anomaly. RipperSec’s earlier campaigns had consistently focused on Israel and India, both of which the group openly framed as ideological adversaries. South Korea did not naturally fit within this pattern, and its sudden inclusion raised questions about whether the attacks were opportunistic or driven by a new rationale.

That rationale was explicitly provided by the group itself.

Within RipperSec II, multiple posts framed South Korea as a legitimate target based on its defense industry and geopolitical positioning. The group accused South Korean entities of supplying weapons and armored vehicles to Israel and profiting from conflict. This justification was summarized in a recurring message directed at South Korean targets:

Stop Supply Weapon & Tank to Israel & Stop making money from People Death!

Rather than presenting the attacks as punishment or retaliation, RipperSec characterized them as warnings. Posts emphasized that systems were not being destroyed and that the intent was to send a message rather than cause permanent damage. This framing mirrors the group’s earlier ideological posture, where cyber activity is portrayed as a form of protest or pressure rather than conventional cybercrime.

The South Korea campaign was also positioned as conditional. Messaging suggested that targeting decisions were tied to policy choices, implying that attacks could cease if arms-related activity changed. This approach aligns with earlier statements in which RipperSec claimed to halt attacks against certain European countries after they reduced or reconsidered support for Israel.

Importantly, the South Korea pivot did not replace RipperSec’s existing targets. Israel and India continued to feature prominently in messaging, and South Korea was introduced as an additional front rather than a new primary focus. This suggests that the group’s target list is not fixed, but expandable, shaped by how new actors are incorporated into its ideological narrative.

By grounding the South Korea campaign in moral and religious language, RipperSec maintained internal consistency with its identity as a pro-Muslim, pro-Palestinian hacktivist collective. The shift was not framed as a strategic expansion of capability, but as a natural extension of its worldview: one where economic or military ties to Israel are sufficient to justify inclusion on its target list.

This justification narrative is central to understanding RipperSec’s evolution. It shows how ideology is not only a motivator, but also a flexible tool used to rationalize new targets as the group’s scope continues to widen.

Tooling, Developer Personas, and the MegaMedusa Linkage

As RipperSec’s messaging expanded to justify new targets, its Telegram ecosystem increasingly referenced specific tools used to support operations. Among these, one name appeared repeatedly across channels, community posts, and donation appeals: MegaMedusa.

MegaMedusa was consistently described by RipperSec as a denial-of-service tool used in support of its campaigns. Posts circulating within RipperSec-linked Telegram channels framed the tool in explicit terms, stating:

MegaMedusa is DDoS tool using NodeJS language. MegaMedusa DDoS Machine provided by RipperSec Team.

Alongside this description, the same GitHub repository was repeatedly shared:

  • https://github.com/T*******o/MegaMedusa

The repository was attributed to the GitHub user T******o, a handle that appeared across multiple RipperSec channels and related artifacts. While RipperSec promoted MegaMedusa as part of its operational capability, the tooling itself was publicly accessible and openly distributed, reinforcing the group’s preference for visibility and participation over exclusivity.

Further investigation into the T********o identity revealed a direct connection to RipperSec’s monetization infrastructure. Telegram posts and channel biographies linked to a donation page hosted on Sociabuzz:

  • https://sociabuzz.com/k********a/donate

Visiting this page showed the username K******a, accompanied by the descriptor “Developer Pemula.” Payment confirmation screenshots associated with this page identified K******a as the recipient, establishing a financial link between the developer persona and the tooling promoted within RipperSec’s ecosystem.

Additional searches for the K*******a handle showed recurring associations with Medusa-related tooling, including references to both Python-based Medusa variants and the NodeJS-based MegaMedusa repository. Within RipperSec messaging, these tools were frequently grouped together, suggesting a shared lineage or overlapping development effort rather than entirely separate projects.

Taken together, these artifacts point to a consistent pattern. RipperSec did not present itself as a group developing proprietary tooling behind closed doors. Instead, it openly promoted publicly available DDoS tools maintained by identifiable developer personas, amplified those tools through its Telegram channels, and encouraged financial support for their continued development.

Importantly, while RipperSec repeatedly described MegaMedusa as being “provided by” the group, the available evidence supports a more nuanced relationship. The tooling appears to be developed and maintained by the T********o/K*******a persona, then adopted, promoted, and operationally leveraged within RipperSec’s hacktivist campaigns. This distinction matters, as it reflects a loosely coupled ecosystem rather than a tightly controlled, centralized operation.

This tooling linkage reinforces a broader theme seen throughout the investigation: RipperSec functions less as a traditional organization and more as a convergence point, where ideology, platforms, developers, and tools intersect to support campaigns that prioritize visibility, messaging, and symbolic impact.

Financial Signals and Ecosystem Overlap

As the investigation moved from tooling into monetization, a small number of financial artifacts emerged that helped clarify how RipperSec’s ecosystem sustains itself. These signals did not point to large-scale profit generation, but they did reveal overlap between developer personas, tools, and broader hacktivist activity.

Within RipperSec-linked Telegram channels, donation requests were circulated alongside MegaMedusa tooling references. In addition to the Sociabuzz donation page associated with the K*******a persona, one Telegram channel explicitly listed a Bitcoin and Ethereum wallet for contributions:

  • BTC wallet: bc1******************************v
  • ETH wallet: 0x*****************************83e

This wallet appeared in the context of supporting development and operations rather than extortion or ransom demands. There were no indications of victim-facing monetization, such as payment demands tied to attacks, reinforcing the group’s positioning as ideologically motivated rather than financially driven.

When this wallet was investigated further, it was found to be linked to MegaMedusa-related activity, indicating that the same financial infrastructure was being reused across tooling and campaign promotion. This linkage strengthens the connection between RipperSec’s operational messaging and the developer ecosystem behind its preferred tools.

Notably, the reuse of this wallet also suggested overlap with MegaMedusa beyond RipperSec alone. Rather than indicating a single, centralized organization, the evidence points to a shared pool of infrastructure used by loosely connected actors operating under aligned ideological or technical interests. This kind of overlap is common in hacktivist environments, where tools, wallets, and personas are reused across campaigns without formal hierarchy.

What is absent from the financial data is just as important as what is present. There is no evidence of structured revenue streams, paid services, or systematic monetization of victims. Instead, financial activity appears limited to voluntary donations, framed as support for development and continuation of operations. This aligns with RipperSec’s repeated public statements distancing itself from service offerings and warning followers about impersonators attempting to sell attacks under its name.

Other Platforms and Supporting Artifacts

Beyond Telegram and tooling-related infrastructure, RipperSec maintained a presence across several mainstream platforms. These accounts were primarily used for amplification, visibility, and brand reinforcement rather than operational coordination. In several cases, the group also had to address impersonation and misuse of its name, which provides additional insight into how its identity was perceived externally.

TikTok Presence

RipperSec repeatedly promoted a TikTok account across its Telegram channels and defacement pages:

  • TikTok: https://www.tiktok.com/@r******c

This account was used to share short-form content aligned with the group’s ideological messaging. References to the TikTok profile were embedded directly into defacement pages as clickable buttons, indicating that TikTok served as an auxiliary amplification channel rather than a standalone platform.

Instagram Accounts and Impersonation

Instagram played a more complex role within RipperSec’s ecosystem, largely due to impersonation issues.

RipperSec explicitly warned followers that the following Instagram account was fake:

  • Fake account: https://www.instagram.com/rippersec

In a public message circulated via Telegram, the group stated that it did not offer services and disclaimed responsibility for any solicitations originating from that account.

RipperSec identified the following accounts as official at different points in time:

  • https://www.instagram.com/rippersec.my
  • Later renamed to: @rippersec.io

Telegram messages documented that the Instagram handle was changed from @rippersec.my to @rippersec.io. At the time of investigation, all referenced Instagram accounts were inactive or removed, limiting further verification.

The volume of impersonation warnings suggests that third parties attempted to exploit the RipperSec name for fraudulent purposes, particularly by offering paid services, which the group publicly denied providing.

Discord Server

RipperSec also circulated a Discord invite link as part of its broader platform presence:

  • Discord: https://discord.gg/UWdDE73tyD

This server was referenced intermittently, particularly during periods when Telegram channels were disrupted or migrated. No operational coordination or tooling development was observed directly from Discord artifacts during the investigation, and its role appears secondary to Telegram.

Keet Backup Communication

As part of its platform redundancy strategy, RipperSec promoted the use of Keet, a peer-to-peer communication application.

Within Telegram channels, including https://t.me/RipperSec1337, the group shared:

  • A Keet QR code
  • A direct reference to the platform:
    • https://keet.io

Keet was framed as a backup or contingency communication channel rather than a primary platform. No direct content from Keet was observed, and its mention appears intended to preserve communication continuity in the event of further platform enforcement.

BreachForums Reference and Context

During analysis of RipperSec-linked artifacts, a reference to a BreachForums profile was identified through a Doxbin entry associated with the group. The following profile was explicitly mentioned:

  • BreachForums profile: https://breachforums.st/r********c

The reference appeared alongside other self-attributed infrastructure, including Telegram channels and the domain RipperSec.com, within a Doxbin upload titled RipperSec **** DOXBIN.” This positioning suggests an intentional attempt to associate the RipperSec identity with breach-centric communities.

However, no original breach disclosures, database sales, or exclusive leak announcements attributable to this BreachForums profile were identified during the investigation. There was no evidence that the account functioned as an active marketplace presence or as a primary channel for distributing stolen data.

Instead, the BreachForums reference appears to serve a symbolic or reputational role rather than an operational one. By listing a BreachForums handle alongside other platforms, RipperSec projected an image aligned with more conventional cybercrime actors, despite its observable activity remaining centered on defacement, denial-of-service attacks, and ideological messaging.

Conclusion

RipperSec’s recent activity reflects continuity rather than reinvention. At its core, the group remains an ideologically driven, pro-Muslim and pro-Palestinian hacktivist collective that prioritizes visibility, messaging, and symbolic disruption over technical sophistication or financial gain. What has changed is not the group’s identity, but the breadth of how that identity is applied.

The expansion of RipperSec’s target list, particularly the inclusion of South Korean government and corporate entities, illustrates how ideology functions as both motivation and justification. Rather than abandoning its original focus on Israel and India, the group incorporated South Korea into its narrative by framing defense ties and economic relationships as sufficient grounds for inclusion. This framing allowed RipperSec to maintain internal ideological consistency while extending its operational scope.

The investigation also highlights how RipperSec operates as an ecosystem rather than a tightly controlled organization. Telegram remains the central backbone, supported by frequent rebranding, backup channels, and migration paths. Tooling such as MegaMedusa, developed and maintained by identifiable personas, is openly promoted and operationally leveraged without clear separation between developers and campaign operators. Financial support is informal and donation-based, reinforcing the group’s self-portrayal as a movement rather than a service-driven operation.

Taken together, these elements paint a picture of a group that is adaptive but not technically evolving, expansive in messaging but limited in methods. RipperSec’s strength lies in its ability to align ideology, platforms, and tools into a coherent narrative that sustains attention and participation. Its campaigns are best understood not as isolated cyber incidents, but as components of an ongoing ideological messaging effort that can readily absorb new targets when the narrative allows.

Editorial Note

Investigations into hacktivist groups like RipperSec rarely yield absolute conclusions. Personas overlap, infrastructure is reused, and affiliations are often claimed rather than formally defined. This case demonstrates how StealthMole enables analysts to work within that uncertainty by preserving context, tracking historical platform changes, and correlating messaging with observable activity. Rather than forcing attribution beyond what evidence supports, the analysis reflects the reality of modern hacktivist ecosystems: fluid, ideologically driven, and deliberately ambiguous.

To access the unmasked report or full details, please reach out to us separately.

Contact us: support@stealthmole.com

Labels: ,

Following BadBox 2.0 Artifacts: The Zhu Zhiyu Trail

In early 2026, widespread reporting brought renewed attention to BadBox 2.0, a large-scale Android botnet embedded primarily in low-cost consumer devices such as TV boxes and media players. Investigations highlighted how the botnet leveraged preinstalled malware and backend control infrastructure to enable activities ranging from ad fraud to proxy abuse, often without the device owner’s awareness. Much of the public focus understandably centered on the technical mechanics of the operation: its scale, persistence, and the challenges of disrupting a supply-chain based threat.

Alongside those technical findings, reporting also exposed fragments of human-facing artifacts visible within operational systems, including administrative panels, usernames, and email addresses. These elements, while not central to the botnet’s functionality, offered rare glimpses into the identities interacting with or present around the infrastructure.

This investigation was conducted to examine how far those fragments could be followed using StealthMole alone. Starting from identifiers already published in a KrebsOnSecurity report, specifically email addresses visible inside a BadBox 2.0 control panel screenshot, the goal was not to re-investigate the botnet itself, but to assess how operational artifacts propagate across unrelated datasets when identities are reused over time.

One such identifier became the starting point for this identity trail. What followed was a dense, internally consistent cluster of leaked records spanning Chinese consumer platforms, Western breach datasets, travel records, and social media accounts, repeatedly converging on a single individual: Zhu Zhiyu (朱志宇), also appearing under the English name Xavier Zhu.

Panel-Linked Identifier and Initial Expansion

The investigation began with xavierzhu@qq.com, an email address visible within a BadBox 2.0 control panel screenshot published by KrebsOnSecurity. Its presence in the administrative interface placed it squarely within the operational context of the botnet, making it a suitable anchor for further analysis.

When queried through StealthMole’s dark web tracker, this address appeared in multiple leaked datasets. Several of those datasets also referenced cathead@gmail.com, an email already established in the Chen Daihai investigation, indicating early overlap between administrative identity clusters rather than isolated usage.

Across these datasets, xavierzhu@qq.com repeatedly resolved to:

  • Name: Zhu Zhiyu (朱志宇)
  • Username/handle: xavierzhu
  • Mobile phone number: 13*********9
  • Hash/ID field: 97b8********************************e0
  • A government-style identification number: 21*****************1

The consistency of these identifiers across different breach sources suggested long-term reuse rather than one-off exposure, immediately elevating the relevance of the identity behind the email.

Gmail Pivot and Cross-Regional Exposure

Pivoting on the phone number: 13********9 revealed a second core address: xavierzhu@gmail.com. This Gmail account significantly broadened the investigation’s scope, appearing in approximately three dozen leaked datasets spanning Chinese consumer platforms and international services.

A JD.com dataset associated the Gmail address with:

  • Chinese name: 朱志宇
  • Phone numbers: 13************9 and 010********3

Separately, a breach attributed to MGM Grand Hotels listed:

  • Name: Xavier Zhu
  • Date of birth: 26 October 1986
  • Address: Northville, Michigan, USA
  • Email: xavierzhu@gmail.com

The convergence of Chinese-language retail data and an English-language hospitality dataset is significant. The reuse of the same Gmail address and phone numbers across both contexts strongly indicates a single individual operating across regions, rather than coincidental overlap or name collision. This dual exposure also suggests that the identity associated with BadBox-linked artifacts was not confined to underground or operational systems, but actively used in mainstream consumer environments.

Social Media Presence and Temporal Persistence

Further enrichment linked xavierzhu@gmail.com to a Twitter account, @x*********1, created in 2017. While the account showed no public posts or visible engagement, its existence adds temporal depth to the identity cluster, demonstrating sustained use of the same naming conventions and email infrastructure over several years.

In investigations of operationally sensitive identities, low-activity or dormant social media accounts are frequently observed. Rather than serving as public personas, such accounts often function as recovery anchors, registration artifacts, or identity placeholders. When viewed alongside repeated credential exposure elsewhere, the account aligns with a pattern of long-term identity persistence rather than casual use.

Credential Exposure and Identity Convergence

Beyond account records, credential-style dumps and combo binder results played a critical role in collapsing the remaining distance between identity variants. Searches conducted across StealthMole revealed extensive credential exposure associated with xavierzhu@gmail.com, including nearly one hundred leaked password entries.

More importantly than the volume itself was the pattern of reuse. The same passwords appeared repeatedly across:

  • xavierzhu@gmail.com
  • zhuzhiyu@gmail.com

These repetitions occurred across unrelated breach sources, indicating long-term credential reuse rather than a single compromised platform. Such reuse effectively tied together Gmail, QQ, and auxiliary email identities into a single control cluster, reinforcing the conclusion that they were managed by the same individual.

From an analytical standpoint, this pattern is significant. Credential reuse across personal, professional, and operational contexts increases the likelihood that exposure in one environment can compromise others. In the case of BadBox 2.0, it provides a plausible explanation for how administrative identifiers surfaced publicly in the first place.

Additional Identity Surface: Zhu Zhiyu Variants

Further searches using the Chinese name 朱志宇 uncovered an additional email address: zhuzhiyu@gmail.com, associated with:

  • Phone number: 13*************4
  • Address: 2nd Floor, Building 12, Gudang Science & Technology Park, No. 38 Zijinhua Road

This address appeared consistently across multiple Chinese-language datasets, including e-commerce records. The presence of a structured science and technology park address suggests usage in a professional or semi-professional capacity rather than casual registration.

Credential dumps linked to zhuzhiyu@gmail.com showed password reuse consistent with patterns observed in the xavierzhu@gmail.com account, further reinforcing the convergence of these identities. Additional records also referenced a numeric email variant (13**********4@163.com), a common practice in Chinese online ecosystems, again tied to the same phone number.

Conclusion

Starting from a single email address visible in a BadBox 2.0 control panel screenshot published by KrebsOnSecurity, this investigation demonstrates how operational artifacts can be expanded into a comprehensive identity trail when examined through leaked and underground data sources. In the case of Zhu Zhiyu, panel-linked identifiers unfolded into a persistent cluster spanning QQ accounts, Gmail addresses, phone numbers, credential dumps, consumer platforms, and international breach data.

While much of the foundational linkage between these identifiers and BadBox 2.0 had already been established through public reporting, the StealthMole-driven analysis surfaced additional depth. This included the scale of credential exposure, repeated password reuse across identity variants, the existence of a long-standing Twitter account, and the alignment of Chinese and U.S.-based records under a single individual.

Collectively, these findings reinforce a broader pattern observed in BadBox 2.0–related investigations: the most durable links between infrastructure and operators often emerge not from malware or servers, but from human behaviors, credential reuse, identity persistence, and the quiet accumulation of exposure across years of online activity.

Editorial Note

Investigations involving the dark web and leaked data rarely offer absolute certainty. Records may be incomplete, outdated, or partially inaccurate, and attribution must always be approached with caution. This case illustrates how StealthMole helps analysts navigate that uncertainty by correlating fragmented data across sources, allowing patterns to emerge while preserving analytical restraint.

To access the unmasked report or full details, please reach out to us separately.

Contact us: support@stealthmole.com

Labels: ,

Tracing Identity Exposure Around BadBox 2.0: The Chen Daihai Case

In early 2026, widespread reporting brought renewed attention to BadBox 2.0, a large-scale Android botnet embedded primarily in low-cost consumer devices such as TV boxes and media players. Investigations highlighted how the botnet leveraged preinstalled malware and backend control infrastructure to enable activities ranging from ad fraud to proxy abuse, often without the device owner’s awareness. Much of the public focus understandably centered on the technical mechanics of the operation: its scale, persistence, and the challenges of disrupting a supply-chain based threat.

Alongside those technical findings, reporting also exposed fragments of human-facing artifacts visible within operational systems, including administrative panels, usernames, and email addresses. These elements, while not central to the botnet’s functionality, offered rare glimpses into the identities interacting with or present around the infrastructure. However, beyond brief mentions, little was publicly documented about how far those identifiers extended outside the immediate BadBox context.

This report documents an identity-centric investigation conducted using StealthMole, starting deliberately from one such publicly shared artifact: a BadBox 2.0 control panel screenshot featured in a KrebsOnSecurity report. Rather than attempting to re-attribute the botnet or expand on its technical architecture, the investigation set out to explore a narrower question: what additional context becomes visible when already-reported identifiers are traced across leaked and underground datasets.

By following those data trails, the investigation surfaced a dense and recurring cluster of exposed identifiers that consistently converged on a single name: Chen Daihai (陈代海).

Incident Trigger and Initial Investigation

The investigation was initiated using a screenshot of a BadBox 2.0 control panel published by KrebsOnSecurity. One visible element within that screenshot was an administrator email address:

  • 189308024@qq.com

This email was used as the starting point and searched within StealthMole’s dark web tracker. The query returned two leaked datasets containing identical records tied to the address.

Using StealthMole’s AI MoleChat feature, the following associations were observed within the same dataset entry:

  • Linked QQ identifier: 189308024
  • Linked phone number: 18681627767

Subsequent searches for the phone number returned nine leaked files. However, across all results, the only recurring identifier linked to the number was the same internal ID 189308024, indicating a tightly scoped identity cluster rather than broad reuse.

Expansion of the Chen Daihai Identity Cluster

Further searching of the internal identifier 189308024 revealed an additional leaked document containing Chinese-language records. One dataset associated this identifier with:

  • Name: Zh***g Zh******n (张***)
  • ID number: 53***************51

While recorded, this identity was not linked to any further BadBox-related artifacts and was treated cautiously as potentially unrelated noise.

Attention then shifted to another email visible in the original control panel screenshot, listed under the username “Chen”:

  • 34557257@qq.com

A StealthMole search returned eight leaked files referencing this address. These records consistently associated the email with:

  • Phone number: 13911118349
  • QQ number: 34557257
  • Timestamped Tencent-derived records (May 2023)

Two additional datasets linked this same email as a corporate contact address for two Beijing-based entities:

  • Beijing Hong Dake Wang Science and Technology Co., Ltd.
    • Website: meisvip.net
  • Beijing Heng Chuang Shixun Yidong Chuanmei Technology Co., Ltd.
    • Website: motuw.cn

The same email address also appeared in several credential-style data dumps, including entries with plaintext email–password pairings. In addition, one dump contained a combined username and email string that included “d****c,” matching the name referenced in the Krebs report. Notably, a specific password string recurred across multiple records:

  • Password: cdh761111
  • d*****c~|^34557257@qq.com~|^...:j****b~|^1*.*.*.**2

Credential Reuse and Alias Correlation

The password cdh761111 was pivoted through StealthMole’s combo binder and was found reused across multiple accounts, including:

  • cathead@gmail.com
  • daihaic@gmail.com
  • d******@gmail.com

The Gmail address cathead@gmail.com appeared in 28 leaked datasets. One JD.com consumer dataset listed:

  • Username: cathead
  • Name: Chen Daihai (陈代海)
  • Phone: 13**********9

A separate Twitter dataset linked the same email to the handle Ky*********d, created in January 2014 and later suspended. Additional casing variants of the Gmail address were also found associated with the same Twitter account.

  • https://twitter.com/Ky*******d

Further searching of 陈代海 returned over 500 leaked records, reflecting aggregation across multiple datasets rather than a single source. Among these, one document labeled “China ID_8” stood out due to the nature and structure of the information it contained. The record listed a full residential entry, including a granular village-level address:

  • Name: Chen Daihai (陈代海)
  • Phone: 15**********5
  • Address: Sa*****g Village, Group 3, D*****u Town, B*****n County (璧**********组)

The format of this address is consistent with how personal household registrations and rural residential records are commonly represented in Chinese administrative and civic datasets. The inclusion of village name, group number, town, and county, rather than a commercial building or street-level office address, suggests that this entry is more likely to reflect a private residence than a workplace or service location.

Unlike previously observed Beijing-based records tied to corporate or work-unit contexts, this entry points to a locality outside major urban business districts, reinforcing its characterization as a personal address.

Corporate and Work-Related Exposure

An additional email address surfaced when searching Chen Daihai’s Chinese name:

  • cathead@astrolink.cn

This address appeared in a dataset describing a work/unit address in Beijing:

  • Address: Room 801, Luban Building, No. 1 Yard, Dingfuzhuang Beili, Chaoyang District, Beijing
  • Phone numbers: 13*********9, 13***********5

This finding is analytically notable because it aligns with earlier reporting by KrebsOnSecurity, which referenced Chen Daihai in the context of a Beijing-based workplace during its examination of BadBox 2.0 related entities.

While this investigation does not introduce new claims about organizational involvement, the convergence of a work-domain email, a physical office address in Chaoyang District, and previously observed phone numbers reinforces the consistency of the identity cluster across both consumer and professional contexts.

Conclusion

This investigation began with identifiers already publicly tied to BadBox 2.0 through reporting by KrebsOnSecurity, specifically email addresses visible within a BadBox control panel screenshot. Rather than attempting to expand attribution or revisit the botnet’s technical operation, the primary objective was to evaluate how effectively StealthMole could track, correlate, and contextualize those same identifiers across leaked and underground datasets. By constraining the investigation to artifacts already established in public reporting, the analysis deliberately focused on validation, expansion, and visibility rather than discovery.

In practice, much of the identity-related data surfaced through StealthMole aligned closely with what had already been referenced in prior reporting, including repeated email usage, credential reuse, and associations with corporate contact records. The principal additions introduced by this investigation were the identification of a personal residential address tied to Chen Daihai through leaked administrative datasets, and the discovery of a previously undocumented Twitter account linked to the same identity cluster.

While these findings do not alter the underlying BadBox narrative, they demonstrate how StealthMole enables deeper tracking of identity exposure once operational artifacts become public, highlighting both the breadth of available context and the value of disciplined correlation when following high-profile cybercrime-linked identifiers.

Editorial Note

Investigations involving the dark web and leaked data rarely offer absolute certainty. Records may be incomplete, outdated, or partially inaccurate, and attribution must always be approached with caution. This case illustrates how StealthMole helps analysts navigate that uncertainty by correlating fragmented data across sources, allowing patterns to emerge while preserving analytical restraint.

To access the unmasked report or full details, please reach out to us separately.

Contact us: support@stealthmole.com

Labels: ,

Learn more about StealthMole

Talk to our team of experts today to learn how you can manage your dark web exposure.
Request demo More Reports

Share this report