MuskanS

20 posts

MuskanS banner
MuskanS

MuskanS

@MuskanS7_

StealthMole I Dark Web Threat Intelligence Analyst Read my articles on StealthMole Intelligence Hub

Katılım Mart 2026
6 Takip Edilen35 Takipçiler
Sabitlenmiş Tweet
MuskanS
MuskanS@MuskanS7_·
Tomorrow, I’ll be conducting a live @stealthmole_int webinar on #BASHE that unexpectedly uncovered links to an older operation. Sometimes ransomware groups don’t disappear, they rebrand. Join us to see how we investigate using #StealthMole stealthmole.com
English
0
0
0
17
MuskanS retweetledi
Fusion Intelligence Center @ StealthMole
Mirrors of Free City: Investigating the Chinese Marketplace Across Dark & Deep Web What initially appeared to be a single Chinese-language onion marketplace gradually revealed a much broader operational ecosystem built across mirrored infrastructure, Telegram communities, administrative channels, and automated bot activity. As the investigation progressed, Free City consistently demonstrated patterns associated with more mature underground environments, particularly through its use of multiple onion domains and Telegram-based coordination. The investigation also highlighted how closely Telegram and Tor infrastructure now operate together within parts of the Chinese-language underground ecosystem. Marketplace visibility, announcements, escrow-related communication, and promotional activity were no longer confined to hidden services alone, but instead distributed across interconnected Telegram channels and repost networks that helped sustain the platform’s presence over time. At the same time, the fragmented nature of these ecosystems made attribution and infrastructure mapping significantly more challenging. Marketplace references, mirrored domains, automated activity, and community discussions frequently overlapped across unrelated underground spaces, making it difficult to separate direct operational infrastructure from broader ecosystem noise without continuous pivot-based investigation. Although Free City appeared to function as an anonymous escrow marketplace and underground community platform, the investigation ultimately demonstrated something larger: modern underground marketplaces increasingly survive not through a single hidden service, but through distributed ecosystems designed to maintain visibility, continuity, and resilience across multiple interconnected platforms. …lthmole-intelligence-hub.blogspot.com/2026/05/mirror…
Fusion Intelligence Center @ StealthMole tweet media
English
0
6
20
3K
MuskanS retweetledi
Fusion Intelligence Center @ StealthMole
Join our upcoming webinar: From Eraleign to BASHE: Investigating the Evolution of a Ransomware Operation BASHE may appear as a newer ransomware operation, but traces across infrastructure, Telegram activity, and leak site behavior point toward something older: Eraleign (APT73). In this session, we’ll walk through how those connections were uncovered using StealthMole through a live dark web intelligence investigation. 📅 Wednesday, 20th May 2026 🕓 4:00 PM (SGT) 🔗 us06web.zoom.us/webinar/regist… 🎁 Lucky draw for selected participants #CyberSecurity #ThreatIntel #Ransomware #DarkWeb #OSINT #CyberSecurityWebinar #StealthMole
Fusion Intelligence Center @ StealthMole tweet media
English
0
3
10
3.7K
MuskanS
MuskanS@MuskanS7_·
#IS supporters aren’t just switching platforms anymore, they’re trying to re-engineer how those platforms are accessed. My latest for @GNET_research explores “Operation Ghost Protocol: The 2026 Telegram Hardening Manual” and the shift toward infrastructure-level evasion.
GNET@GNET_research

Muskan Sangwan examines how “Operation Ghost Protocol: The 2026 Telegram Hardening Manual” signals developing operational security thinking within Islamic State-supporter ecosystems, and what it means for platforms tackling extremist activity online. gnet-research.org/2026/03/30/ope…

English
0
0
0
59
MuskanS retweetledi
Fusion Intelligence Center @ StealthMole
Free Webinar: From Alias to Attribution Threat actors rarely operate on just one platform. From exploit tools to compromised account sales, their activities often span multiple underground spaces — leaving behind traces that investigators can connect. 𝗜𝗻 𝘁𝗵𝗶𝘀 𝘄𝗲𝗯𝗶𝗻𝗮𝗿, we’ll examine the operational model behind the actor “𝗤𝘂𝗲𝘀𝘀𝘁𝘀” and show how cross-platform signals can be used to link aliases, map activity patterns, and move toward attribution using dark web intelligence. 🗓 𝗠𝗮𝗿𝗰𝗵 𝟮𝟱, 𝟮𝟬𝟮𝟲 ⏰ 𝟰:𝟬𝟬 𝗣𝗠 - 𝟱:𝟬𝟬 𝗣𝗠 (𝗦𝗚𝗧) 📍 𝗟𝗶𝘃𝗲 𝗼𝗻 𝗭𝗼𝗼𝗺 𝗪𝗲𝗯𝗶𝗻𝗮𝗿 🎁 Bonus: Join the session for a chance to win a 𝗟𝘂𝗰𝗸𝘆 𝗗𝗿𝗮𝘄 𝗽𝗿𝗶𝘇𝗲. Secure your spot and join the investigation: egv9g.share-na2.hsforms.com/2PihgCDzxRAaoL… #CyberThreatIntelligence #DarkWeb #ThreatActors #CyberSecurity #OSINT #ThreatIntel #CyberCrime #StealthMole
Fusion Intelligence Center @ StealthMole tweet media
English
0
6
23
4.1K
MuskanS retweetledi
Fusion Intelligence Center @ StealthMole
Viewed in this light, RasCorp is less notable for a specific attack or dataset and more significant as an example of how cyber groups attempt to organize themselves in the early stages of operation. Monitoring these emerging networks, particularly those built around recruitment and partnerships, can provide valuable insight into how future ransomware or cybercrime campaigns may develop. …lthmole-intelligence-hub.blogspot.com/2026/03/inside…
Fusion Intelligence Center @ StealthMole tweet media
English
1
7
21
2.6K