Exposing Pompompurin – The Cyber Threat Actor and “Data Leaker” Who Broke In FBI’s Email Server – An OSINT Analysis

Dear blog readers,

I’ve decided to share with everyone an OSINT analysis on Pompompurin who appears to have been direcrtly involved in the recent compromise of FBI’s Email server where he send a message to a lot of users actually blaming a legitimate security researcher for the compromise.

In this analysis I’ll discuss in-depth his online infrastructure and offer practical actionable intelligence on his online campaign.

Sample domains currently maintaned by Pompompurin include:

hxxp://pompur.in
hxxp://og.money
hxxp://skidbin.net

Sample URLs currently maintained by Pompompurin include:

https://blog.pompur.in
https://keybase.io/pompompurin
https://t.me/pompompur_in

Sample social media accounts known to have been maintained by Pompompurin include:

https://twitter.com/pompompur_in
https://twitter.com/Troia

Stay tuned!

Author: admin
Dancho Danchev is the world's leading expert in the field of cybercrime fighting and threat intelligence gathering having actively pioneered his own methodlogy for processing threat intelligence leading to a successful set of hundreas of high-quality anaysis and research articles published at the industry's leading threat intelligence blog - ZDNet's Zero Day, Dancho Danchev's Mind Streams of Information Security Knowledge and Webroot's Threat Blog with his research featured in Techmeme, ZDNet, CNN, PCWorld, SCMagazine, TheRegister, NYTimes, CNET, ComputerWorld, H+Magazine currently producing threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge. With his research featured at RSA Europe, CyberCamp, InfoSec, GCHQ and Interpol the researcher continues to actively produce threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge publishing a diverse set of hundreds of high-quality research analysis detailing the malicious and fraudulent activities at nation-state and malicious actors across the globe.

Leave a Reply

Your email address will not be published. Required fields are marked *