Hunting 'Darcula'

How OSINT Unmasked a Cyber Tycoon

By RecOsint | Dec 6, 2025

The "Unstoppable" Network. In 2024, a new service named 'Darcula' appeared on the Dark Web. It wasn't just spam; it targeted iPhones. The Tech: It used 20,000+ compromised iMessage accounts to bypass spam filters. The Loot: It tricked victims in 100+ countries into giving up bank credentials. It seemed untraceable.

Criminals get arrogant. The mastermind behind Darcula registered hundreds of phishing domains (like usps-package-help.com). The OSINT Find: Investigators noticed that all these domains shared a Specific CSS Template. Action: They used "Pivot Searching" to find every site using that same design code.

The First Mistake

The Telegram Connection The pivoting led to a Telegram channel where the hacker sold the tool. The ID: The admin used the handle @DarculaDev. The Error: He used the same username on a legitimate coding forum (GitHub) years ago to ask for help with a Javascript error.

Rule #1 of Hacking: Never reuse usernames. Darcula forgot this. OSINT Tool: Analysts ran the username through Sherlock (a username search tool). Result: It matched a forgotten Spotify Playlist and a Steam Gaming Account.

The Username Reuse

From Steam to Street Address The Steam account wasn't private. It listed a specific city in Eastern Europe. Digging deeper into old forum posts from 2018 linked to that Steam ID, he once posted a screenshot of his desktop. The Leak: The screenshot accidentally showed his Real IP Address in the corner.

Within 48 hours, investigators had: 1) His Real Name. 2) His Home Address. 3) His Bank Details (from crypto exchanges linked to that IP). They handed the dossier to international police (Interpol/FBI). The empire collapsed.

Game Over

It wasn't a supercomputer that caught him. It was Open Source Intelligence. Lesson: You can have the best malware in the world, but one bad decision (username reuse) can destroy you. Reality: The internet never forgets.

OpSec is Fragile