XSS Forum Raid: Who Was Arrested? – Krebs on Security
XSS Forum Takedown Exposes Russian Cybercrime Network, Fuels Distrust
The recent law enforcement action against the notorious Russian-language cybercrime forum XSS has sent shockwaves through the underground community, leading to arrests, forum upheaval, and widespread fear of compromised data. Investigations suggest Ukrainian authorities have taken down a key figure, perhaps Anton Gannadievich Medvedovskiy, a 38-year-old resident of Kyiv, while simultaneously gaining access to a treasure trove of intelligence on forum members.This takedown marks a critically important blow to the Russian cybercrime ecosystem and highlights the increasing sophistication of law enforcement’s ability to penetrate and dismantle these networks.
The Hunt for “Toha” and the Identification of Anton Medvedovskiy
For weeks, the identity of the individual arrested in connection with the XSS forum remained shrouded in mystery. ukrainian police released blurred images, sparking intense speculation within the cybercrime community. However, mounting evidence points to Anton Gannadievich Medvedovskiy, a Kyiv resident, as the individual behind the alias ”Toha,” a prominent figure on the exploit forum – a precursor to XSS.
Constella Intelligence identified a Medvedovskiy matching the suspect’s age and general physical description, noting he will turn 38 in December. Crucially, this individual possesses the email address itsmail@i.ua and maintains an active Airbnb account (https://www.airbnb.com/users/show/27040702) featuring a profile photo exhibiting a similar hairline to the suspect in the police photos. Medvedovskiy has not responded to requests for comment.Further corroborating evidence links Medvedovskiy to the “Toha” persona. Forum archives from 2005 show “Toha” was a recent high school graduate studying at university – aligning with Medvedovskiy’s age at the time. A birthday wish to “Toha” on December 11, 2006, coincides with records from a 2022 hack of the Ukrainian public services portal, diia.gov.ua, which reveal Medvedovskiy’s birthday as December 11, 1987.
This convergence of evidence strongly suggests Ukrainian authorities have successfully apprehended a key administrator of the XSS forum.
XSS Relaunches Amidst Distrust and Data Breach Fears
The takedown of XSS didn’t result in its complete disappearance. the forum swiftly reappeared on a new Tor address, but the transition was far from seamless. The original,trusted moderators were abruptly dismissed,and existing members found their account balances wiped clean,forced to pay a deposit to regain access.
The new administrator claimed to be in contact with the previous owners and insisted the changes were necessary to enhance security and rebuild trust. Tho,these assurances have largely failed to quell the growing anxiety among forum members. Many are hesitant to engage with the relaunched site, fearing a compromised surroundings.
The core concern isn’t simply the forum’s operational changes,but the potential exposure of sensitive data. The prevailing belief within the cybercrime community is that Ukrainian and French authorities now possess years’ worth of private messages, contact lists, and user data from both the XSS forum and its associated Jabber server. This represents a catastrophic breach of trust for a community built on secrecy and anonymity.
The Implications of a Data Goldmine for Law Enforcement
The seizure of XSS has handed law enforcement a significant intelligence advantage. As cautioned by forum user “GordonBellford” on August 3rd, the captured data isn’t merely an archive; its a fully analyzed resource.
“The myth of the ‘trusted person’ is shattered,” gordonbellford wrote. “The forum is run by strangers. They got everything. Two years of Jabber server logs. Full backup and forum database.”
The implications are far-reaching. Law enforcement now has access to:
Contact Graphs: Visual representations of relationships between forum members.
Cross-Platform Linking: Connections between usernames, email addresses, password hashes, and Jabber IDs.* Behavioral Analysis: timestamps, IP addresses, digital fingerprints, and even writing style analysis – including unique phrasing, punctuation, grammatical errors, and typos – to link accounts across different platforms.
GordonBellford’s assessment is stark: “They are not looking for a needle in a haystack. They simply sifted the haystack through the AI sieve and got ready-made dossiers.”
This capability represents a paradigm shift in how law enforcement combats cybercrime. The ability to leverage AI and data analytics to de-anonymize and profile cybercriminals considerably increases the risk for those
