Major Security Research Reveals Cybercriminal’s Double Life as Bug Bounty Hunter

CyberSecureFox 🦊

A groundbreaking investigation by Outpost24 KrakenLabs has uncovered a remarkable case of dual identity in the cybersecurity landscape, where a prominent threat actor known as EncryptHub, responsible for compromising over 600 organizations, simultaneously participated in legitimate vulnerability research programs. The investigation revealed that the perpetrator had reported two critical zero-day vulnerabilities to Microsoft under the pseudonym SkorikARI, highlighting the complex nature of modern cyber threat actors.

Technical Analysis of the Identity Exposure

The exposure of this dual identity occurred through a critical operational security (OPSEC) failure when the threat actor accidentally infected their own system with malware. This self-infection led to the compromise of their credentials, establishing concrete links between various online personas, including the EncryptHub and SkorikARI identities. This incident demonstrates the significance of proper OPSEC practices, even for technically sophisticated actors.

Evolution of a Cyber Threat Actor

The investigation traced the threat actor’s origins to Kharkiv, followed by their relocation to Romania approximately a decade ago. Initially pursuing legitimate pathways through online IT education and attempting to establish a career in legitimate bug bounty programs, the individual transitioned to cybercriminal activities in early 2024 after experiencing limited success in legitimate security research.

Sophisticated Criminal Infrastructure

As EncryptHub, the threat actor developed several sophisticated malware tools, including the Fickle Stealer information stealer, and maintained connections with ransomware operations such as RansomHub and BlackSuit. The actor’s technical arsenal included advanced social engineering techniques, fake social media profiles, and fraudulent application websites designed for malware distribution.

Advanced Technical Methods and Tools

The investigation revealed the threat actor’s sophisticated use of modern technologies, including AI-powered tools like ChatGPT for malware development and phishing site creation. A particularly significant finding was the exploitation of the Microsoft Management Console vulnerability (CVE-2025-26633) to deploy information stealers and previously undocumented backdoors named SilentPrism and DarkWisp.

This case serves as a critical reminder of the importance of comprehensive security measures and continuous monitoring in cybersecurity operations. The incident highlights how even sophisticated threat actors can be exposed through basic OPSEC mistakes, emphasizing the need for organizations to maintain robust security protocols and threat intelligence capabilities. The discovery also underscores the increasingly blurred lines between legitimate security research and criminal cyber activities, presenting new challenges for the cybersecurity community in identifying and responding to emerging threats.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.