- Timesxposed delicious sensitive information and PII about key development figures
- Among them is strict and professor
- Stern’s identity was confirmed by the German police
A mysterious delicious has been discovered revealed the identity of some of the world’s most sought after cyber criminals, including Masterminds behind Conti and Trickbot Ransomware, notorious groups responsible for some of the greatest extortion in modern history.
Recently, Registered Talked to an anonymous individual passing the alias times -exported who said they are on a personal mission to “fight against an organized society of criminals known throughout the world”.
“I am delighted to think that I can free society from at least some of them,” said the hallway. “I just enjoy solving the most complex cases.”
Doxxing Stern
One of the people they doxxed is Stern, the leader of Trickbot and Conti Ransomware operations. They claim that Stern is a Vitaly Nikolaevich Kovalev, a 36-year-old Russian citizen. His identity was later confirmed by the German police.
“The subject is suspected of being the founder of the ‘Trickbot’ group, also known as ‘Wizard Spider’,” said the federal criminal police office in Germany recently. “The group used Trickbot -Malware as well as other malware -variants such as bazaarloader, systembc, icedid, ryuk, conti and diavol.”
Shortly after doxxxed timesxposed another key figure, alias professor. Behind this alias, they claim, is a 39-year-old Russian named Vladimir Viktorovich Kvitko. Kvitko allegedly lives in Dubai.
In addition to naming key figures leaked aisle -exported chat logs, videos and ransom negotiations.
The leaks do not claim to be an “IT guy” and that the methodology is dependent on observing patterns that others have missed:
“My tool set includes classic intelligence analysis, logic, factual research, osin methodology, stylometry (I am a linguist and philologist), human psychology and the ability to share puzzles that others do not even notice,” they said the publication.
“I’m a cosmopolitan with many homes, but no permanent base – I move between countries as needed. My privacy standards are often stricter than for most topics in my research.”
To reveal the identity of notorious cyber criminals, the data obtained via “semi-closed databases, Darknet Services (for exploring state registers through corrupt officials), and I often buy information. I have access to the leaked FSB border contractual database,” they added, and claimed to have bought them from Darkweb for $ 250,000.
An interesting detail is that they could have claimed at least $ 10 million in Bounty from the FBI, but have apparently decided against it – getting some media to speculate that they are an unhappy former member just looking for revenge, while others believe that to intervene in the bounty could also criminal themselves.



