Filter
Active
💰

pos-coin Wallet Drainer Operation

218+ domains across 6 kit variants · Research date: 2026-03-16
Active Threat Crypto Fraud OSINT

A $2.56M cryptocurrency wallet drainer disguised as a Proof-of-Stake mining and staking platform. Victims are lured via Telegram and social media with promises of passive yield, then tricked into signing malicious token approvals that silently drain their wallets. 146 confirmed victims across 313 documented drain transactions. Infrastructure traced through Tencent Cloud and bulletproof hosting in the Seychelles, with actor overlaps into the QWDB gambling syndicate and the US Treasury-sanctioned Huione Group.

$2.56M
Confirmed Stolen
146
Victims
218+
Domains
313
Drain Txs
139
Notified
Read Full Investigation →
Published

Mining Drainer Kit Ecosystem

Gen 1 USDT-DEFI · Gen 1.5 frontweb · Gen 1.5b defi-ETH · Research date: 2026-03-19
Active Threat Crypto Fraud OSINT

Longitudinal analysis of mining-themed crypto drainer toolkits across four major generations, documenting infrastructure reuse, code lineage, and shared actor attribution. Gen 1 USDT-DEFI operated 2021–2022, rebuilt 2024 as AI-DeFi with WalletConnect. Gen 1.5 frontweb is a full fake centralized exchange kit hosted on AWS. The defi-ETH variant remains actively deploying new domains — 15+ confirmed active as of March 2026. Chinese SaaS crime operation confirmed by Sophos. $496K+ in documented losses.

$496K+
Confirmed Losses
4
Kit Generations
15+
Active Domains
16
Min Operator Deployments
Read Full Investigation →
🎲

QWDB Gambling Network

54-domain Chinese gambling syndicate · Government phishing · Vigorish Viper · Research date: 2026-03-19
Active Threat Phishing Infrastructure

Infrastructure mapping and actor attribution for the QWDB gambling guarantee network — 54 active domains on Vultr Japan. The network operates as the trust/escrow layer for the Vigorish Viper / Yabo Group gambling syndicate. Active government phishing campaigns targeting Canadian CRA users and West Virginia residents confirmed running on the same Tencent Cloud IP as the pos-coin drainer. FUNNULL CDN (OFAC-sanctioned May 2025) documented with ecosystem overlaps via Suncity Group and Huione Group.

54
Active QWDB Domains
19
Gov Phishing Domains
170K+
Vigorish Viper Domains
$1.7T
Est. Gambling Economy
Read Full Investigation →
🏢

Bulletproof Hosting Analysis

Cloud Innovation / OWGELS / LUOGELANG / ASLINE / FUNNULL · Research date: 2026-03-19
OFAC Sanctioned Infrastructure OSINT

Technical analysis of two parallel bulletproof hosting models serving Chinese organized crime. Cloud Innovation Ltd (Lu Heng) fraudulently obtained 6.2 million AFRINIC IPv4 addresses and operates through shell ASNs OWGELS (AS139880), LUOGELANG (AS135097/142286), and ASLINE (AS137951). FUNNULL CDN (Liu Lizhi, OFAC-sanctioned May 2025) uses infrastructure laundering via AWS/Azure to hide 200,000+ criminal hostnames. Both models converge on the same Huione Group money laundering infrastructure. 25+ lawsuits filed by Lu Heng against AFRINIC to resist enforcement.

6.2M
AFRINIC IPs Contested
$200M+
FUNNULL US Losses
200K+
FUNNULL Hostnames
25+
AFRINIC Lawsuits
Read Full Investigation →
🤖

Recovery Scam Bot Networks

Secondary predation layer targeting crypto victims · Research date: 2026-03-19
Active Threat Crypto Fraud Bot Network

Coordinated bot networks that surveil public social media for crypto fraud disclosures and immediately swarm victims with fraudulent “fund recovery” offers. Documented live on a confirmed pos-coin victim’s tweet: 13+ accounts, 7 from a single @CyberTrack0 cluster, operating within minutes. Double-victimization mechanism, psychological exploitation vectors, and full account map documented.

13+
Bot Accounts Identified
7
@CyberTrack0 Cluster
6
Recovery Services Promoted
<5 min
Response Time
Read Full Investigation →
🔍

Parasite SEO Campaign

Kaiyun Sports / Vigorish Viper · 10+ hijacked Chinese domains · 150,000+ compromised globally · Research date: 2026-03-19
Active Threat SEO Abuse OSINT

Chinese business domains hijacked for Kaiyun Sports (开云) / Vigorish Viper gambling SEO. The fafafa.js injection cloaks gambling content from human visitors while feeding SEO authority to zunlong.app for search engine crawlers. Hosted on Cloud Innovation bulletproof infrastructure (same IPs as pos-coin drainer). Part of a 150,000+ website compromise campaign documented by Infoblox in March 2025. Full domain table, injection analysis, and Yabo Group succession chain documented.

10+
Hijacked Domains
150K+
Global Compromises
3
Cloud Innovation Shell Co.s
8+
Gambling Brands Served
Read Full Investigation →
🏭

Government Phishing Campaign

Canadian & West Virginia Government Portal Impersonation · 19 phishing domains · Tencent Cloud · Research date: 2026-03-24
Active Threat Phishing OSINT

Credential harvesting campaign impersonating Canadian Revenue Agency (CRA) and West Virginia state government portals. 19 phishing domains deployed on Tencent Cloud infrastructure (43.135.128.0/18) — the same subnet hosting pos-coin drainer domains. Targets government service credentials including tax filing, benefits, and licensing portals. Attribution links to the same Chinese cybercrime operator cluster behind the pos-coin wallet drainer network.

19
Phishing Domains
2
Governments Targeted
Tencent
Shared Infrastructure
High
Confidence Attribution
Read Full Investigation →