Darkweb Vendors and the Basic Opsec Mistakes They Keep Making

Law enforcement agencies are no longer in the dark when investigating involving darkweb vendors. Simple information leakage and a basic lack of compartmentalization end a vendor’s career. And vendors continue to make the same fundamental mistakes. Below are some examples of darkweb vendor caught due to the some of the most basic OPSEC failures possible.

Emil Babadjov

aka Blime-Sub and BTH-Overdose

Blime-sub listing on Alphabay for fentanyl.

Abudullah Almashwali & Chaudhry Farooq

aka “Area51” and “DarkApollo”

An Alphabay listing for heroin from Area51
Farooq’s Twitter account
A description of the lab’s findings after investigating a package from Area51
A description of the lab’s findings after investigating a package from Area51

Jose Robert Porras III

aka “Canna_Bars” & “TheFastPlug”

Notice the 4072 11th Avenue, Sacramento California address.
The first address the undercover money launderer had shipped cash to in exchange for bitcoin.
Canna_Bars demonstrating the quality of his product.
Pictures of Porras’ fingerprints, innocently uploaded in a cannabis advertisement

Jeremy Achey

EtiKing & Brohemoth

EtiKing Profile on Dream Market for One Gram of Etizolam
U.S. Drug Testing Organization
jeremysdemo, an account owned by Jeremy Achey, spamming USDTO
Stampnik with Achey’s return address (recreated)
Coinbase legal request page
  • Additionally, Coinbase.com records indicate that Achey listed “brohemath@ruggedinbox.com” and “brohemath@protonmail.com” as his personal email addresses. “Brohemath@protonmail.com is one of the email addresses used by EtiKing to purchase labels from Stampnik.
  • Coinbase turned over data on four different accounts in connection with the search.

Get the Medium app