The author received a phishing text about an Amazon recall and decided to investigate. Using open-source tools and APIs, they quickly mapped the scammer's infrastructure, identifying 40 subdomains. They analyzed the domain's age, certificate, and hosting provider (DataWagon LLC). The author then utilized various threat intelligence services like VirusTotal and AbuseIPDB, finding no initial detections due to the site's recent creation. They submitted the scam URLs to VirusTotal for analysis, expecting widespread flagging. They automated the process into a GitHub repo, creating a full report and takedown guide. The author reported the scam to the host and registrar, anticipating a shutdown within 72 hours. They outlined the scammer's mistakes, emphasizing poor infrastructure and targeting a technical person. The article highlights the shift in cyber defense, empowering individuals with swift takedown capabilities. The author details their tools, costs, and the scammer's losses, emphasizing the power of automated reconnaissance. They conclude with a call to action for security researchers and a warning to scammers. The author reinforces the message that scammers are easily found and defeated in the current technological landscape.
dev.to
dev.to
Create attached notes ...
