π΄ Room: Operation Slither
π¬ Category: OSINT
π Difficulty: Medium
π οΈ Tools Used: Web browser, idcrawl.com, Base64 decoder
β±οΈ Reading time: ~7 min
Scenario #
We gained access to a hacker forum and discovered company data from TryTelecomMe being sold by a threat group called Sneaky Viper. Our mission: trace every operator in the group using nothing but a forum post and pure OSINT.
The initial forum post reads:
Full user database TryTelecomMe on sale!!!
As part of Operation Slither, we've been hiding for weeks in their network and have now started to exfiltrate information. This is just the beginning. We'll be releasing more data soon. Stay tuned!
@v3n0mbyt3_
Task 1 -- The Leader #
Objective #
Find any information related to the leader of the Sneaky Viper group.
Recon #
Starting with the username v3n0mbyt3_, I searched across common social platforms. The handle was found on:
- X / Twitter -- @V3N0MBYT3 (no underscore variant). The bio hinted that Threads was the preferred platform: "Threads is more fun! Twitter out..."
- Instagram -- @v3n0mbyt3_
- Threads -- @v3n0mbyt3_ -- the main hub of activity.
The Flag #
On the Threads profile, the Replies tab revealed a conversation between v3n0mbyt3_ and another user, _myst1cv1x3n_. One reply from _myst1cv1x3n_ contained a suspicious string:
Click to reveal Base64
VEhNe3NsMXRoM3J5X3R3MzN0el80bmRfbDM0a3lfcjNwbDEzcyF9
Decoding from Base64:
Click to reveal decoded flag
$ echo "VEhNe3NsMXRoM3J5X3R3MzN0el80bmRfbDM0a3lfcjNwbDEzcyF9" | base64 -d
THM{sl1th3ry_tw33tz_4nd_l34ky_r3pl13s!}
Notable Observations #
The Threads posts also included a workstation photo with posters reading "AXEL SMITH" and "ARNIE 2" on the wall -- potential alias breadcrumbs.
The conversations between the two users were openly discussing the operation:
"I still can't believe that they are still not aware of us for weeks." "time to harvest soon!" "Yea for sure. That last OP was wild."
Click to reveal flag
THM{sl1th3ry_tw33tz_4nd_l34ky_r3pl13s!}
Task 2 -- The Second Operator #
Objective #
A second forum post appeared advertising the stolen data for bidding. The operator handle was redacted, but we were told to follow the crumbs from Task 1.
60GB of data owned by TryTelecomMe is now up for bidding! Number of users: 64,500,000 Accepting all types of crypto For takers, send your bid on Threads via this handle: [HIDDEN]
Recon #
From Task 1, the username _myst1cv1x3n_ (Mystic Vixen) was already identified as a frequent collaborator of v3n0mbyt3_ on Threads. Searching this handle revealed:
- Instagram -- @_myst1cv1x3n_ -- 5 posts, bio: "Delightfully Chaotic xo"
- Threads -- @_myst1cv1x3n_ -- posts about "Lo-fi and chill" and "Finally! Vix3n is here!"
The Trail: Instagram to SoundCloud #
The Instagram profile had 5 posts -- mostly aesthetic images. The 3rd post (an anime-style bedroom Reel) contained a SoundCloud link in its caption.
Following the link led to a SoundCloud account with multiple tracks. One track in particular, "Prototype2", was not music at all -- it was a recording of three people discussing a GitHub repository and technical infrastructure. At the end of the recording, they realized they were being recorded and abruptly cut the stream.
The Flag #
The SoundCloud recording contained an encoded value that, when decoded, revealed the flag:
Click to reveal flag
THM{s0cm1nt_00ps3c_f1ng3r_m1scl1ck}
(socmint + opsec + finger misclick -- they accidentally published the recording)
Task 3 -- The Third Operator & Attack Infrastructure #
Objective #
A third forum post surfaced -- this time selling a full phishing toolkit. Hunt the third operator and find details about the infrastructure used for the attack.
FOR SALE -- Advanced automation scripts for phishing and initial access!
Inclusions: Terraform scripts, evilginx v3.0 phishlet, GoPhish automation, Google MFA bypass, Cobalt Strike aggressor scripts, EDR bypass payloads...
PRICE: $1500
Recon #
From the SoundCloud "Prototype2" recording, a user named sh4d0wF4NG had liked the track -- a visible interaction that exposed the third operator.
Searching sh4d0wF4NG across platforms revealed a GitHub profile:
- GitHub -- sh4d0wF4NG (display name: sdF4NG) -- bio: "Chillin."
The Repositories #
The account had 3 public repositories, all directly matching the toolkit advertised in the forum post:
| Repository | Description |
|---|---|
| red-team-infra | Terraform scripts for phishing infra (HCL + Python) |
| evilginx2 | Fork of the MITM phishing framework |
| gophish | Fork of the open-source phishing toolkit |
Digging Into Commits #
The red-team-infra repository had 9 commits, all from April 23, 2024. Following the recon guide's advice to "analyse activity history for embedded information", I inspected each commit diff.
Commit 78de1f1 -- "Added automation for user" -- was the jackpot. The Terraform state file had been committed to the repo, leaking:
Click to reveal Base64
VEhNe3NoNHJwX2Y0bmd6X2wzNGszZF9ibDAwZHlfcHd9
$ echo "VEhNe3NoNHJwX2Y0bmd6X2wzNGszZF9ibDAwZHlfcHd9" | base64 -d
THM{sh4rp_f4ngz_l34k3d_bl00dy_pw}
Click to reveal infrastructure details
| Detail | Value |
|---|---|
| AWS Region | ap-southeast-2 (Sydney) |
| EC2 Instance ID | i-0f3d5008863c391c9 |
| Instance Name | evilginx_instance |
| Public IP | 13.210.88.140 |
| IAM User | sh4d0wF4NG (AdministratorAccess) |
| IAM Unique ID | AIDAU2VYTBGYEI6YUORUZ |
| VPC CIDR | 172.31.0.0/16 |
The classic blunder: committing .tfstate to a public repository. The .gitignore excluded .terraform/ directories but not the state files themselves.
Click to reveal flag
THM{sh4rp_f4ngz_l34k3d_bl00dy_pw}
Summary #
| Task | Operator | Platform Trail | Flag |
|---|---|---|---|
| 1 | v3n0mbyt3_ |
Forum -> X -> Threads (Replies) | RevealTHM{sl1th3ry_tw33tz_4nd_l34ky_r3pl13s!} |
| 2 | _myst1cv1x3n_ |
Threads -> Instagram -> SoundCloud | RevealTHM{s0cm1nt_00ps3c_f1ng3r_m1scl1ck} |
| 3 | sh4d0wF4NG |
SoundCloud (likes) -> GitHub (commits) | RevealTHM{sh4rp_f4ngz_l34k3d_bl00dy_pw} |
Key Takeaways #
- OPSEC is hard. Every public interaction -- a like, a reply, a fork -- is a potential pivot point for investigators.
- Platform correlation is powerful. A single username reused across platforms can unravel an entire operation.
- Git never forgets. Even if you delete sensitive data from the latest commit, the history preserves everything. Never commit state files or credentials.
- Social media metadata matters. Threads replies, SoundCloud likes, and Instagram captions all became links in the attribution chain.
The Sneaky Viper group's downfall wasn't a technical exploit -- it was human error at every level. From Base64-encoded flags in public replies, to accidentally recording a planning session, to pushing Terraform state to a public GitHub repo. A textbook case of OPSEC failure.
OSINT Pivot Chain β The Big Picture #
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β OSINT Investigation Flow β Operation Slither β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
ββββββββββββββββ
β Hacker Forum β
ββββββββ¬ββββββββ
β
βββββββββββββββββββββββββββ
β
βΌ
TASK 1 β The Leader
βββββββββββββββ βββββββββββββ βββββββββββ βββββββββββ
β v3n0mbyt3_ ββββββΆβ X/Twitter ββββββΆβ Threads ββββββΆβ Replies ββββΆ π© FLAG 1
βββββββββββββββ βββββββββββββ βββββββββββ ββββββ¬βββββ
β
discovered _myst1cv1x3n_ in replies β
β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
βΌ
TASK 2 β 2nd Operator
ββββββββββββββββββ βββββββββββββ ββββββββββββββ
β _myst1cv1x3n_ ββββββΆβ Instagram ββββββΆβ SoundCloud ββββββββββββΆ π© FLAG 2
ββββββββββββββββββ βββββββββββββ βββββββ¬βββββββ
β
sh4d0wF4NG liked track β
β
ββββββββββββββββββββββββββββββββββββββββββ
β
βΌ
TASK 3 β 3rd Operator
βββββββββββββββ ββββββββββ ββββββββββββββββ
β sh4d0wF4NG ββββββΆβ GitHub ββββββΆβ Commit Diffs βββββββββββββββΆ π© FLAG 3
βββββββββββββββ ββββββββββ ββββββββ¬ββββββββ
β
βΌ
βββββββββββββββββββ
β Leaked .tfstate β
βββββββββββββββββββ
β Region: Sydney β
β EC2: evilginx β
β IP: 13.210.88.* β
βββββββββββββββββββ
ββ Legend ββββββββββββββββββββββββββββββββββββββ
βββββΆ Platform pivot β Cross-task pivot
Task 1: Social media trail
Task 2: Audio OSINT (SoundCloud recording)
Task 3: Code OSINT (GitHub commit history)