IntelEye

Contact us

Blog

Press

Latest Post Image

DE-ANONYMIZING A NEW BANGLADESHI THREAT ACTOR

Shay M

December 1, 2024

Background

In April 2024, a new Threat Actor, "Team ARXU” emerged.
This hacktivist group from Bangladesh allegiances with the “Matryoshka 424” group. The group mainly targets Israeli infrastructure, with attacks ranging from DDoS to defacements or Data Leaks.

Post ImagePost ImagePost ImagePost Image

THE HUNT: A COMPLETE OPSEC FAILURE

The investigation began with the Telegram group @teamARXU. Searching through the group’s activity did not reveal anything unique, they share their hacks, tools, and general messages or information. We also collected another Telegram profile: @A0R3A

Post Image

Using the username @A0R3A, and simple Dorks, our team found a GitHub profile named Arxuishere – A0R3A, claiming to be the Admin of Team ARXU. The profile is sharing all the links to their Telegram groups.

Post Image

While searching the repositories did not reveal anything. However, when looking through the followers of this profile we can only observe one user following the page under the username ArafatArxu which coincidently also uses the keyword “arxu”.

Post Image

Analyzing this new profile allowed us to collect a lot of information to connect users directly to Team ARXU, such as the repositories “ARXU_BOMBER” or a link to the @A0R3A telegram group, allowing us to validate and correlate with certainty.

Post ImagePost Image

On the Bio of the GitHub profile, the user also shared a link to a WordPress domain h43ckerarzu.wordpress.com.

Post Image

This website clearly is the early stage or version of team ARXU, simple and poorly secured. The website does not provide us with critical data apart from one single piece of information, the domain name: h43ckerarzu. This OPSEC mistake allowed us to find the individual behind the group.

Post Image

Using this new identifier or potential username, we performed a simple Google Dork, which led us to a Facebook post, in a group, by a specific user, with a name that sounds familiar: Arafat Arzu.

Post Image

In the post, Arafat Arzu is sharing one of his defacements, where the picture shows the signature 4RXU15H3R3 aka ARXU IS HERE.

Post Image

Finally, when analyzing Arafat Arzu’s profile, we get the last piece of relevant data, the username in the URL: Arafatarxu, which is the same username as on the second GitHub profile.

Post Image

To validate and confirm the link between the Facebook profile and teamARXU, we analyzed some of the comments under the posts. In one of them, Arafat Arzu answers someone asking “send the script” by posting said script as well as a website h43ckerarzu.wixsite.com/h43ckerarzu-3.
On his website, he put a link to the @A0R3A Telegram Group.

Post ImagePost Image

On the website, we collected 2 emails, "4rxu@duck[.]com", and "rarafat735@proton[.]me". The last email is the critical information. This email is registered to the GitHub page "https://github.com/Arxuishere". And a Microsoft profile A0R3A Arxu.

Post Image
IntelEye