Identity of Notorious Hacker USDoD Revealed

Identity of Notorious Hacker USDoD Revealed

August 27, 2024 at 06:24AM

Notorious hacker USDoD, also known as EquationCorp, is believed to be Luan B.G., a 33-year-old man from Brazil. Investigations by CrowdStrike and Predicta Lab uncovered his true identity and links between his online personas and social media profiles. USDoD has leaked data from various organizations, but some of his claims were found to be exaggerated. He may seek a deal with Brazilian authorities and faces potential legal action.

Key Takeaways from Meeting Notes:

1. The notorious hacker known as USDoD, also called EquationCorp, has been identified as Luan B.G., a 33-year-old man from Minas Gerais, Brazil, by investigations conducted by CrowdStrike, Predicta Lab, and Brazilian publication TecMundo.

2. Numerous data breaches have been attributed to USDoD over the past few years, targeting major organizations such as the FBI’s InfraGard portal, Airbus, TransUnion, National Public Data (NPD), and even CrowdStrike.

3. Despite confirming some data breaches, it has been noted that some of USDoD’s claims may have been exaggerated.

4. Evidence collected by CrowdStrike and Predicta Lab reveals that the hacker’s true identity was poorly hidden, with links easily found between the hacker’s online personas and personal profiles on various social media platforms.

5. The hacker has confirmed his true identity after being identified, and has suggested a willingness to engage with Brazilian authorities and offer his cybersecurity expertise.

6. While there is a possibility of facing charges in the US and Brazil due to his activities, it has been noted that Luan may influence a more lenient legal approach focused on rehabilitation due to his desire to reform.

7. SOCRadar has highlighted USDoD’s reliance on social engineering and stolen credentials through malware to access sensitive data from government and private organizations.

These takeaways summarize the key points of the meeting notes, highlighting the identification of the hacker, his previous activities, and his potential future actions in dealing with the consequences of his actions.

Full Article