Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      Trump’s AI plan says a lot about open source – but here’s what it leaves out

      July 25, 2025

      Google’s new Search mode puts classic results back on top – how to access it

      July 25, 2025

      These AR swim goggles I tested have all the relevant metrics (and no subscription)

      July 25, 2025

      Google’s new AI tool Opal turns prompts into apps, no coding required

      July 25, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Medical Card Generator Android App Project Using SQLite

      July 26, 2025
      Recent

      Medical Card Generator Android App Project Using SQLite

      July 26, 2025

      The details of TC39’s last meeting

      July 26, 2025

      Laravel Scoped Route Binding for Nested Resource Management

      July 25, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft: Windows 11 24H2 now works with Easy Anti-Cheat (Fortnite), won’t cause BSODs anymore

      July 26, 2025
      Recent

      Microsoft: Windows 11 24H2 now works with Easy Anti-Cheat (Fortnite), won’t cause BSODs anymore

      July 26, 2025

      How to Restore MSN Homepage Fast

      July 26, 2025

      How to Connect to Hilton WiFi

      July 26, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»4-Year Investigation Leads to Arrest of Alleged XSS Cybercrime Forum Admin

    4-Year Investigation Leads to Arrest of Alleged XSS Cybercrime Forum Admin

    July 23, 2025

    XSS Forum, xss.is,

    After a four-year long manhunt for the operators of XSS, one of the most popular and longest-running Russian-language cybercrime forums, authorities finally broke through this week, with an arrest of one of its alleged administrators in Ukraine. The forum was popular among cybercriminals for the sale of various malware code, access to compromised systems, stolen data, and ransomware-related services.

    The investigation into the forum’s operations began in July 2021 when one of the encrypted Jabber messaging servers – thesecure[.]biz – first came under the French law enforcement’s scanner. This jabber server was used by XSS forum for anonymous messaging between users registered on its platform.

    “The intercepted messages revealed numerous illicit cybercrime and ransomware activities, and established that they had generated at least $7 million in profit,” the Public Prosecutor’s Office in Paris said.

    Along with the XSS forum, the suspect is also believed to have run thesecure[.]biz jabber server service.

    Europol coordinated the operation between the French and Ukrainian authorities and revealed that the arrested individual was not only a technical administrator but also acted as a trusted third-party arbitrator to settle disputes between cybercriminals and guaranteed secure transactions.

    Investigations suggested the suspect has been active in the underground ecosystem for nearly two decades, and has had links to several major threat actors over the years. He also likely made millions through advertising and facilitation fees.

    XSS Forum’s Cybercriminal Link

    XSS forum has been active since 2013 and had around 50,000 registered users. It was formerly known as “DaMaGeLaB” which became operational in 2004, as per researchers at Searchlight Cyber. The forum was likely rebranded from DaMaGeLaB to XSS, as one of its administrators who was also involved in the operation of the Andromeda botnet, was arrested a year before.

    XSS forum looked like any other professional platform with well defined sections on hacking, corporate access, database leaks, and even competitive intelligence, researchers said. The forum had previously also acted as a recruitment and PR tool for Ransomware-as-a-Service (RaaS) providers. However, researchers say such content was “banned” time and again to not attract unwanted attention from law enforcement.

    The forum also trialed an “XSSBot“ in 2023. Researchers suspect the chatbot was powered by ChatGPT and users could potentially ask for details such as information about different malware strains, tips on code obfuscation, etc.

    Main Site Down, But…

    The main forum domain xss[.]is currently displays a seizure notice but a tweet from a platform X user under the moniker @3xp0rtblog, who claims to be a cybersecurity analyst at Prodaft said, “the backup domain xss[.]as, the .onion site, and the Jabber service at thesecure[.]biz are still online and functioning.”

    XSS Forum, XSS Cybercrime Forum, XSS Forum Seizure Notice
    Seizure notice on xss.is domain (Image: The Cyber Express)

    @3xp0rt also added that the XSS community is actively discussing the current scenario on the forum. The X user revealed that the moderators were deleting all content where the admin name LARVA-27 was being discussed. “This was confirmed in a Telegram chat by moderator LARVA-466 (Rehub),” he said. “The goal is to suppress any narrative that could turn the situation into a newsworthy event and to ‘troll’ Westerners in the process.”

    The latest arrest is a part of a broader crackdown on cybercrime ecosystems in Europe. Last month, the French authorities arrested the alleged administrator, known under the moniker “IntelBroker,” of another prolific underground marketplace: BreachForums. The French police arrested four other individuals mostly in their twenties, who they said were complicit in handling the forum’s operations.

    Updated on July 23, 07:20 PM: The article was updated with additional information on the seizure of the main domain xss[.]is and details of forum discussion from X user @3xp0rtblog.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleUK to ban public sector from paying ransomware demands
    Next Article New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials

    Related Posts

    Machine Learning

    How to Evaluate Jailbreak Methods: A Case Study with the StrongREJECT Benchmark

    July 26, 2025
    Machine Learning

    RoboBrain 2.0: The Next-Generation Vision-Language Model Unifying Embodied AI for Advanced Robotics

    July 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    July 2025 Patch Tuesday forecast: Take a break from the grind

    Security

    CVE-2024-49350 – IBM Db2 Denial of Service Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-44865 – Tenda W20E Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Rilasciata Deepin 25: La distribuzione GNU/Linux immutabile con assistente vocale e pacchetti universali

    Linux

    Highlights

    CVE-2025-4355 – Tenda DAP-1520 Heap-Based Buffer Overflow Vulnerability

    May 6, 2025

    CVE ID : CVE-2025-4355

    Published : May 6, 2025, 1:15 p.m. | 1 hour, 44 minutes ago

    Description : A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02. It has been classified as critical. This affects the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas

    May 30, 2025

    How to share files with sensitive content securely on Windows 11

    April 17, 2025

    Disaster Recovery and Business Continuity Plan

    April 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.