Research

Investigative writeups, threat intelligence analysis, and technical research into fraud infrastructure, adversary techniques, and the systems that enable organized cybercrime.

Published
March 8, 2026 Threat Intelligence Phishing

Inside a 5-Hop Phishing Chain That Landed in My Primary Inbox

A Starbucks Yeti Rambler lure, five layered anti-spam evasion techniques, three Namecheap broker domains, and an affiliate scareware operation — all deobfuscated from a single email that Gmail trusted enough to put front and center.

Read analysis