<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CrimsonVector — Criminal Infrastructure</title>
    <link>https://crimsonvector.com</link>
    <description>Investigations into bulletproof hosting ecosystems and criminal infrastructure operators.</description>
    <language>en-us</language>
    <lastBuildDate>Thu, 09 Apr 2026 00:00:00 GMT</lastBuildDate>
    <atom:link href="https://crimsonvector.com/rss/infrastructure.xml" rel="self" type="application/rss+xml"/>

    <item>
      <title>1,435 Domains in 30 Days: How Fraud Actors Weaponized the 2026 Oil Shock</title>
      <link>https://crimsonvector.com/research/oil-shock-crisis-fraud-2026/</link>
      <guid isPermaLink="true">https://crimsonvector.com/research/oil-shock-crisis-fraud-2026/</guid>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <description>Within weeks of the Strait of Hormuz closure, threat actors registered 1,435 crisis-themed domains — impersonating government subsidies, spinning up fake oil trading platforms, and squatting on Hormuz-related keywords.</description>
      <author>dparra@crimsonvector.com (Diego Parra)</author>
      <category>infrastructure</category>
    </item>

    <item>
      <title>From Ransom Note to Binance: Tracing a 3-Year Elasticsearch Extortion Operation Across Two Blockchains</title>
      <link>https://crimsonvector.com/research/ransomnote-blockchain-trace-2026/</link>
      <guid isPermaLink="true">https://crimsonvector.com/research/ransomnote-blockchain-trace-2026/</guid>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <description>A single Bitcoin address from an automated database ransom attack is traced through 14 investigative phases across Bitcoin and Ethereum, uncovering a 3-year criminal operation with 307 victim-facing multisig wallets and a Binance-centric circular financial loop processing 107+ BTC.</description>
      <author>dparra@crimsonvector.com (Diego Parra)</author>
      <category>infrastructure</category>
      <category>sanctions-evasion</category>
    </item>

    <item>
      <title>From Lighthouse to Landfall: A Billion-Dollar Chinese Smishing Syndicate Still Hitting American Inboxes</title>
      <link>https://crimsonvector.com/research/lighthouse-smishing-syndicate-2026/</link>
      <guid isPermaLink="true">https://crimsonvector.com/research/lighthouse-smishing-syndicate-2026/</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate>
      <description>Three smishing specimens received over nine days reveal real-time template evolution and operational diversification by the Lighthouse phishing kit, operated by the China-based Smishing Triad.</description>
      <author>dparra@crimsonvector.com (Diego Parra)</author>
      <category>infrastructure</category>
    </item>

    <item>
      <title>Inside a 5-Hop Phishing Chain That Landed in My Primary Inbox</title>
      <link>https://crimsonvector.com/research/starbucks-yeti-phishing-2026/</link>
      <guid isPermaLink="true">https://crimsonvector.com/research/starbucks-yeti-phishing-2026/</guid>
      <pubDate>Sun, 08 Mar 2026 00:00:00 GMT</pubDate>
      <description>A Starbucks Yeti Rambler lure, five layered anti-spam evasion techniques, three Namecheap broker domains, and an affiliate scareware operation — all deobfuscated from a single email that Gmail trusted enough to put front and center.</description>
      <author>dparra@crimsonvector.com (Diego Parra)</author>
      <category>infrastructure</category>
    </item>

    <item>
      <title>Crypto Underground: State-Enabled Financial Crime in the Digital Age</title>
      <link>https://crimsonvector.com/research/crypto-underground-2026/</link>
      <guid isPermaLink="true">https://crimsonvector.com/research/crypto-underground-2026/</guid>
      <pubDate>Thu, 19 Jun 2025 00:00:00 GMT</pubDate>
      <description>How cryptocurrency, underground banking, and state-sponsored illicit finance converge — from Russia's crypto laundromats and Chinese money brokers laundering for North Korea, to an FSB spy paid in Bitcoin and a U.S.-based crypto firm funneling $530 million for sanctioned Russian banks.</description>
      <author>dparra@crimsonvector.com (Diego Parra)</author>
      <category>infrastructure</category>
      <category>sanctions-evasion</category>
    </item>

  </channel>
</rss>
