DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Has a security researcher been scared away?

Posted on April 20, 2022 by Dissent

The Twitter account of a researcher known on Twitter as @ido_cohen2 is gone and their DarkFeed.io site has an “under maintenance” notice for the past day. According to a source, they have been scared away for good. Have they been?

Over the past months, DataBreaches.net has occasionally been contacted by someone who appears to be a Russian threat actor. Some of the info offered by this individual has not seemed credible, but some of it has been, and a recent interaction may have predicted what happened in the past 24 hours.

On April 12, this source mentioned “ido_cohen2” to me in a Telegram chat. They (the source) informed me that someone was going to pay someone to use EDR requests on Twitter to get researchers’ account information.  In the following transcript, DD is “DissentDoe.” I’ve redacted the source’s name.

[Redacted]: if ur using a personal email on twitter
[Redacted]: might wanna change it 🙂
[Redacted]: same with phone

[DD]: why?

[Redacted]: you know this monkey

[DD]: Someone going to hack me?

[Redacted]: twitter.com/ido_cohen2
[Redacted]: ? he is getting a visit to his house

[DD]: What does that have to do with me?

[Redacted]: ur a researcher

[DD]: Yes.

[Redacted]: so theres ur answer

[DD]: So your asshole affiliate is going after all researchers?

[Redacted]: hint
[Redacted]:

[DD]: (pardon my language)

[Redacted]: 😉

[DD]:  I only use my domain/work … which are public.

[Redacted]: ok good
[Redacted]: twitter subpoenas ?
[Redacted]: idk why the affiliate is paying someone to do them

[DD]: Do you have any idea how many times Twitter has been subpoenaed about me? LOL….

[Redacted]: yes 😀

[Redacted]:so it doesnt matter for u
[Redacted]: know any researchers
[Redacted]: who need to be unmasked

This morning, the same source messaged me:

[Redacted]: your friend @ido_cohen2
[Redacted]: was scared away ?
[Redacted]: he is gone for good

This was not the first time, though, that ido_cohen2’s username came up in the context of some threat actors really hating him. When DataBreaches reported on a scam letter allegedly drafted by Groove, this site  did not report the researchers’ names that they used. One of them was ido_cohen2’s Twitter identity. DataBreaches reached out to him at the time to alert him that scammers might be using his name as part of their scam.

So… has ido_cohen2 really been scared away, and for good?  We’ll see. I tend to doubt it, but it will be interesting to learn if there really was an attempt to use an EDR (Emergency Data Request) on Twitter to get researchers’ information.

This post was edited post-publication for safety reasons.

Category: Breach Incidents

Post navigation

← Sunwing president apologizes to stranded passengers, says outage result of cyberattack
Unified Government of Wyandotte County and Kansas City Hit by Cybersecurity Attack Over Holiday Weekend →

2 thoughts on “Has a security researcher been scared away?”

  1. Denis says:
    April 22, 2022 at 3:52 am

    So.. I think Twitter has not received a lot of EDR request about ido_cohen2 Twitter profile, so it could be easy determinate which law enforcement operator works for cyber crime entities.. because only LE can ask for EDR.. I suppose

    1. Dissent says:
      April 22, 2022 at 10:21 am

      I think you do not understand how this works. No, law enforcement is not working for any cybercrime entity. The threat actors are filing EDR forms, posing as law enforcement agents. They are counting on the requests not being verified as carefully because of the alleged “emergency.”

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • UBS reports data leak after cyber attack on provider, client data unaffected
  • Scania confirms insurance claim data breach in extortion attempt

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.