{"id":71534,"date":"2026-02-16T11:48:27","date_gmt":"2026-02-16T11:48:27","guid":{"rendered":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/"},"modified":"2026-02-16T11:48:27","modified_gmt":"2026-02-16T11:48:27","slug":"hackers-made-death-threats-against-this-security-researcher-big-mistake","status":"publish","type":"post","link":"https:\/\/youzum.net\/it\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/","title":{"rendered":"Hackers made death threats against this security researcher. Big mistake."},"content":{"rendered":"<p>The threats started in spring.\u00a0<\/p>\n<p>In April 2024, a mysterious someone using the online handles \u201cWaifu\u201d and \u201cJudische\u201d began posting death threats on Telegram and Discord channels aimed at a cybersecurity researcher named Allison Nixon.\u00a0<\/p>\n<p>\u201cAlison [sic] Nixon is gonna get necklaced with a tire filled with gasoline soon,\u201d wrote Waifu\/Judische, both of which are words with offensive connotations. \u201cDecerebration is my fav type of brain death, thats whats gonna happen to alison Nixon.\u201d\u00a0<\/p>\n<p>It wasn\u2019t long before others piled on. Someone shared AI-generated nudes of Nixon.<\/p>\n<p>These anonymous personas targeted Nixon because she had become a formidable threat: As chief research officer at the cyber investigations firm Unit 221B, named after Sherlock Holmes\u2019s apartment, she had built a career tracking cybercriminals and helping get them arrested. For years she had lurked quietly in online chat channels or used pseudonyms to engage with perpetrators directly while piecing together clues they\u2019d carelessly drop about themselves and their crimes. This had helped her bring to justice a number of cybercriminals\u2014especially members of a loosely affiliated subculture of anarchic hackers who call themselves the Com.<\/p>\n<p>But members of the Com aren\u2019t just involved in hacking; some of them also engage in offline violence against researchers who track them. This includes bricking (throwing a brick through a victim\u2019s window) and swatting (a dangerous type of hoax that involves reporting a false murder or hostage situation at someone\u2019s home so SWAT teams will swarm it with guns drawn). Members of a Com offshoot known as 764 have been accused of even more violent acts\u2014including animal torture, stabbings, and school shootings\u2014or of inciting others in and outside the Com to commit these crimes.<\/p>\n<p>Nixon started tracking members of the community more than a decade ago, when other researchers and people in law enforcement were largely ignoring them because they were young\u2014many in their teens. Her early attention allowed her to develop strategies for unmasking them.<\/p>\n<p>Ryan Brogan, a special agent with the FBI, says Nixon has helped him and colleagues identify and arrest more than two dozen members of the community since 2011, when he first began working with her, and that her skills in exposing them are unparalleled. \u201cIf you get on Allison\u2019s and my radar, you\u2019re going [down]. It\u2019s just a matter of time,\u201d he says. \u201cNo matter how much digital anonymity and tradecraft you try to apply, you\u2019re done.\u201d<\/p>\n<p>Though she\u2019d done this work for more than a decade, Nixon couldn\u2019t understand why the person behind the Waifu\/Judische accounts was suddenly threatening her. She had given media interviews about the Com\u2014most recently on <em>60 Minutes<\/em>\u2014but not about her work unmasking members to get them arrested, so the hostility seemed to come out of the blue. And although she had taken an interest in the Waifu persona in years past for crimes he boasted about committing, he hadn\u2019t been on her radar for a while when the threats began, because she was tracking other targets.\u00a0<\/p>\n<p>Now Nixon resolved to unmask Waifu\/Judische and others responsible for the death threats\u2014and take them down for crimes they admitted to committing. \u201cPrior to them death-threatening me, I had no reason to pay attention to them,\u201d she says.\u00a0<\/p>\n<h3 class=\"wp-block-heading\">Com beginnings<\/h3>\n<p>Most people have never heard of the Com, but its influence and threat are growing.<\/p>\n<p>It\u2019s an online community comprising loosely affiliated groups of, primarily, teens and twentysomethings in North America and English-speaking parts of Europe who have become part of what some call a cybercrime youth movement.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>International laws and norms, and fears of retaliation, prevent states from going all out in cyber operations. That doesn\u2019t stop the anarchic Com.<\/strong><\/p>\n<\/blockquote>\n<p>Over the last decade, its criminal activities have escalated from simple distributed denial-of-service (DDoS) attacks that disrupt websites to SIM-swapping hacks that hijack a victim\u2019s phone service, as well as crypto theft, ransomware attacks, and corporate data theft. These crimes have affected AT&amp;T, Microsoft, Uber, and others. Com members have also been involved in various forms of sextortion aimed at forcing victims to physically harm themselves or record themselves doing sexually explicit activities. The Com\u2019s impact has also spread beyond the digital realm to kidnapping, beatings, and other violence.\u00a0<\/p>\n<p>One longtime cybercrime researcher, who asked to remain anonymous because of his work, says the Com is as big a threat in the cyber realm as Russia and China\u2014for one unusual reason.<\/p>\n<p>\u201cThere\u2019s only so far that China is willing to go; there\u2019s only so far that Russia or North Korea is willing to go,\u201d he says, referring to international laws and norms, and fears of retaliation, that prevent states from going all out in cyber operations. That doesn\u2019t stop the anarchic Com, he says.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" height=\"2000\" width=\"1429\" src=\"https:\/\/wp.technologyreview.com\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska.jpg?w=1429\" alt='\"\"' class=\"wp-image-1132662\" \/>\n<div class=\"image-credit\">FRANZISKA BARCZYK<\/div>\n<\/figure>\n<\/div>\n<p>\u201cIt is a pretty significant threat, and people tend to \u2026 push it under the rug [because] it\u2019s just a bunch of kids,\u201d he says. \u201cBut look at the impact [they have].\u201d<\/p>\n<p>Brogan says the amount of damage they do in terms of monetary losses \u201ccan become staggering very quickly.\u201d<\/p>\n<p>There is no single site where Com members congregate; they spread across a number of web forums and Telegram and Discord channels. The group follows a long line of hacking and subculture communities that emerged online over the last two decades, gained notoriety, and then faded or vanished after prominent members were arrested or other factors caused their decline. They differed in motivation and activity, but all emerged from \u201cthe same primordial soup,\u201d says Nixon. The Com\u2019s roots can be traced to the Scene, which began as a community of various \u201cwarez\u201d groups engaged in pirating computer games, music, and movies.<\/p>\n<p>When Nixon began looking at the Scene, in 2011, its members were hijacking gaming accounts, launching DDoS attacks, and running booter services. (DDoS attacks overwhelm a server or computer with traffic from bot-controlled machines, preventing legitimate traffic from getting through; booters are tools that anyone can rent to launch a DDoS attack against a target of choice.) While they made some money, their primary goal was notoriety.<\/p>\n<p>This changed around 2018. Cryptocurrency values were rising, and the Com\u2014or the Community, as it sometimes called itself\u2014emerged as a subgroup that ultimately took over the Scene. Members began to focus on financial gain\u2014cryptocurrency theft, data theft, and extortion.<\/p>\n<p>The pandemic two years later saw a surge in Com membership that Nixon attributes to social isolation and the forced movement of kids online for schooling. But she believes economic conditions and socialization problems have also driven its growth. Many Com members can\u2019t get jobs because they lack skills or have behavioral issues, she says. A number who have been arrested have had troubled home lives and difficulty adapting to school, and some have shown signs of mental illness. The Com provides camaraderie, support, and an outlet for personal frustrations. Since 2018, it has also offered some a solution to their money problems.<\/p>\n<p>Loose-knit cells have sprouted from the community\u2014Star Fraud, ShinyHunters, Scattered Spider, Lapsus$\u2014to collaborate on clusters of crime. They usually target high-profile crypto bros and tech giants and have made millions of dollars from theft and extortion, according to court records.\u00a0<\/p>\n<p>But dominance, power, and bragging rights are still motivators, even in profit operations, says the cybercrime researcher, which is partly why members target \u201cbig whales.\u201d<\/p>\n<p>\u201cThere is financial gain,\u201d he says, \u201cbut it\u2019s also [sending a message that] I can reach out and touch the people that think they\u2019re untouchable.\u201d In fact, Nixon says, some members of the Com have overwhelming ego-driven motivations that end up conflicting with their financial motives.<\/p>\n<p>\u201cOften their financial schemes fall apart because of their ego, and that phenomenon is also what I\u2019ve made my career on,\u201d she says.<\/p>\n<h3 class=\"wp-block-heading\">The hacker hunter emerges<\/h3>\n<p>Nixon has straight dark hair, wears wire-rimmed glasses, and has a slight build and bookish demeanor that, on first impression, could allow her to pass for a teen herself. She talks about her work in rapid cadences, like someone whose brain is filled with facts that are under pressure to get out, and she exudes a sense of urgency as she tries to make people understand the threat the Com poses. She doesn\u2019t suppress her happiness when someone she\u2019s been tracking gets arrested.<\/p>\n<p>In 2011, when she first began investigating the communities from which the Com emerged, she was working the night shift in the security operations center of the security firm SecureWorks. The center responded to tickets and security alerts emanating from customer networks, but Nixon coveted a position on the company\u2019s counter-threats team, which investigated and published threat-intelligence reports on mostly state-sponsored hacking groups from China and Russia. Without connections or experience, she had no path to investigative work. But Nixon is an intensely curious person, and this created its own path.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1925\" height=\"1925\" src=\"https:\/\/wp.technologyreview.com\/wp-content\/uploads\/2026\/02\/GROUP-SHOTS-10267_v2.edit_.jpg\" alt=\"Allison Nixon\" class=\"wp-image-1132672\" \/><figcaption class=\"wp-element-caption\">Allison Nixon is chief research officer at the cybersecurity investigations firm Unit 221B, where she tracks cybercriminals and helps bring them to justice.<\/figcaption><div class=\"image-credit\">YLVA EREVALL<\/div>\n<\/figure>\n<\/div>\n<p>Where the threat team focused on the impact hackers had on customer networks\u2014how they broke in, what they stole\u2014Nixon was more interested in their motivations and the personality traits that drove their actions. She assumed there must be online forums where criminal hackers congregated, so she googled \u201chacking forums\u201d and landed on a site called Hack Forums.<\/p>\n<p>\u201cIt was really stupid simple,\u201d she says.<\/p>\n<p>She was surprised to see members openly discussing their crimes there. She reached out to someone on the SecureWorks threat team to see if he was aware of the site, and he dismissed it as a place for \u201cscript kiddies\u201d\u2014a pejorative term for unskilled hackers.<\/p>\n<p>This was a time when many cybersecurity pros were shifting their focus away from cybercrime to state-sponsored hacking operations, which were more sophisticated and getting a lot of attention. But Nixon likes to zig where others zag, and her colleague\u2019s dismissiveness fueled her interest in the forums. Two other SecureWorks colleagues shared that interest, and the three studied the forums during downtime on their shifts. They focused on trying to identify the people running DDoS booters.\u00a0<\/p>\n<p>What Nixon loved about the forums was how accessible they were to a beginner like herself. Threat-intelligence teams require privileged access to a victim\u2019s network to investigate breaches. But Nixon could access everything she needed in the public forums, where the hackers seemed to think no one was watching. Because of this, they often made mistakes in operational security, or OPSEC\u2014letting slip little biographical facts such as the city where they lived, a school they attended, or a place they used to work. These details revealed in their chats, combined with other information, could help expose the real identities behind their anonymous masks.\u00a0<\/p>\n<p>\u201cIt was a shock to me that it was relatively easy to figure out who [they were],\u201d she says.\u00a0<\/p>\n<p>She wasn\u2019t bothered by the immature boasting and petty fights that dominated the forums. \u201cA lot of people don\u2019t like to do this work of reading chat logs. I realize that this is a very uncommon thing. And maybe my brain is built a little weird that I\u2019m willing to do this,\u201d she says. \u201cI have a special talent that I can wade through garbage and it doesn\u2019t bother me.\u201d\u00a0<\/p>\n<p>Nixon soon realized that not all the members were script kiddies. Some exhibited real ingenuity and \u201cpowerful\u201d skills, she says, but because they were applying these to frivolous purposes\u2014hijacking gamer accounts instead of draining bank accounts\u2014researchers and law enforcement were ignoring them. Nixon began tracking them, suspecting that they would eventually direct their skills at more significant targets\u2014an intuition that proved to be correct. And when they did, she had already amassed a wealth of information about them.\u00a0<\/p>\n<p>She continued her DDoS research for two years until a turning point in 2013, when the cybersecurity journalist Brian Krebs, who made a career tracking cybercriminals, got swatted.\u00a0<\/p>\n<p>About a dozen people from the security community worked with Krebs to expose the perpetrator, and Nixon was invited to help. Krebs sent her pieces of the puzzle to investigate, and eventually the group identified the culprit (though it would take two years for him to be arrested). When she was invited to dinner with Krebs and the other investigators, she realized she\u2019d found her people.<\/p>\n<p>\u201cIt was an amazing moment for me,\u201d she says. \u201cI was like, wow, there\u2019s all these like-minded people that just want to help and are doing it just for the love of the game, basically.\u201d<\/p>\n<h3 class=\"wp-block-heading\">Staying one step ahead<\/h3>\n<p>It was porn stars who provided Nixon with her next big research focus\u2014one that underscored her skill at spotting Com actors and criminal trends in their nascent stages, before they emerged as major threats.<\/p>\n<p>In 2018, someone was hijacking the social media accounts of certain adult-film stars and using those accounts to blast out crypto scams to their large follower bases. Nixon couldn\u2019t figure out how the hackers had hijacked the social media profiles, but she promised to help the actors regain access to their accounts if they agreed to show her the private messages the hackers had sent or received during the time they controlled them. These messages led her to a forum where members were talking about how they stole the accounts. The hackers had tricked some of these actors into disclosing the mobile phone numbers of others. Then they used a technique called SIM swapping to reset passwords for social media accounts belonging to those other stars, locking them out.\u00a0<\/p>\n<p>In SIM swapping, fraudsters get a victim\u2019s phone number assigned to a SIM card and phone <em>they<\/em> control, so that calls and messages intended for the victim go to them instead. This includes one-time security codes that sites text to account holders to verify themselves when accessing their account or changing its password. In some of the cases involving the porn stars, the hackers had manipulated telecom workers into making the SIM swaps for what they thought were legitimate reasons, and in other cases they bribed the workers to make the change. The hackers were then able to alter the password on the actors\u2019 social media accounts, lock out the owners, and use the accounts to advertise their crypto scams.\u00a0<\/p>\n<p>SIM swapping is a powerful technique that can be used to hijack and drain entire cryptocurrency and bank accounts, so Nixon was surprised to see the fraudsters using it for relatively unprofitable schemes. But SIM swapping had rarely been used for financial fraud at that point, and like the earlier hackers Nixon had seen on Hack Forums, the ones hijacking porn star accounts didn\u2019t seem to grasp the power of the technique they were using. Nixon suspected that this would change and SIM swapping would soon become a major problem, so she shifted her research focus accordingly. It didn\u2019t take long for the fraudsters to pivot as well.<\/p>\n<p>Nixon\u2019s skill at looking ahead in this way has served her throughout her career. On multiple occasions a hacker or hacking group would catch her attention\u2014for using a novel hacking approach in some minor operation, for example\u2014and she\u2019d begin tracking their online posts and chats in the belief that they\u2019d eventually do something significant with that skill.\u00a0<\/p>\n<p>They usually did. When they later grabbed headlines with a showy or impactful operation, these hackers would seem to others to have emerged from nowhere, sending researchers and law enforcement scrambling to understand who they were. But Nixon would already have a dossier compiled on them and, in some cases, had unmasked their real identity as well. Lizard Squad was an example of this. The group burst into the headlines in 2014 and 2015 with a series of high-profile DDoS campaigns, but Nixon and colleagues at the job where she worked at the time had already been watching its members as individuals for a while. So the FBI sought their assistance in identifying them.<\/p>\n<p>\u201cThe thing about these young hackers is that they \u2026 keep going until they get arrested, but it takes years for them to get arrested,\u201d she says. \u201cSo a huge aspect of my career is just sitting on this information that has not been actioned [yet].\u201d<\/p>\n<p>It was during the Lizard Squad years that Nixon began developing tools to scrape and record hacker communications online, though it would be years before she began using these concepts to scrape the Com chatrooms and forums. These channels held a wealth of data that might not seem useful during the nascent stage of a hacker\u2019s career but could prove critical later, when law enforcement got around to investigating them; yet the contents were always at risk of being deleted by Com members or getting taken down by law enforcement when it seized websites and chat channels.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Nixon\u2019s work is unique because she engages with the actors in chat spaces to draw out information from them that \u201cwould not be otherwise normally available.\u201d<\/strong><\/p>\n<\/blockquote>\n<p>Over several years, she scraped and preserved whatever chatrooms she was investigating. But it wasn\u2019t until early 2020, when she joined Unit 221B, that she got the chance to scrape the Telegram and Discord channels of the Com. She pulled all of this data together into a searchable platform that other researchers and law enforcement could use. The company hired two former hackers to help build scraping tools and infrastructure for this work; the result is eWitness, a community-driven, invitation-\u00adonly platform. It was initially seeded only with data Nixon had collected after she arrived at Unit 221B, but has since been augmented with data that other users of the platform have scraped from Com social spaces as well, some of which doesn\u2019t exist in public forums anymore.<\/p>\n<p>Brogan, of the FBI, says it\u2019s an incredibly valuable tool, made more so by Nixon\u2019s own contributions. Other security firms scrape online criminal spaces as well, but they seldom share the content with outsiders, and Brogan says Nixon\u2019s work is unique because she engages with the actors in chat spaces to draw out information from them that \u201cwould not be otherwise normally available.\u201d\u00a0<\/p>\n<p>The preservation project she started when she got to Unit 221B could not have been better timed, because it coincided with the pandemic, the surge in new Com membership, and the emergence of two disturbing Com offshoots, CVLT and 764. She was able to capture their chats as these groups first emerged; after law enforcement arrested leaders of the groups and took control of the servers where their chats were posted, this material went offline.<\/p>\n<p>CVLT\u2014pronounced \u201ccult\u201d\u2014was reportedly founded around 2019 with a focus on sextortion and child sexual abuse material. 764 emerged from CVLT and was spearheaded by a 15-year-old in Texas named Bradley Cadenhead, who named it after the first digits of his zip code. Its focus was extremism and violence.\u00a0<\/p>\n<p>In 2021, because of what she observed in these groups, Nixon turned her attention to sextortion among Com members.<\/p>\n<p>The type of sextortion they engaged in has its roots in activity that began a decade ago as \u201cfan signing.\u201d Hackers would use the threat of doxxing to coerce someone, usually a young female, into writing the hacker\u2019s handle on a piece of paper. The hacker would use a photo of it as an avatar on his online accounts\u2014a kind of trophy. Eventually some began blackmailing victims into writing the hacker\u2019s handle on their face, breasts, or genitals. With CVLT, this escalated even further; targets were blackmailed into carving a Com member\u2019s name into their skin or engaging in sexually explicit acts while recording or livestreaming themselves.<\/p>\n<p>During the pandemic a surprising number of SIM swappers crossed into child sexual abuse material and sadistic sextortion, according to Nixon. She hates tracking this gruesome activity, but she saw an opportunity to exploit it for good. She had long been frustrated at how leniently judges treated financial fraudsters because of their crimes\u2019 seemingly nonviolent nature. But she saw a chance to get harsher sentences for them if she could tie them to their sextortion and began to focus on these crimes.\u00a0<\/p>\n<p>At this point, Waifu still wasn\u2019t on her radar. But that was about to change.<\/p>\n<h3 class=\"wp-block-heading\">Endgame<\/h3>\n<p>Nixon landed in Waifu\u2019s crosshairs after he and fellow members of the Com were involved in a large hack involving AT&amp;T customer call records in April 2024.<\/p>\n<p>Waifu\u2019s group gained access to dozens of cloud accounts with Snowflake, a company that provides online data storage for customers. One of those customers had more than 50 billion call logs of AT&amp;T wireless subscribers stored in its Snowflake account.\u00a0<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>They tried to re-extort the telecom, threatening on social media to leak the records. They tagged the FBI in the post. \u201cIt\u2019s like they were begging to be investigated,\u201d says Nixon.<\/strong><\/p>\n<\/blockquote>\n<p>Among the subscriber records were call logs for FBI agents who were AT&amp;T customers. Nixon and other researchers believe the hackers may have been able to identify the phone numbers of agents through other means. Then they may have used a reverse-lookup program to identify the owners of phone numbers that the agents called or that called them and found Nixon\u2019s number among them. This is when they began harassing her.<\/p>\n<p>But then they got reckless. They allegedly extorted nearly $400,000 from AT&amp;T in exchange for promising to delete the call records they\u2019d stolen. Then they tried to re-extort the telecom, threatening on social media to leak the records they claimed to have deleted if it didn\u2019t pay more. They tagged the FBI in the post.<\/p>\n<p>\u201cIt\u2019s like they were begging to be investigated,\u201d says Nixon.<\/p>\n<p>The Snowflake breaches and AT&amp;T records theft were grabbing headlines at the time, but Nixon had no idea her number was in the stolen logs or that Waifu\/Judische was a prime suspect in the breaches. So she was perplexed when he started taunting and threatening her online.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" height=\"2000\" width=\"1429\" src=\"https:\/\/wp.technologyreview.com\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-2-FINAL-franziska.jpg?w=1429\" alt='\"\"' class=\"wp-image-1132663\" \/>\n<div class=\"image-credit\">FRANZISKA BARCZYK<\/div>\n<\/figure>\n<\/div>\n<p>Over several weeks in May and June, a pattern developed. Waifu or one of his associates would post a threat against her and then post a message online inviting her to talk. She assumes now that they believed she was helping law enforcement investigate the Snowflake breaches and hoped to draw her into a dialogue to extract information from her about what authorities knew. But Nixon wasn\u2019t helping the FBI investigate them yet. It was only after she began looking at Waifu for the threats that she became aware of his suspected role in the Snowflake hack.<\/p>\n<p>It wasn\u2019t the first time she had studied him, though. Waifu had come to her attention in 2019 when he bragged about framing another Com member for a hoax bomb threat and later talked about his involvement in SIM-swapping operations. He made an impression on her. He clearly had technical skills, but Nixon says he also often appeared immature, impulsive, and emotionally unstable, and he was desperate for attention in his interactions with other members. He bragged about not needing sleep and using Adderall to hack through the night. He was also a bit reckless about protecting personal details. He wrote in private chats to another researcher that he would never get caught because he was good at OPSEC, but he also told the researcher that he lived in Canada\u2014which turned out to be true.<\/p>\n<p>Nixon\u2019s process for unmasking Waifu followed a general recipe she used to unmask Com members: She\u2019d draw a large investigative circle around a target and all the personas that communicated with that person online, and then study their interactions to narrow the circle to the people with the most significant connections to the target. Some of the best leads came from a target\u2019s enemies; she could glean a lot of information about their identity, personality, and activities from what the people they fought with online said about them.<\/p>\n<p>\u201cThe enemies and the ex-girlfriends, generally speaking, are the best [for gathering intelligence on a suspect],\u201d she says. \u201cI love them.\u201d<\/p>\n<p>While she was doing this, Waifu and his group were reaching out to other security researchers, trying to glean information about Nixon and what she might be investigating. They also attempted to plant false clues with the researchers by dropping the names of other cybercriminals in Canada who could plausibly be Waifu. Nixon had never seen cybercriminals engage in counterintelligence tactics like this.<\/p>\n<p>Amid this subterfuge and confusion, Nixon and another researcher working with her did a lot of consulting and cross-checking with other researchers about the clues they were gathering to ensure they had the right name before they gave it to the FBI.<\/p>\n<p>By July she and the researcher were convinced they had their guy: Connor Riley Moucka, a 25-year-old high school dropout living with his grandfather in Ontario. On October 30, Royal Canadian Mounted Police converged on Moucka\u2019s home and arrested him.<\/p>\n<p>According to an affidavit filed in Canadian court, a plainclothes Canadian police officer visited Moucka\u2019s house under some pretense on the afternoon of October 21, nine days before the arrest, to secretly capture a photo of him and compare it with an image US authorities had provided. The officer knocked and rang the bell; Moucka opened the door looking disheveled and told the visitor: \u201cYou woke me up, sir.\u201d He told the officer his name was Alex; Moucka sometimes used the alias Alexander Antonin Moucka. Satisfied that the person who answered the door was the person the US was seeking, the officer left. Waifu\u2019s online rants against Nixon escalated at this point, as did his attempts at misdirection. She believes the visit to his door spooked him.<\/p>\n<p>Nixon won\u2019t say exactly how they unmasked Moucka\u2014only that he made a mistake.<\/p>\n<p>\u201cI don\u2019t want to train these people in how to not get caught [by revealing his error],\u201d she says.<\/p>\n<p>The Canadian affidavit against Moucka reveals a number of other violent posts he\u2019s alleged to have made online beyond the threats he made against her. Some involve musings about becoming a serial killer or mass-mailing sodium nitrate pills to Black people in Michigan and Ohio; in another, his online persona talks about obtaining firearms to \u201ckill Canadians\u201d and commit \u201csuicide by cop.\u201d\u00a0<\/p>\n<p>Prosecutors, who list Moucka\u2019s online aliases as including Waifu, Judische, and two more in the indictment, say he and others extorted at least $2.5 million from at least three victims whose data they stole from Snowflake accounts. Moucka has been charged with nearly two dozen counts, including conspiracy, unauthorized access to computers, extortion, and wire fraud. He has pleaded not guilty and was extradited to the US last July. His trial is scheduled for October this year, though hacking cases usually end in plea agreements rather than going to trial.\u00a0<\/p>\n<p>It took months for authorities to arrest Moucka after Nixon and her colleague shared their findings with the authorities, but an alleged associate of his in the Snowflake conspiracy, a US Army soldier named Cameron John Wagenius (Kiberphant0m online), was arrested more quickly.\u00a0<\/p>\n<p>On November 10, 2024, Nixon and her team found a mistake Wagenius made that helped identify him, and on December 20 he was arrested. Wagenius has already pleaded guilty to two charges around the sale or attempted sale of confidential phone records and will be sentenced this March.<\/p>\n<p>These days Nixon continues to investigate sextortion among Com members. But she says that remaining members of Waifu\u2019s group still taunt and threaten her.<\/p>\n<p>\u201cThey are continuing to persist in their nonsense, and they are getting taken out one by one,\u201d she says. \u201cAnd I\u2019m just going to keep doing that until there\u2019s no one left on that side.\u201d\u00a0<\/p>\n<p><em>Kim Zetter is a journalist who covers cybersecurity and national security. She is the author of<\/em> <span>Countdown to Zero Day<\/span>.<\/p>","protected":false},"excerpt":{"rendered":"<p>The threats started in spring.\u00a0 In April 2024, a mysterious someone using the online handles \u201cWaifu\u201d and \u201cJudische\u201d began posting death threats on Telegram and Discord channels aimed at a cybersecurity researcher named Allison Nixon.\u00a0 \u201cAlison [sic] Nixon is gonna get necklaced with a tire filled with gasoline soon,\u201d wrote Waifu\/Judische, both of which are words with offensive connotations. \u201cDecerebration is my fav type of brain death, thats whats gonna happen to alison Nixon.\u201d\u00a0 It wasn\u2019t long before others piled on. Someone shared AI-generated nudes of Nixon. These anonymous personas targeted Nixon because she had become a formidable threat: As chief research officer at the cyber investigations firm Unit 221B, named after Sherlock Holmes\u2019s apartment, she had built a career tracking cybercriminals and helping get them arrested. For years she had lurked quietly in online chat channels or used pseudonyms to engage with perpetrators directly while piecing together clues they\u2019d carelessly drop about themselves and their crimes. This had helped her bring to justice a number of cybercriminals\u2014especially members of a loosely affiliated subculture of anarchic hackers who call themselves the Com. But members of the Com aren\u2019t just involved in hacking; some of them also engage in offline violence against researchers who track them. This includes bricking (throwing a brick through a victim\u2019s window) and swatting (a dangerous type of hoax that involves reporting a false murder or hostage situation at someone\u2019s home so SWAT teams will swarm it with guns drawn). Members of a Com offshoot known as 764 have been accused of even more violent acts\u2014including animal torture, stabbings, and school shootings\u2014or of inciting others in and outside the Com to commit these crimes. Nixon started tracking members of the community more than a decade ago, when other researchers and people in law enforcement were largely ignoring them because they were young\u2014many in their teens. Her early attention allowed her to develop strategies for unmasking them. Ryan Brogan, a special agent with the FBI, says Nixon has helped him and colleagues identify and arrest more than two dozen members of the community since 2011, when he first began working with her, and that her skills in exposing them are unparalleled. \u201cIf you get on Allison\u2019s and my radar, you\u2019re going [down]. It\u2019s just a matter of time,\u201d he says. \u201cNo matter how much digital anonymity and tradecraft you try to apply, you\u2019re done.\u201d Though she\u2019d done this work for more than a decade, Nixon couldn\u2019t understand why the person behind the Waifu\/Judische accounts was suddenly threatening her. She had given media interviews about the Com\u2014most recently on 60 Minutes\u2014but not about her work unmasking members to get them arrested, so the hostility seemed to come out of the blue. And although she had taken an interest in the Waifu persona in years past for crimes he boasted about committing, he hadn\u2019t been on her radar for a while when the threats began, because she was tracking other targets.\u00a0 Now Nixon resolved to unmask Waifu\/Judische and others responsible for the death threats\u2014and take them down for crimes they admitted to committing. \u201cPrior to them death-threatening me, I had no reason to pay attention to them,\u201d she says.\u00a0 Com beginnings Most people have never heard of the Com, but its influence and threat are growing. It\u2019s an online community comprising loosely affiliated groups of, primarily, teens and twentysomethings in North America and English-speaking parts of Europe who have become part of what some call a cybercrime youth movement.\u00a0 International laws and norms, and fears of retaliation, prevent states from going all out in cyber operations. That doesn\u2019t stop the anarchic Com. Over the last decade, its criminal activities have escalated from simple distributed denial-of-service (DDoS) attacks that disrupt websites to SIM-swapping hacks that hijack a victim\u2019s phone service, as well as crypto theft, ransomware attacks, and corporate data theft. These crimes have affected AT&amp;T, Microsoft, Uber, and others. Com members have also been involved in various forms of sextortion aimed at forcing victims to physically harm themselves or record themselves doing sexually explicit activities. The Com\u2019s impact has also spread beyond the digital realm to kidnapping, beatings, and other violence.\u00a0 One longtime cybercrime researcher, who asked to remain anonymous because of his work, says the Com is as big a threat in the cyber realm as Russia and China\u2014for one unusual reason. \u201cThere\u2019s only so far that China is willing to go; there\u2019s only so far that Russia or North Korea is willing to go,\u201d he says, referring to international laws and norms, and fears of retaliation, that prevent states from going all out in cyber operations. That doesn\u2019t stop the anarchic Com, he says. FRANZISKA BARCZYK \u201cIt is a pretty significant threat, and people tend to \u2026 push it under the rug [because] it\u2019s just a bunch of kids,\u201d he says. \u201cBut look at the impact [they have].\u201d Brogan says the amount of damage they do in terms of monetary losses \u201ccan become staggering very quickly.\u201d There is no single site where Com members congregate; they spread across a number of web forums and Telegram and Discord channels. The group follows a long line of hacking and subculture communities that emerged online over the last two decades, gained notoriety, and then faded or vanished after prominent members were arrested or other factors caused their decline. They differed in motivation and activity, but all emerged from \u201cthe same primordial soup,\u201d says Nixon. The Com\u2019s roots can be traced to the Scene, which began as a community of various \u201cwarez\u201d groups engaged in pirating computer games, music, and movies. When Nixon began looking at the Scene, in 2011, its members were hijacking gaming accounts, launching DDoS attacks, and running booter services. (DDoS attacks overwhelm a server or computer with traffic from bot-controlled machines, preventing legitimate traffic from getting through; booters are tools that anyone can rent to launch a DDoS attack against a target of choice.) While they made some money, their primary goal was notoriety. This changed around<\/p>","protected":false},"author":2,"featured_media":71535,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_pvb_checkbox_block_on_post":false,"footnotes":""},"categories":[52,5,7,1],"tags":[],"class_list":["post-71534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-club","category-committee","category-news","category-uncategorized","pmpro-has-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers made death threats against this security researcher. Big mistake. - YouZum<\/title>\n<meta name=\"description\" content=\"\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e42\u0e14\u0e23\u0e19\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/youzum.net\/it\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers made death threats against this security researcher. Big mistake. - YouZum\" \/>\n<meta property=\"og:description\" content=\"\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e42\u0e14\u0e23\u0e19\" \/>\n<meta property=\"og:url\" content=\"https:\/\/youzum.net\/it\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/\" \/>\n<meta property=\"og:site_name\" content=\"YouZum\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DroneAssociationTH\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-16T11:48:27+00:00\" \/>\n<meta name=\"author\" content=\"admin NU\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin NU\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"23 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/\"},\"author\":{\"name\":\"admin NU\",\"@id\":\"https:\/\/yousum.gpucore.co\/#\/schema\/person\/97fa48242daf3908e4d9a5f26f4a059c\"},\"headline\":\"Hackers made death threats against this security researcher. Big mistake.\",\"datePublished\":\"2026-02-16T11:48:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/\"},\"wordCount\":4685,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/yousum.gpucore.co\/#organization\"},\"image\":{\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg\",\"articleSection\":[\"AI\",\"Committee\",\"News\",\"Uncategorized\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/\",\"url\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/\",\"name\":\"Hackers made death threats against this security researcher. Big mistake. - YouZum\",\"isPartOf\":{\"@id\":\"https:\/\/yousum.gpucore.co\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg\",\"datePublished\":\"2026-02-16T11:48:27+00:00\",\"description\":\"\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e42\u0e14\u0e23\u0e19\",\"breadcrumb\":{\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage\",\"url\":\"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg\",\"contentUrl\":\"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg\",\"width\":1429,\"height\":2000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/youzum.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers made death threats against this security researcher. Big mistake.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/yousum.gpucore.co\/#website\",\"url\":\"https:\/\/yousum.gpucore.co\/\",\"name\":\"YouSum\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/yousum.gpucore.co\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/yousum.gpucore.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/yousum.gpucore.co\/#organization\",\"name\":\"Drone Association Thailand\",\"url\":\"https:\/\/yousum.gpucore.co\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/yousum.gpucore.co\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/youzum.net\/wp-content\/uploads\/2024\/11\/tranparent-logo.png\",\"contentUrl\":\"https:\/\/youzum.net\/wp-content\/uploads\/2024\/11\/tranparent-logo.png\",\"width\":300,\"height\":300,\"caption\":\"Drone Association Thailand\"},\"image\":{\"@id\":\"https:\/\/yousum.gpucore.co\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/DroneAssociationTH\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/yousum.gpucore.co\/#\/schema\/person\/97fa48242daf3908e4d9a5f26f4a059c\",\"name\":\"admin NU\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/yousum.gpucore.co\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/youzum.net\/wp-content\/uploads\/avatars\/2\/1746849356-bpfull.png\",\"contentUrl\":\"https:\/\/youzum.net\/wp-content\/uploads\/avatars\/2\/1746849356-bpfull.png\",\"caption\":\"admin NU\"},\"url\":\"https:\/\/youzum.net\/it\/members\/adminnu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers made death threats against this security researcher. Big mistake. - YouZum","description":"\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e42\u0e14\u0e23\u0e19","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/youzum.net\/it\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/","og_locale":"it_IT","og_type":"article","og_title":"Hackers made death threats against this security researcher. Big mistake. - YouZum","og_description":"\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e42\u0e14\u0e23\u0e19","og_url":"https:\/\/youzum.net\/it\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/","og_site_name":"YouZum","article_publisher":"https:\/\/www.facebook.com\/DroneAssociationTH\/","article_published_time":"2026-02-16T11:48:27+00:00","author":"admin NU","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"admin NU","Tempo di lettura stimato":"23 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#article","isPartOf":{"@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/"},"author":{"name":"admin NU","@id":"https:\/\/yousum.gpucore.co\/#\/schema\/person\/97fa48242daf3908e4d9a5f26f4a059c"},"headline":"Hackers made death threats against this security researcher. Big mistake.","datePublished":"2026-02-16T11:48:27+00:00","mainEntityOfPage":{"@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/"},"wordCount":4685,"commentCount":0,"publisher":{"@id":"https:\/\/yousum.gpucore.co\/#organization"},"image":{"@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage"},"thumbnailUrl":"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg","articleSection":["AI","Committee","News","Uncategorized"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/","url":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/","name":"Hackers made death threats against this security researcher. Big mistake. - YouZum","isPartOf":{"@id":"https:\/\/yousum.gpucore.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage"},"image":{"@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage"},"thumbnailUrl":"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg","datePublished":"2026-02-16T11:48:27+00:00","description":"\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e42\u0e14\u0e23\u0e19","breadcrumb":{"@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#primaryimage","url":"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg","contentUrl":"https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg","width":1429,"height":2000},{"@type":"BreadcrumbList","@id":"https:\/\/youzum.net\/hackers-made-death-threats-against-this-security-researcher-big-mistake\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/youzum.net\/"},{"@type":"ListItem","position":2,"name":"Hackers made death threats against this security researcher. Big mistake."}]},{"@type":"WebSite","@id":"https:\/\/yousum.gpucore.co\/#website","url":"https:\/\/yousum.gpucore.co\/","name":"YouSum","description":"","publisher":{"@id":"https:\/\/yousum.gpucore.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yousum.gpucore.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/yousum.gpucore.co\/#organization","name":"Drone Association Thailand","url":"https:\/\/yousum.gpucore.co\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/yousum.gpucore.co\/#\/schema\/logo\/image\/","url":"https:\/\/youzum.net\/wp-content\/uploads\/2024\/11\/tranparent-logo.png","contentUrl":"https:\/\/youzum.net\/wp-content\/uploads\/2024\/11\/tranparent-logo.png","width":300,"height":300,"caption":"Drone Association Thailand"},"image":{"@id":"https:\/\/yousum.gpucore.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DroneAssociationTH\/"]},{"@type":"Person","@id":"https:\/\/yousum.gpucore.co\/#\/schema\/person\/97fa48242daf3908e4d9a5f26f4a059c","name":"admin NU","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/yousum.gpucore.co\/#\/schema\/person\/image\/","url":"https:\/\/youzum.net\/wp-content\/uploads\/avatars\/2\/1746849356-bpfull.png","contentUrl":"https:\/\/youzum.net\/wp-content\/uploads\/avatars\/2\/1746849356-bpfull.png","caption":"admin NU"},"url":"https:\/\/youzum.net\/it\/members\/adminnu\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg",1429,2000,false],"landscape":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg",1429,2000,false],"portraits":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg",1429,2000,false],"thumbnail":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-150x150.jpg",150,150,true],"medium":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-214x300.jpg",214,300,true],"large":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-732x1024.jpg",732,1024,true],"1536x1536":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-1097x1536.jpg",1097,1536,true],"2048x2048":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5.jpg",1429,2000,false],"trp-custom-language-flag":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-9x12.jpg",9,12,true],"woocommerce_thumbnail":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-300x300.jpg",300,300,true],"woocommerce_single":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-600x840.jpg",600,840,true],"woocommerce_gallery_thumbnail":["https:\/\/youzum.net\/wp-content\/uploads\/2026\/02\/MIT-Tech-Review-ILLU-1-FINAL-franziska-cnb7G5-100x100.jpg",100,100,true]},"rttpg_author":{"display_name":"admin NU","author_link":"https:\/\/youzum.net\/it\/members\/adminnu\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/youzum.net\/it\/category\/ai-club\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/youzum.net\/it\/category\/committee\/\" rel=\"category tag\">Committee<\/a> <a href=\"https:\/\/youzum.net\/it\/category\/news\/\" rel=\"category tag\">News<\/a> <a href=\"https:\/\/youzum.net\/it\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"The threats started in spring.\u00a0 In April 2024, a mysterious someone using the online handles \u201cWaifu\u201d and \u201cJudische\u201d began posting death threats on Telegram and Discord channels aimed at a cybersecurity researcher named Allison Nixon.\u00a0 \u201cAlison [sic] Nixon is gonna get necklaced with a tire filled with gasoline soon,\u201d wrote Waifu\/Judische, both of which are&hellip;","_links":{"self":[{"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/posts\/71534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/comments?post=71534"}],"version-history":[{"count":0,"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/posts\/71534\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/media\/71535"}],"wp:attachment":[{"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/media?parent=71534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/categories?post=71534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/youzum.net\/it\/wp-json\/wp\/v2\/tags?post=71534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}