Zynia Labs

From notsafety to Daniel H******: Unmasking the Real Identity Behind neo_net’s Smishing-as-a-Service Operation

There's a moment in most OSINT investigations where a single piece of carelessness cracks the whole case open. Sometimes it's a reused password, sometimes it's an IP address that shows up where it shouldn't. In this investigation, it was a line buried in an old project file, a Facebook Messenger link that the subject likely forgot was ever there.

Author

default avatar

Zynap Team

From notsafety to Daniel H******: Unmasking the Real Identity Behind neo_net’s Smishing-as-a-Service Operation

This is the story of how the operator of Ankarex, a smishing-as-a-service platform, was traced from an anonymous GitHub profile to a real name, a real city, and a real family using nothing but open-source intelligence. 

Starting From a Single Account

The investigation began with a GitHub account: notsafety. No tip-off, no leaked database pointing to it, just a username and some repositories worth examining.

The first step with any GitHub account is to inspect the commit metadata. Most people don’t realize that every Git commit contains a name and email embedded in it. Not the GitHub display name, but whatever the developer configured locally on their machine. It’s something most people set up once and never think about again.

The commits from notsafety revealed two identities: 

And in older commits: 

That gave us three things to work with: a handle (neo_net), a likely fabricated name (Vickom Ishlovenko), and an email address ([email protected]). But the real breakthrough came from something even more careless. In one of the older project files, the subject had left a message:

“message me at m.me/vickom.morozov” 

Image 1

That’s a direct Facebook Messenger link. And that single breadcrumb turned out to be the thread that unraveled the entire operation. 

The Facebook Attribution Chain

Running criminal operations online requires strict separation between operational aliases and personal identity. A Facebook Messenger link embedded in your own code is the opposite of that. 

A search for the vickom.morozov and Vickom Ishlovenko handles revealed an inconsistency: historical tags associated with Mexican users. The names “Vickom Morozov”/”Vickom Ishlovenko” sound Eastern European, but the social circle was entirely Mexican. 

Image 2
Image 3

Digging further revealed a consistent group of Facebook friends who had tagged various iterations of the same handle over the years. The subject had changed their Facebook display name multiple times, cycling through “Vickom Morozov,” “Vickom Ishlovenko,” and other variations, but the underlying account remained the same. Friends tagged different names across different periods, but every one of them redirected to the same profile.

That profile belonged to Daniel H******.

hacker unmasked

The Facebook profile also listed a romantic partner (N.L.) and a sister (A.G.), whose handle contained “H*****” and whose listed location was Monterrey, Mexico.

Image 5

The sister’s profile independently confirmed both the surname and the city, without relying on any of the subject’s own accounts.

The Bulgarian Who Wasn’t

This is a good moment to talk about the fabricated identity, because it held up for over a decade (at least on the surface). 

The subject had built an elaborate Eastern European persona across multiple platforms. On a developer network, they claimed to be from Varna, Bulgaria. The names “Morozov” and “Vickom” are Slavic. Everything was carefully constructed to point away from Latin America. 

But the technical evidence told a completely different story. Two residential IP addresses, obtained from separate data breaches, both geolocated to Monterrey, Mexico, on different ISPs, which rules out a VPN coincidence. A phone number from a gaming retailer breach carried a Monterrey area code. Language settings in every breached account were set to Spanish. And the Facebook social graph, as described above, was organically and unmistakably Mexican, and more specifically pointing to Monterrey. 

The cover story was designed for people who wouldn’t look underneath, but the moment anyone checked the metadata, it collapsed. 

Breach Data Convergence

The Facebook chain was strong, but attribution requires independent corroboration and that’s where breach data came in. 

The starting point was the fabricated name from the GitHub commits: “Ishlovenko Vickom.” Searching for that name across breach data surfaced a hit in an Instagram leak, a record mapping the name “Ishlovenko Vickom” to the username nebulacrypt and, crucially, to a new email address: [email protected]. Same domain as the GitHub commit email ([email protected]), but a different mailbox. That single pivot – from a fabricated name to a second email on the same domain – unlocked the rest of the breach data chain. 

Searching for [email protected] revealed it had been registered via Facebook under the name “Vickom Morozov,” closing the loop back to the Facebook identity. It also appeared in several other data breaches, the most significant one being from a Mexican gaming retailer, which mapped that email to the name Daniel H*****, a Monterrey-area phone number, and a location consistent with all other indicators. 

The same email appeared in a music streaming service breach, where the account had been registered via Facebook OAuth, independently tying [email protected] to the Facebook identity. The breach record also included a date of birth field (November 6, 1996), gender (male), and country (Mexico), though the date of birth remains unverified and should be treated as a hypothesis rather than a confirmed finding; a breached password, sonic1996, used on another account provides a weak supporting indicator, as it may reference a birth year. So, at this stage, the evidence picture included: 

  • Two fully independent sources confirming the name “Daniel H*****” (Facebook social graph + gaming retailer breach) 
  • Two residential IPs geolocating to Monterrey 
  • A phone number with a Monterrey area code 
  • A family member whose Facebook profile independently lists Monterrey 
  • A possible date of birth suggested by breach data (unverified, with the password sonic1996 as a weak supporting indicator) 

The attribution was solid.

Sixteen Aliases, One Pair of Shoes

Going back to approximately 2013, accounts on gaming platforms, developer communities, and social networks could all be linked through a web of shared email and IP addresses. The subject used at least 16 different aliases over the years*, including variations of “Vickom Morozov,” “Vickom Ishlovenko,” “neo_net,” and “Ankarex.”

The linking methodology is straightforward in principle but can be tedious in practice. An email address appears in one breach tied to alias A. The same email appears in a different breach tied to alias B with an IP address attached. That IP shows up in a third breach tied to alias C, which uses a different email. That email appears in yet another breach under alias D. And so on, until the web covers sixteen names across dozens of platforms. 

What made this subject easy to track was a consistent behavioral pattern: change the display name, keep the underlying account. Change the alias, keep the same email domain. Move to a new forum, reuse the same residential IP. It’s the OPSEC equivalent of changing disguises every day but wearing the same shoes, a pattern covered in more depth in our Xanthorox OPSEC case study.

*A full listing of all known aliases and associated email addresses, along with their sources, is provided in the appendix at the end of this post. 

Connecting the GitHub Identity to the Underground

One critical link still needs to be established: how do we know the person behind the GitHub account notsafety is the same person running Ankarex on underground forums? 

The bridge is the neo_net handle. GitHub commits directly tie neo_net to the [email protected] email. Searching for neo_net revealed the same handle active on multiple underground forums where it was used interchangeably with the Ankarex handle. On at least two forums, both handles belonged to the same registered user, promoting the same Telegram channels and the same platform domains (ankarex[.]io, ankarex[.]net). 

The GitHub repositories provide further corroboration. The subject’s repos include self-authored JavaScript validators for credit cards, IBANs, and national ID numbers, plus a PHP geolocation script for fingerprinting website visitors, the same components that the Ankarex platform uses operationally. Before launching Ankarex as a paid service, the subject had released a deprecated Santander phishing kit for free on underground forums. The post included working code, installation instructions, and the comment: “Antibots are old, so don’t bother me with problems.” This was the old version, and the current one would cost money, a classic move in underground economies: give away an older version to build reputation, then monetize the upgrade. The timing is also notable: the last public GitHub activity was in 2022, the same year the Ankarex platform became commercially available. 

The forum presence is broad. The neo_net and Ankarex handles appeared across Breached, Cracked, Patched.to, XSS, BHF, Leakzone, Nulled, and Hackforums. The subject also maintained a personal Telegram account (@neo_net), several channels — @Ankarex (currently inactive), @Ankarex_Announcements (also inactive), and the current active channel, which migrated from @AnkarexNews – and a support bot. The migration pattern across Telegram channels mirrors the alias rotation seen everywhere else.

Image 6

That’s the full bridge: GitHub commits to neo_netneo_net to the forums, forums to Ankarex. This is what connects the technical identity to the criminal operation with high confidence. 

Inside the Ankarex Platform 

Ankarex operates as a smishing-as-a-service platform, which is essentially a SaaS product where the service being sold is phishing infrastructure. Customers deposit cryptocurrency, then use the platform to launch SMS phishing campaigns against desired targets.

Image 7

The platform accepts eight cryptocurrencies through rotating single-use wallet addresses, making wallet-based attribution difficult. Analysis of the platform’s API responses and frontend code pointed toward a known commercial cryptocurrency payment gateway as the backend processor, assessed with medium confidence based on matching payment ID formats, API field naming conventions, and transaction status terminology.  

The financial OPSEC is notably more competent than the personal OPSEC. All payment API calls are proxied server-side (the browser only communicates with the Ankarex domain), and the rotating wallet design prevents simple address-based tracking. It’s an interesting contrast: careful enough to proxy API calls, careless enough to leave a Facebook Messenger link in a project file.  

An Associate Surfaces 

One tangential thread is worth mentioning. The Santander phishing kit that neo_net released on forums was hosted on Google Drive. The Drive file metadata revealed the uploader’s Google account email, which turned out to belong to an alleged separate individual, a Spain-based phishing operator running their own bank-impersonation domains targeting different financial institutions. Whether this person is an operational associate, someone who hosted the file on the subject’s behalf, or even another identity controlled by neo_net himself remains unclear. It’s a single point of intersection with no further corroborating evidence, so the connection is assessed as low confidence. But it shows how one sloppy upload can potentially connect actors in these ecosystems. 

What This Case Illustrates 

Beyond the technical specifics, this investigation maps a trajectory that threat intelligence analysts encounter regularly. The subject started as a teenager in gaming communities around 2013. By 2016, they were active in developer circles.

By 2019, they were collecting offensive hacking tools.

By 2020, they had pivoted to fraud-specific tooling.

By 2022, they were operating a commercial cybercrime platform. 

Curiosity becomes capability, and capability eventually finds a way to make money. The subject’s registration on a legitimate Mexican peer-to-peer lending platform in 2019 is a small but potentially telling detail; it may suggest financial pressure or, at minimum, an interest in financial systems that preceded the pivot to fraud. It’s also worth noting that the platform currently requires a Mexican credit bureau score, proof of income, and a bank account in the applicant’s name; if those requirements were in place at the time of registration, this would independently confirm Mexican residency and financial identity. 

This isn’t the first time neo_net‘s operations have been publicly documented. In 2023, another piece of research was published exposing parts of the infrastructure and operational patterns behind the Ankarex platform. Despite that exposure, the service is still running, as the Telegram channel was last updated at the time of writing (February 2026). What has changed is the subject’s behavior, as neo_net has become noticeably more discreet, with less public forum activity and more careful operational security. 

This raises an open question: is the original operator still behind the platform? There is no evidence that definitively proves or disproves it. The operation could still be run by Daniel H*****, or it could have been handed off to someone else. What we can say with confidence is that the person who built it is no longer anonymous. 

For all the effort that went into the Bulgarian cover and the Ankarex platform, what actually gave him away was basic stuff. Same email domain everywhere. A Facebook link left in a project file. A social graph he never bothered to separate from his real one. 

A single line of text in a forgotten file, a handful of data breaches, and the patience to follow each thread to its conclusion. That was all it took to go from an anonymous GitHub account to a full attribution.

The Investigation at a Glance

The chart below summarizes the full attribution chain, showing how each finding led to the next, from the initial GitHub account to the confirmed real-world identity.

notsafety investigation diagram white background

Conclusion

Every piece of evidence in this investigation came from open sources. The subject wasn’t undone by a sophisticated operation or privileged access, but by the kind of traces that everyone leaves and almost nobody thinks about cleaning up. A reused email here, a forgotten link there, an IP that shows up twice – none of it means much in isolation. The hard part is connecting it all, pulling threads across dozens of platforms and data sources until the picture comes together. That’s exactly the kind of work we built Zynap’s intelligence orchestrator to do, turning scattered, disconnected signals into structured attribution chains like the one you just read. 

Appendix A: Full Alias and Email Listing 

The following table documents all known aliases and email addresses attributed to the subject through the investigation. Each entry includes the source that established the link. 

Email Addresses

Email Source 
[email protected] GitHub commit metadata (notsafety account) 
[email protected] Instagram breach (discovered by searching for “Ishlovenko Vickom,” linked to username nebulacrypt); also present in gaming retailer, music streaming service, and dark web intelligence platforms 
[email protected] Twitter 2023 leak (discovered by searching for “Vickom Morozov” — record: email [email protected], name “Vickom Morozov”, screen name MorozovJg, created May 2013); confirmed via gaming network and gaming platform breaches (IP overlap with Monterrey) 
[email protected] GitHub commit metadata (vimorozov account, discovered via [email protected]
[email protected] YouNow breach (discovered by searching for IP 187.161.***.***; record includes profile name “VickomMorozov” and Facebook ID) 

Aliases and Display Names

Alias Source 
notsafety GitHub account name 
neo_net GitHub commit metadata; underground forums (Breached, Cracked, XSS, BHF, Patched.to, Leakzone, Nulled, Hackforums); Telegram (@neo_net) 
N€O N€Ť Forum display name variant of neo_net (same registered accounts, stylized typography) 
n3oxis Mashacker.com 2020 breach (discovered by searching for [email protected]; forum username associated with that email) 
Ankarex Underground forums (dual handle with neo_net on same registered accounts); Telegram channels 
Vickom Morozov Facebook profile (tracked via friend taggings); project file Messenger link (m.me/vickom.morozov) 
Vickom Ishlovenko GitHub commit metadata (older commits); Facebook display name (name-change cycle) 
Vickom izkariov Morozov GitHub commit metadata (vimorozov account; commit author name associated with [email protected]
VickomMorozov Taringa breach (discovered by searching for [email protected]
vimorozov GitHub account, discovered via [email protected]; also appears as platform username in breach data 
VMorozov Taringa breach (discovered by searching for [email protected]
MorozovJg Twitter handle (associated with [email protected] and name “Vickom Morozov”) 
nebulacrypt Instagram breach (linked to [email protected] and name “Ishlovenko Vickom”) 
dhlnx Armor Games 2020 breach (discovered by searching for [email protected]; record includes IP 189.152.***.*** — Monterrey) 
kikagain foros.wow-colombia breach (discovered by searching for [email protected]; Spanish-language gaming forum) 

Appendix B: List of targets, Indicators of Compromise (IOCs), and TTPs

neo_net has been known to target the following victims, all belonging to the Financial Services sector, as stated in a previous campaign investigation:

neo net map

Observed IOCs are the following:

APK SHA-1 Hashes 
de8929c1a0273d0ed0dc3fc55058e0cb19486b3c
b344fe1bbb477713016d41d996c0772a308a5146
8a099af61f1fa692f45538750d42aab640167fd2
ab14161e243d478dac7a83086ed4839f8ad7ded8
ded2655512de7d3468f63f9487e16a0bd17818ff
a5208de82def52b4019a6d3a8da9e14a13bc2c43
21112c1955d131fa6cab617a3d7265acfab783c2
6ea53a65fe3a1551988c6134db808e622787e7f9
62236a501e11d5fbfe411d841caf5f2253c150b8
7f0c3fdbfcdfc24c2da8aa3c52aa13f9b9cdda84
f918a6ecba56df298ae635a6a0f008607b0420b9
ffbcdf915916595b96f627df410722cee5b83f13
7b4ab7b2ead7e004c0d93fe916af39c156e0bc61
34d0faea99d94d3923d0b9e36ef9e0c48158e7a0
e6c485551d4f209a0b7b1fa9aa78b7efb51be49b
1df3ed2e2957efbd1d87aac0c25a3577318b8e2a
6a907b8e5580a5067d9fb47ef21826f164f68f3f
5d1c7ff3d16ec770cf23a4d82a91358b9142d21a
86ad0123fa20b7c0efb6fe8afaa6a756a86c9836
14a36f18a45348ad9efe43b20d049f3345735163
b506503bb71f411bb34ec8124ed26ae27a4834b9
afe84fa17373ec187781f72c330dfb7bb3a42483
445468cd5c298f0393f19b92b802cfa0f76c32d4
8491ff15ad27b90786585b06f81a3938d5a61b39
2714e0744ad788142990696f856c5ffbc7173cf4
1ce0afe5e09b14f8aee6715a768329660e95121e
96a3600055c63576be9f7dc97c5b25f1272edd2b
9954ae7d31ea65cd6b8cbdb396e7b99b0cf833f4
07159f46a8adde95f541a123f2dda6c49035aad1
ab19a95ef3adcb83be76b95eb7e7c557812ad2f4
db8eeab4ab2e2e74a34c47ad297039485ff75f22
dbf0cec18caabeb11387f7e6d14df54c808e441d
69d38eed5dc89a7b54036cc7dcf7b96fd000eb92
c38107addc00e2a2f5dcb6ea0cbce40400c23b49
279048e07c25fd75c4cef7c64d1ae741e178b35b
ef8c5d639390d9ba138ad9c2057524ff6e1398de
e7c2d0c80125909d85913dfb941bdc373d677326
145bd67f94698cc5611484f46505b3dc825bd6cd
Domains
ankarex[.]io 
ankarex[.]net 
macosfera[.]com 
bbva.info-cliente[.]net 
santander.esentregas[.]ga 
bbva.esentregas[.]ga 
correos.esentregas[.]ga 
unicaja-movil-alertas[.]com 
alertas-unicaja-banco[.]com 
alertas-unicaja-seguridad[.]com 
nbg-app-gr[.]com 

Here’s an overview of neo_net’s attributed Tactics, Techniques, and Procedures (TTPs):

T1566.001: Phishing: Spearphishing Link  
T1583.001: Acquire Infrastructure: Domains  
T1583.003: Acquire Infrastructure: Virtual Private Server  
T1071.001: Application Layer Protocol: Web Protocols  
T1059.007: Command and Scripting Interpreter: JavaScript  
T1059.004: Command and Scripting Interpreter: Unix Shell  
T1590.005: Gather Victim Network Information: IP Addresses  
T1056.003: Input Capture: Web Portal Capture  
T1584.001: Compromise Infrastructure: Domains  
T1102: Web Service  
T1027: Obfuscated Files or Information  
T1573: Encrypted Channel  
T1406.002: Obfuscated Files or Information: Software Packing  
T1633.001: Virtualization/Sandbox Evasion: System Checks  
T1426: System Information Discovery  
T1636.004: Protected User Data: SMS Messages  
T1437.001: Application Layer Protocol: Web Protocols  
T1481.003: Web Service: One-Way Communication  
T1521.002: Encrypted Channel: Asymmetric Cryptography  
T1646: Exfiltration Over C2 Channel