Portfolio
OSINTCYBERSECURITYINVESTIGATIONSTREAMER

OSINT Case Study - Streamer Under Spotlight

An OSINT analysis revealing extensive vulnerabilities in a streamer's digital footprint, including old photos, deleted tweets, historical usernames, leaked IPs and passwords, geolocation of their parents' house, and detailed mapping of their residence via Instagram geotags.

OSINT Case Study - Streamer Under Spotlight

Introduction

This case study delves into the digital footprint of a popular streamer, uncovering significant security vulnerabilities. The analysis highlights how historical online data—including old photos, deleted tweets, outdated usernames, and leaked credentials—can be exploited by malicious actors to piece together a detailed personal profile.

Tools Used

  • Historical Data Scrapers: Recovered old photos and tweets that were removed, offering insight into the streamer's past digital behavior.
  • Username Aggregators: Compiled outdated usernames along with associated personal information from various platforms.
  • Leak Databases: Identified leaked IP addresses and passwords from multiple data breaches.
  • Geolocation Analysis: Mapped the streamer’s residential area by analyzing geotags in Instagram photos, even pinpointing the location of their parents' house.
  • Online Registries: Discovered instances where the streamer’s photo was used in registrations on numerous websites.

Findings

  • 📷 Old Photos: Archived images surfaced, revealing sensitive details about the streamer’s personal life.
  • 💬 Deleted Tweets: Retrieved tweets that had been removed, exposing past statements and sensitive remarks.
  • 🔗 Historical Usernames: Uncovered outdated usernames that, when correlated with personal data, provided a fuller picture of their online identity.
  • 🌐 Leaked IPs & Passwords: Multiple leaks of IP addresses and passwords were identified, heightening the risk of unauthorized access.
  • 📍 Geolocation Data: Geotagged Instagram photos enabled detailed mapping of the streamer’s residence and even located their parents' house.
  • 📝 Photo Registrations: Found the streamer’s photo used in various online registrations, increasing avenues for potential exploitation.

Conclusions & Recommendations

This analysis demonstrates the significant risks posed by a publicly exposed digital footprint. To mitigate these vulnerabilities, the following measures are recommended:

  • ✅ Regularly update security settings and monitor for compromised credentials.
  • ✅ Remove geotags from all photos to safeguard location privacy.
  • ✅ Proactively manage and purge historical data that could compromise personal security.
  • ✅ Strengthen account recovery processes and utilize unique, robust passwords.
  • ✅ Conduct periodic audits of online presence to identify and address emerging risks.

By addressing these issues, streamers can better protect themselves against the multifaceted threats posed by modern cyber adversaries.