0

Malicious Users DB

A curated collection of JSON files containing lists of websites associated with malicious activities.

This repository serves as a curated JSON file containing lists of websites associated with malicious activities. The list is compiled based on personal findings of the repository owner and are intended to help identify and mitigate threats posed by these sites.

malicious-users

Included Files:

  • Tool/exporter_script.py: This Python script extracts data from an Excel file (ExporterSheet.xlsx) and converts it into JSON format, populating the Compromised-Discord-Accounts.json file with details of compromised accounts found over time.

  • Compromised-Discord-Accounts.json: This JSON file contains the full list of details and info about all the compromised accounts found over time. Most of the compromised accounts in this list were used / are actively used in phishing campaigns.

  • index.html: HTML file for displaying the data in a table format.

  • script.js: JavaScript file for loading and rendering the JSON data into the HTML table, with sorting and sticky navigation functionality.

  • styles.css: CSS file for styling the HTML elements.

Definitions:

DefinitionDescription
CASE_NUMBERThe unique identifier for the case.
FOUND_ONThe date when the compromised account was discovered.
DISCORD_IDThe unique identifier associated with the user on Discord.
USERNAMEThe username of the compromised account.
BEHAVIOURDescription of the suspicious activities associated with the account.
ATTACK_METHODThe method used in the attack.
ATTACK_VECTORThe specific approach or technique used in the attack.
ATTACK_GOALThe objective of the attack.
ATTACK_SURFACEThe platform or service targeted / used in the attack.
SUSPECTED_REGION_OF_ORIGINThe suspected geographical location from which the attack originated.
SURFACE_URLThe URL associated with the initial interaction or surface level of the attack.
SURFACE_URL_DOMAINThe domain of the surface URL.
SURFACE_URL_STATUSThe status of the surface URL, whether it is active or not.
FINAL_URLThe URL to which the attack directs users after initial interaction.
FINAL_URL_DOMAINThe domain of the final URL.
FINAL_URL_STATUSThe status of the final URL, whether it is active or not.

Contributions:

Contributions to this repository are not currently accepted. The list is based solely on my discoveries but If anyone wants to add other URLs and you have an extensive collection that you would like to add them to the repo feel free to submit a request.

Usage:

The data within this JSON file can be used to enhance threat detection and protect users from encountering malicious online content. Information provided here serves as a valuable resource for threat intelligence and cybersecurity analysis.

Disclaimer:

The information provided in this repository is for informational purposes only. While efforts are made to ensure accuracy, the repository owner cannot guarantee the completeness or currentness of the data. Users are advised to exercise caution when interacting with websites listed herein and to conduct their own investigations as necessary.

License:

This repository is provided under the MIT License. By utilizing the contents of this repository, you agree to abide by the terms of this license.

Lets chat on Discord