Sakura Room

18 May 2025 • 1 min read

1- I used exiftool on the image then got the username from it “sakurasnowangelaiko”

2- I got his name by searching by his user name and got his instagram “Aiko Abe”

3- Then to get his email I checked his github and got pgp and searched it on openpgp and got this email “ sakurasnowangel83@protonmail.com

4- Then the attacker had a repo called ETH I searched the commit history and found this address “0xa102397dbeeBeFD8cD2F73A89122fCdB53abB6ef”

5- After investigating the address on arkham intel we got the pool to be “Ethermine”

6- And also the attacker used tether (USDT)

7- I have found the attacker twitter account “SakuraLoverAiko”

8- Just use revers image searched

Start searching

Enter keywords to search articles.