{"id":12121,"date":"2025-08-12T07:58:55","date_gmt":"2025-08-12T14:58:55","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12121"},"modified":"2025-10-03T04:37:02","modified_gmt":"2025-10-03T11:37:02","slug":"vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/","title":{"rendered":"VexTrio Unmasked: A Legacy of Spam and Homegrown Scams"},"content":{"rendered":"<blockquote>\n<p><em>This is the second in a three-part, in-depth report covering nearly a year of research into VexTrio. To learn more about the people and entities involved, see the first part <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/vextrios-origin-story-from-spam-to-scam-to-adtech\/\"><strong>here<\/strong><\/a>. To learn about VexTrio\u2019s infrastructure and technology stack, see here. VexTrio domains and references from this research can be found in our <a href=\"https:\/\/github.com\/infobloxopen\/threat-intelligence\/tree\/main\" target=\"_blank\"><strong>GitHub repository<\/strong><\/a>.<\/em><\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/vextrio\/\" target=\"_blank\"><strong>VexTrio<\/strong><\/a> is a cybercriminal organization with tendrils that are far-reaching. But at the core of their operations are scams and spam. As we described in the first part of this research, key figures in VexTrio have been involved in <a href=\"https:\/\/www.infoblox.com\/resources\/webinars\/traffic-distribution-systems-at-the-heart-of-cybercrime\/\" target=\"_blank\"><strong>fraudulent activity<\/strong><\/a> since at least 2004. Images of VexTrio\u2019s fake CAPTCHA robots have been included in a multitude of reports about fraudulent activities for years. Their affiliate networks offer so-called smartlinks in many verticals, including <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/cyber-threat-advisory\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/\"><strong>dating<\/strong><\/a>, crypto, and sweepstakes. These links hide (\u201ccloak\u201d) the landing page and hinder analysis by security teams. They are embedded into <a href=\"https:\/\/www.godaddy.com\/resources\/news\/godaddy-annual-cybersecurity-report\" target=\"_blank\"><strong>compromised websites<\/strong><\/a>, <a href=\"https:\/\/nos.nl\/artikel\/2553051-crimineel-netwerk-achter-sexy-gifjes-in-comments-op-instagram\" target=\"_blank\"><strong>Instagram messages<\/strong><\/a>, <a href=\"https:\/\/www.blackhatworld.com\/seo\/running-campaigns-for-lospollos-on-facebook-but-getting-no-conversions.1681902\/\" target=\"_blank\"><strong>Facebook<\/strong><\/a>, and even <a href=\"https:\/\/krebsonsecurity.com\/2024\/02\/u-s-internet-leaked-years-of-internal-customer-emails\/\" target=\"_blank\"><strong>email security tools<\/strong><\/a>. Regardless of the starting point, the final landing pages are all scams, both in <a href=\"https:\/\/insights.infoblox.com\/resources-whitepaper\/infoblox-whitepaper-cybercrime-central-vextrio-operates-massive-criminal-affiliate-program\/\" target=\"_blank\"><strong>our experience<\/strong><\/a> and as widely reported by others in the industry.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-1.jpg\" alt=\"The infamous VexTrio robot\" \/><\/p>\n<p class=\"image-caption\">The infamous VexTrio robot<\/p>\n<p>While the fact that the VexTrio traffic distribution systems (TDS) deliver scams is wellknown, it is not widely known that most of the time VexTrio is delivering their own scam content, rather than that of independent advertisers. As a result, they benefit in multiple ways from embedding their smartlinks in compromised websites and social media. Fraudulent sites include a wide range of marketing verticals, most prevalently dating and cryptocurrency. Many affiliate networks will cite abuse when advertisers deliver malicious content to users, but VexTrio will have difficulty making this claim. There is substantial  evidence that demonstrates that they control the landing pages.<\/p>\n<p>VexTrio also offers fake VPNs, ad blockers, and other apps. Available in Google Play and the App Store, as well as via direct download sites, the apps have been downloaded over a million times in aggregate over several years. They show incessant ads to users, bind them into subscription contracts that are difficult to cancel, and convince them to reveal personal information like email addresses.<\/p>\n<p>But this software also reveals the murky line between VexTrio and their business partners. Apps created by VexTrio appear to be identical to those offered by two of their advertisers based in Prague, and they share hosting with VexTrio\u2019s development group, HolaCode. These overlaps raise questions about the relationship between VexTrio and VexTrio advertisers. Just how distinct are they? Beyond the shared code, there is a personal link: a founder of one of the companies, Techintrade, was also previously a managing director at VexTrio\u2019s AdsPro Group. If the software and hosting of Technitrade apps are identical to those of AdsPro and the second firm, Oilimpex, how does this company relate to VexTrio? We aren\u2019t sure, but it does hint at the potential that the full extent of the VexTrio enterprise is even larger than we know.<\/p>\n<p>Another pillar of their enterprise is spam, which they use in a vicious cycle with their scam operations. They blatantly copy major direct email marketing (DEM) companies, like <a href=\"https:\/\/www.whois.com\/whois\/sendgrid.rest\" target=\"_blank\"><strong>SendGrid<\/strong><\/a>, and use generic terms, like <a href=\"https:\/\/web.archive.org\/web\/20240813053809\/https:\/www.fidelitymail.com\/\" target=\"_blank\"><strong>Fidelity Mail<\/strong><\/a> to avoid detection. Try searching <span class=\"code-format\">sendgrid[.]rest<\/span> in a search engine and see for yourself. Fidelity Mail claims to give their customers access to over 220 million verified email addresses. Where do they get those email addresses? Based on our personal experience, they come from their fraudulent sites and apps. A victim\u2019s journey includes numerous requests for email addresses to win a free gift card, join a dating app, or recover some lost cryptocurrency. Entering an email is often an action in their cost-per-action affiliate marketing model. <\/p>\n<p>In spite of the number of email marketing companies they own, VexTrio\u2019s domain name system (DNS) records lack diversity, <a href=\"https:\/\/de.ssl-tools.net\/mailservers\/tacolo.co\" target=\"_blank\"><strong>tying email distribution<\/strong><\/a> domains to their very own TacoLoco. We used DNS records and our own spam collection to analyze how their spam and scam operations tie together. Of note, we found that in addition to their own mail servers, VexTrio is contracting with third parties like YNOT Mail for spam distribution. We will show how the domain datingcell[.]com was used in dating-themed spam. Buttons that are included in the email allow YNOT Mail to track clicks, which when pressed will lead users to VexTrio fake dating sites. VexTrio\u2019s scams feed their spam, and their spam feeds their scams.<\/p>\n<p>Besides classic spam and scam operations, the key figures are involved in dozens of other businesses, primarily micro-companies. Many of these have little connection to the advertising industry. Some of them are quite puzzling to us, and we\u2019ll provide some examples in this blog. For example, one of the firms is connected to a promised \u20ac1 billion investment in Bulgaria to provide solar energy by a German manufacturing group. How does a businessman from the adult industry become the head of such a large national endeavor? We don\u2019t know, but it certainly shows that it pays being in the malicious adtech industry.<\/p>\n<p><em>We have included numerous links to supporting evidence throughout this paper. All these hyperlinks were active in early July 2025.  Names, domains, and companies may appear in this report only because of technical or business link to VexTrio; their mention alone does not mean they knew of or took part in any wrongdoing. Specific illegal activity claims are explicit and backed by cited evidence.<\/em><\/p>\n<h3>Scam Sites<\/h3>\n<p>The scams promoted through VexTrio smartlinks have been covered numerous times over the years (like <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/cyber-threat-advisory\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/\"><strong>here<\/strong><\/a> and <a href=\"https:\/\/blog.sucuri.net\/2023\/08\/from-google-dns-to-tech-support-scam-sites-unmasking-the-malware-trail.html\" target=\"_blank\"><strong>here<\/strong><\/a> and <a href=\"https:\/\/www.godaddy.com\/resources\/news\/dollyway-malware-history\" target=\"_blank\"><strong>here<\/strong><\/a> and <a href=\"https:\/\/malwaretips.com\/blogs\/remove-click-allow-to-verify-that-you-are-not-a-robot\/\" target=\"_blank\"><strong>here<\/strong><\/a>), but what isn\u2019t widely known is that they also create the majority of the content they deliver. Thus VexTrio benefits twice when publishing affiliates distribute their smartlinks. The affiliate networks (Los Pollos, Adtrafico, TacoLoco) offer several verticals, including dating, adult-only, sweepstakes, nutra industry vertical, and crypto-related advertisements\u2014and they offer scams for each of these verticals. See Figure 1 for a sample of the many landing pages that we have confirmed are controlled by VexTrio. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-1.jpg\" alt=\"Figure 1\" \/><\/p>\n<p class=\"image-caption\">Figure 1. A collage of scam landing pages related to VexTrio\u2019s cryptocurrency, investment, sweepstake, and antivirus scam verticals<\/p>\n<p>The dating verticals are the most popular. VexTrio\u2019s firm Teknology owns trademarks for some of their dating sites, including OneDate. While their dating and hookup sites claim to connect customers to real people, they are widely reported as scams. <a href=\"https:\/\/datingspot24.com\/reviews\/onedate.com-experience\/\" target=\"_blank\"><strong>Reviews<\/strong><\/a> of many VexTrio sites state that they require subscriptions that are difficult to cancel, the profiles are not real people, and the central part of the service is a fake chat scam. In these fake chats, users are charged excessive amounts to send messages, but without the possibility of meeting someone in real life. We have interacted with their <a href=\"https:\/\/urlscan.io\/result\/49caaca6-cfdf-4293-9c81-2d94a2472a07\/\" target=\"_blank\"><strong>sites<\/strong><\/a> and <a href=\"https:\/\/urlscan.io\/result\/0197b9e2-de27-77bc-bd4a-bea28227f715\/\" target=\"_blank\"><strong>created accounts<\/strong><\/a> dozens of times. Even when their sites put up control questions, such as \u201cAre you 18?\u201d, you will be allowed into the content and a constant stream of connection requests from fake profiles will begin. Besides their trademarked brands, several other brands have long been associated with Tekka\/Teknology, including OnlyOne, which can be seen <a href=\"https:\/\/urlscan.io\/result\/01964c2a-9b1d-74b4-a703-7b67e355b2ed\/\" target=\"_blank\"><strong>hosted in their dedicated Swiss IP<\/strong><\/a> range, as well as <a href=\"https:\/\/urlscan.io\/result\/0198070a-624b-718d-9e98-371c85cf4b0e\/\" target=\"_blank\"><strong>hidden in Cloudflare<\/strong><\/a>.<\/p>\n<p>Trademark ownership is one way to connect VexTrio directly to the scam sites, but there is other evidence as well. Based on the volume of DNS queries and observed redirection chains, the VexTrio TDS delivers content more often from their own hosting, for example, AS5368, than external partners, such as PropellerAds and Traffic Partners, which are <a href=\"https:\/\/web.archive.org\/web\/20250630124711\/https:\/www.lospollos.com\/\" target=\"_blank\"><strong>listed on their website<\/strong><\/a>. Through the use of smartlinks, <a href=\"https:\/\/www.blackhatworld.com\/seo\/difference-between-smartlinks-and-cpa.1036879\/\" target=\"_blank\"><strong>VexTrio determines what gets shown<\/strong><\/a> to end users and the DNS query volumes indicate that  favor themselves.<\/p>\n<p>The evidence that the landing pages belong to VexTrio includes <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/vexing-and-vicious-the-eerie-relationship-between-wordpress-hackers-and-an-adtech-cabal\/\"><strong>unique web artifacts<\/strong><\/a> employed by no other entity. More decisively, TDS servers we have linked to VexTrio are hosting the scam toolkits directly. When delivering these scams to victims, those TDS servers use the following URL patterns:<\/p>\n<table>\n<thead>\n<tr>\n<th>URL<\/th>\n<th>Vertical<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>hXXps[:]\/\/fastminingpro[.]com\/payouts\/<\/td>\n<td>Cryptocurrency Scam<\/td>\n<\/tr>\n<tr>\n<td>hXXps[:]\/\/bit-wagifouzolu[.]top\/transfers\/<\/td>\n<td>Cryptocurrency Scam<\/td>\n<\/tr>\n<tr>\n<td>hXXps[:]\/\/base-fastbitco[.]top\/threads\/transfers?u=d4w264<\/td>\n<td>Cryptocurrency Scam<\/td>\n<\/tr>\n<tr>\n<td>hXXps[:]\/\/cryptoprofit[.]life\/?u=fmkpte4&amp;o=m45kwzr&amp;t=html<\/td>\n<td>Investment Scam<\/td>\n<\/tr>\n<tr>\n<td>hXXps[:]\/\/www[.]pattern-trader[.]net\/lp?k=acf93&amp;i=25e7&amp;utm=941d7b3f-1ca7-470b-8ccd-641a056c15d4<\/td>\n<td>Investment Scam<\/td>\n<\/tr>\n<tr>\n<td>hXXps[:]\/\/place-more-prizes[.]life\/?u=m5uwwwl&amp;o=frcpbz7&amp;t={affiliate_id}&amp;cid={transaction_id}<\/td>\n<td>Dating Scam<\/td>\n<\/tr>\n<tr>\n<td>hXXps[:]\/\/defendyourpc[.]com\/shield\/norton_global_2_new\/?lpkey=17de31083311094c36<\/td>\n<td>Antivirus Scam<\/td>\n<\/tr>\n<tr>\n<td>hXXps[:]\/\/multipleprofit-now[.]life\/?u=30wweky&amp;o=pvkptz3&amp;t=CryptoSingnetSG<\/td>\n<td>Sweepstakes Scam<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>VexTrio landing pages infringe on high-profile brands, such as Tinder and PornHub, and use images from high-profile public figures. Previous cryptocurrency and investment campaigns have appropriated the brands of famous YouTube celebrity MrBeast, President Donald Trump, billionaire Elon Musk, and even the <a href=\"https:\/\/urlscan.io\/result\/341d53a5-47e5-4b98-96b5-48979ccbff18\/\" target=\"_blank\"><strong>Cybersecurity and Infrastructure Security Agency (CISA)<\/strong><\/a>. Figure 2 shows how VexTrio blatantly pirates celebrity trademarks to deceive users into participating in its cryptocurrency scams.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-2.jpg\" alt=\"Figure 2\" \/><\/p>\n<p class=\"image-caption\">Figure 2. VexTrio blatantly infringes on the trademarks of MrBeast, President Trump, and Elon Musk to deceive users into participating in its cryptocurrency scams.<\/p>\n<h3>Scam Apps<\/h3>\n<p>In addition to their direct scams and push notifications, VexTrio has developed <a href=\"https:\/\/www.linkedin.com\/posts\/ren%C3%A9e-burton-b7161110b_dns-threatintel-cybercrime-activity-7283587661473202178-rWBt?utm_source=share&#038;utm_medium=member_desktop&#038;rcm=ACoAAButVkUBV1AlDCDv3gxOFHUy3uhLcxo4R2M\" target=\"_blank\"><strong>malicious apps<\/strong><\/a> over the last several years, including VPNs, device \u201cmonitoring\u201d apps, <a href=\"https:\/\/www.gameloop.com\/game\/tools\/safe-app-cleaner---clean-phone-on-pc\" target=\"_blank\"><strong>spam blocker<\/strong><\/a> apps, and dating apps. They released apps under several developer names, including HolaCode, <a href=\"https:\/\/apkpure.net\/developer\/LocoMind#google_vignette\" target=\"_blank\"><strong>LocoMind<\/strong><\/a>, Hugmi, Klover Group, and <a href=\"https:\/\/apps.apple.com\/ao\/developer\/alphascale-media-gmbh\/id1501519188\" target=\"_blank\"><strong>AlphaScale Media<\/strong><\/a>. Available in Google Play and the App Store, these have been downloaded millions of times in aggregate. High ratings for the apps hide the true nature of the software, and it is only in the one- and two-star reviews that it becomes clear that they are scams.<\/p>\n<p>Dating apps like <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.hugmi.meet.friends.love.chat&#038;hl=en_US\" target=\"_blank\"><strong>Hugmi<\/strong><\/a> and <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.cheri.meet.friends.date.chat&#038;hl=en_US\" target=\"_blank\"><strong>Cheri<\/strong><\/a> have been downloaded over a million times each on the Google Play store, despite reviews that reveal their scam nature. Like many scam chat apps, these require users to buy coins to send text messages, while also forcing users to watch ads. These apps were <a href=\"https:\/\/en.softonic.com\/author\/locomind\" target=\"_blank\"><strong>originally released by LocoMind<\/strong><\/a> but the developer information was changed to MateyX sometime in 2024. WinkChat, an app released by VexTrio group AlphaScale Media GmbH is ranked 158th in the Apple Store\u2019s social networking category. <a href=\"https:\/\/apps.apple.com\/us\/app\/winkchat-make-new-chat-room\/id1525252630?see-all=reviews\" target=\"_blank\"><strong>Reviews for all of these<\/strong><\/a> include comments about bot accounts and incessant advertising.  A <a href=\"https:\/\/www.tiktok.com\/@tedthetoycollector\/video\/7221982609297968426?lang=en\" target=\"_blank\"><strong>TikTok review<\/strong><\/a> of dating app similar to those offered by VexTrio describes the full scam.<\/p>\n<p>These apps can be tied to the VexTrio enterprise in multiple ways, such as through developer information, which often lists one of the shell companies, and through DNS records. Figure 3 shows that the IP address 136[.]243[.]216[.]249 was used simultaneously to host HolaCode, AdsPro Digital, Los Pollos, and multiple scam apps. Late into our investigation, we discovered <a href=\"https:\/\/www.cyjax.com\/wp-content\/uploads\/2022\/11\/Fangxiao-a-Chinese-threat-actor.pdf\" target=\"_blank\"><strong>in-depth research by Cyjax<\/strong><\/a> that also demonstrated the link between HolaCode and several scam apps. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-3.jpg\" alt=\"Figure 3\" \/><\/p>\n<p class=\"image-caption\">Figure 3. DNS records show that VexTrio domains are resolving at the same dedicated IP address as scam apps. Captured June 2025.<\/p>\n<p>Let\u2019s take a look at one of VexTrio\u2019s adblock scam apps: <a href=\"https:\/\/www.linkedin.com\/posts\/ren%C3%A9e-burton-b7161110b_dns-threatintel-cybercrime-activity-7283587661473202178-rWBt\/?utm_source=share&#038;utm_medium=member_desktop&#038;rcm=ACoAAButVkUBV1AlDCDv3gxOFHUy3uhLcxo4R2M\" target=\"_blank\"><strong>Spam Shield<\/strong><\/a>. It\u2019s been available on <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.spam.shield.spamblocker.notificationhistory\" target=\"_blank\"><strong>Google Play<\/strong><\/a> since 2021, and claims to be a spam blocker for push notifications. In July 2025, the app\u2019s Google Play page urged \u201cJust give us permission and you won\u2019t see any spam or unwanted notifications. Trust us \u2013 we only want to protect you, your data is safe!\u201d The variant shown in Figure 4 had garnered over 100,000 downloads in December 2024. The real deal? While it claims to eliminate threats, this app simply turns off browser notifications. Spam Shield displays a fake monitor showing notifications and spam email that it has blocked. After 24 hours, the user is forced to pay for a subscription ($6.99 per month in December 2024) to continue service.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-4a.jpg\" alt=\"Figure 4a\"><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-4b.jpg\" alt=\"Figure 4b\">\n<\/div>\n<p class=\"image-caption\">Figure 4. Google Play page for the Spam Shield app listed as developed by HolaCode in December 2024 and ApLabz in early 2025. This app is uniquely identified as com.spam.shield.spamblocker.notificationhistory. The Spam Shield privacy policy as of June 2025 still says HolaCode.<\/p>\n<p>The scam apps often have an accompanying website; we show Spam Shield\u2019s in Figure 5. This page links the domain to Media Alliance s.r.o., another VexTrio company.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-5.jpg\" alt=\"Figure 5\" \/><\/p>\n<p class=\"image-caption\">Figure 5. Spam Shield website links the app to the company Media Alliance s.r.o.  Captured September 2024.<\/p>\n<p>The VexTrio VPN apps are residential proxies. Everyone in the security community will cringe and sigh at that news. Not surprisingly, these \u201cVPNs\u201d have been <a href=\"https:\/\/internetsafetylabs.org\/blog\/news-press\/financial-times-highlights-me2b-alliance-research-questions-remain-about-vpns-with-the-yandex-appmetrica-sdk-installed\/\" target=\"_blank\"><strong>reported for questionable privacy<\/strong><\/a>. Figure 6 shows one example, <a href=\"https:\/\/apps.apple.com\/ao\/app\/fast-vpn-with-ad-blocker\/id1522664842\" target=\"_blank\"><strong>Fast VPN<\/strong><\/a>, which was released in 2021 by LocoMind to Google Play. An app with the same name was also <a href=\"https:\/\/apps.apple.com\/ao\/app\/fast-vpn-with-ad-blocker\/id1522664842\" target=\"_blank\"><strong>released on the App Store<\/strong><\/a> under the developer name Alpha Scale Media and with the site <span class=\"code-format\">eugene-ios-mvp[.]apperito[.]dev<\/span>; see Figure 7. Both Alpha Scale Media and Apperito are known VexTrio companies. VexTrio is frequently changing their developer information while forgetting to clean up the details. The <a href=\"https:\/\/drive.google.com\/file\/d\/18jKvCcuxMeLrN7LRhY1RAEfE9xHgW56g\/view\" target=\"_blank\"><strong>terms and conditions<\/strong><\/a> of Fast VPN as of July 2025 refers to Ads Guardian rather than the VPN.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-6.jpg\" alt=\"Figure 6\" \/><\/p>\n<p class=\"image-caption\">Figure 6. Information about Fast VPN shows that it was developed by LocoMind, a VexTrio entity. In the App Store, the developer is listed as Alpha Scale Media.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-7.jpg\" alt=\"Figure 7\" \/><\/p>\n<p class=\"image-caption\">Figure 7. <a href=\"https:\/\/apps.apple.com\/ao\/app\/fast-vpn-with-ad-blocker\/id1522664842\" target=\"_blank\"><strong>Fast VPN advertised<\/strong><\/a> on the App Store by Alphascale Media GmbH as of July 2025.<\/p>\n<p>The app ID name for Fast VPN includes the phrase \u201cturbovpn\u201d, a well-known commercial VPN. Wouldn\u2019t you think that an app with the ID com.vpn.proxy.secure.wifi.turbovpn would be related to the extremely popular Turbo VPN? Presumably, confusion is the goal. And as far as we know, there is no relationship between the Turbo VPN and any of the fake VPNs offered by VexTrio. This is consistent with VexTrio\u2019s tactic of choosing product and company names that overlap with legitimate ones.<\/p>\n<p>VexTrio and their advertising partners sometimes appear to have a shared codebase. For example, VexTrio\u2019s <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.spam.shield.spamblocker.notificationhistory\" target=\"_blank\"><strong>Spam Shield<\/strong><\/a> is almost identical to several other \u201cspam blockers\u201d available on Google Play. Figure 8 shows a comparison of the Spam Shield interface with that of <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.spam.shield.blocker.android.text.messages.antispam&#038;hl=en_US\" target=\"_blank\"><strong>Spam Lock<\/strong><\/a>. The screenshot from Spam Shield is taken from one of our personal devices in January 2025, while the screenshot of Spam Lock was taken from Google Play. But Spam Lock is not the only twin app to Spam Shield; there are many others, purportedly by different developers. For example, we\u2019ve seen nearly identical apps cited in <a href=\"https:\/\/keepmealive.jp\/iphone-hacking-spam\/\" target=\"_blank\">Japanese<\/a> reporting on scareware apps.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-8a.jpg\" alt=\"Figure 8a\"><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-8b.jpg\" alt=\"Figure 8b\">\n<\/div>\n<p class=\"image-caption\">Figure 8. The main screen of the VexTrio scam app Spam Shield in comparison to the Spam Lock scam app by VexTrio advertising partner, Techintrade. The screenshot on the left came from a personal device in January 2025. On the right, is the Google Play image captured June 2025.<\/p>\n<p>Spam Lock is supposedly developed by <a href=\"https:\/\/www.appbrain.com\/dev\/DevTapX\/\" target=\"_blank\"><strong>DevTapX<\/strong><\/a>, who is also listed as the developers of another nearly identical app, <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.spam.blocker.phone.security&#038;hl=en\" target=\"_blank\"><strong>True Blocker<\/strong><\/a>. But wait, there\u2019s more! The terms and conditions for True Blocker are nearly identical to those of another app, <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.spam.guard.blocker.protection&#038;hl=en_US\" target=\"_blank\"><strong>Spam Guard<\/strong><\/a>; see Figure 9. In early January 2025, these pages included the addresses of the responsible parties, and linked the apps to <a href=\"https:\/\/www.northdata.com\/Techintrade s%C2%B7r%C2%B7o%C2%B7, Praha\/ICO 26167735\" target=\"_blank\"><strong>Techintrade s.r.o.<\/strong><\/a> and <a href=\"https:\/\/www.northdata.com\/Oilimpex s%C2%B7r%C2%B7o%C2%B7, Praha\/ICO 26701171\" target=\"_blank\"><strong>OILIMPEX s.r.o.<\/strong><\/a>, two entities with Prague addresses and connections in Cypress. Searching in Google Play and the App Store will reveal many more almost identical scam apps.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-9a.jpg\" alt=\"Figure 9a\"><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-9b.jpg\" alt=\"Figure 9b\">\n<\/div>\n<p class=\"image-caption\">Figure 9. VexTrio advertising partners <a href=\"https:\/\/or.justice.cz\/ias\/ui\/vypis-sl-detail?dokument=14213501&#038;subjektId=525992&#038;spis=161924\" target=\"_blank\"><strong>Techintrade<\/strong><\/a> and OILIMPEX offer scam apps that have identical terms of service structure. The apps True Blocker and Spam Guard are remarkably similar to VexTrio\u2019s own Spam Shield. Captured January 2025. As of July 2025, both websites have been altered to remove company references.<\/p>\n<p><a href=\"https:\/\/or.justice.cz\/ias\/ui\/vypis-sl-firma?subjektId=525992\" target=\"_blank\"><strong>Techintrade, spol s.r.o.<\/strong><\/a> and VexTrio appear to have a relationship that goes well beyond one of customer and provider. Aside from the shared software, in the <a href=\"https:\/\/or.justice.cz\/ias\/ui\/vypis-sl-detail?dokument=14213501&#038;subjektId=525992&#038;spis=161924\" target=\"_blank\"><strong>registration documents<\/strong><\/a> for Techintrade filed in 2000, the Belarussian <a href=\"https:\/\/rejstrik-firem.kurzy.cz\/osoba\/2946079\/\" target=\"_blank\"><strong>Katsiaryna Torapava<\/strong><\/a> (b. 1971) is listed as one of the founders. In 2019, Igor Voronin and Andrew Kunitsa assigned Katerina Toropova as a director for AdsPro Group; see Figure 10. While the spellings are different, the birth dates are the same. In 2024, Techintrade appears to have <a href=\"https:\/\/or.justice.cz\/ias\/content\/download?id=3e708e8519c24662a216420a7c675c65\" target=\"_blank\"><strong>claimed no income<\/strong><\/a> in online marketing.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-10.jpg\" alt=\"Figure 10\" \/><\/p>\n<p class=\"image-caption\">Figure 10. An extract of a 2019 record in which Andrew Kunitsa and Igor Vornin <a href=\"https:\/\/or.justice.cz\/ias\/content\/download?id=6c641f2d01bd4890ac57546de99a5043\" target=\"_blank\"><strong>name Katerinu Toropovou<\/strong><\/a> (nominative Katerina Toropovo), as managing director of AdsPro Group. This is the same birthdate and near-identical name to one of the founders of Techintrade s.r.o. <\/p>\n<p>OILIMPEX was <a href=\"https:\/\/or.justice.cz\/ias\/ui\/vypis-sl-firma?subjektId=661880\" target=\"_blank\"><strong>founded<\/strong><\/a> in 2002 by Dmitri Pachenko (b. 1962), also from Belarus. He later registered <a href=\"https:\/\/rejstrik.penize.cz\/25792725-overdrive-systems-cz-s-r-o\" target=\"_blank\"><strong>Overdrive Systems<\/strong><\/a> in 1999. But, beyond seemingly sharing software with OILIMPEX and VexTrio, we don\u2019t know much about Pachenko or the company. The financial <a href=\"https:\/\/or.justice.cz\/ias\/ui\/vypis-sl-firma?subjektId=661880\" target=\"_blank\"><strong>records are available<\/strong><\/a> on the Czechia government website.  <\/p>\n<p>Finally, these two companies are included as hostnames in DNS records of holacode[.]tech. The domains <span class=\"code-format\">vm-oilimpex.holacode[.]tech<\/span> and <span class=\"code-format\">vm-technitrade.holacode[.]tech<\/span> resolve to <span class=\"code-format\">185[.]155 [.]186 [.]134<\/span>, a dedicated VexTrio IP address as of mid-July 2025. While the exact nature of their relationship isn\u2019t known, it appears close in nature!<\/p>\n<h3>Spam<\/h3>\n<p>Los Pollos insists that it does not work with affiliates who drive web traffic through spam emails, and <a href=\"https:\/\/www.lospollos.com\/faq\/\" target=\"_blank\"><strong>its website prominently<\/strong><\/a> states a zero-tolerance policy. Yet behind the scenes, VexTrio is a major spam distributor that reaches out to millions of potential victims. DNS records reveal that VexTrio uses lookalike domains of globally renowned mail services. Most notably <a href=\"https:\/\/www.google.com\/aclk?sa=l&#038;ai=DChsSEwiVhOLRi7-OAxVzKq0GHbRfH8QYACICCAEQAhoCcHY&#038;co=1&#038;ase=2&#038;gclid=Cj0KCQjw-NfDBhDyARIsAD-ILeDthQnrajthuZfBWB8BZxk1uQa1FB46m3adKKzm5t1VFU_S6XXIwHgaAqU9EALw_wcB&#038;ei=2md2aMLaOODz0PEP2fzs4A4&#038;category=acrcp_v1_48&#038;sig=AOD64_1rJXzDNVsX4jnxQy0jzoNJg9FcRg&#038;q&#038;sqi=2&#038;nis=4&#038;adurl&#038;ved=2ahUKEwjCr9HRi7-OAxXgOTQIHVk-G-wQ0Qx6BAgNEAE\" target=\"_blank\"><strong>SendGrid<\/strong><\/a>, with <span class=\"code-format\">sendgrid[.]rest<\/span>, and <a href=\"https:\/\/www.mailgun.com\/\" target=\"_blank\"><strong>MailGun<\/strong><\/a>, with <span class=\"code-format\">mailgun[.]fun<\/span>. We don\u2019t know if these companies have any financial relationship with VexTrio entities or whether they are aware of the infringement. These two domains have mail-related DNS TXT records providing the domains\u2019 sender policy framework (SPF) policy <\/p>\n<p style=\"text-align:center;\"><span class=\"code-format\">v=spf1 a mx ip4:78[.]47.103.187 ~all<\/span><\/p>\n<p>which authorizes <span class=\"code-format\">78 [.] 47 [.] 103 [.] 187<\/span> to be the sole email distributor for the domain. <\/p>\n<p>The DNS PTR record for this IP address is <span class=\"code-format\">mail[.]holaco[.]de<\/span> as of July 2025. <a href=\"https:\/\/web.archive.org\/web\/20241226171437\/https:\/www.portomontenegro.com\/shop-and-dine\/holacode\/\" target=\"_blank\"><strong>Hola Code<\/strong><\/a> is the VexTrio entity responsible for the software development behind their many commercial services. In addition, numerous other VexTrio domains are also connected to the mail server at this IP address.<\/p>\n<p>While we focus on DNS, we also collect and analyze spam. Our database contains many emails featuring links to TDS domains operated by VexTrio. Distributed from a variety of mail servers, these messages originate from both VexTrio entities and their affiliates. Among them are several domains that were used both in the links as well as the email address that sent the email. Those domains were configured with the DNS TXT record<\/p>\n<p style=\"text-align:center;\"><span class=\"code-format\">v=spf1 include:_spf.smtp.com include:_spf.ynotmail.com ~all<\/span><\/p>\n<p>This SPF record is recursive and might be tricky to understand. It tells receiving mail servers that any IP address matching the mechanisms defined in the SPF records at <span class=\"code-format\">_spf.smtp.com<\/span> or  <span class=\"code-format\">_spf.ynotmail.com<\/span> is authorized to send emails on behalf of the domain. So, the receiving server has to then check the SPF records for those delegated domains. The TXT record for <span class=\"code-format\">_spf.ynotmail.com<\/span> was recently set to include several large IP ranges, but that\u2019s not particularly important for this story. The important point is that domains that are definitively owned by VexTrio, for example, <span class=\"code-format\">datingcell[.]com<\/span>, have used a service to deliver mail on their behalf. <\/p>\n<p><a href=\"https:\/\/www.ynotmail.com\/\" target=\"_blank\"><strong>YNOT Mail<\/strong><\/a> is a commercial, subscription-based paid email marketing platform, and we suspect that VexTrio contracts (or contracted) with YNOT Mail for additional mail delivery beyond their own mail servers. To our knowledge, YNOT Mail is not part of VexTrio but merely a conduit to further their spam campaigns.<\/p>\n<p>The domains with the YNOT Mail SPF record include: <\/p>\n<ul>\n<li class=\"code-format\">cuddlydating[.]com<\/li>\n<li class=\"code-format\">datingcell[.]com<\/li>\n<li class=\"code-format\">empowermanpower[.]com<\/li>\n<li class=\"code-format\">hedonism[.]global<\/li>\n<li class=\"code-format\">hpc[.]marketing<\/li>\n<li class=\"code-format\">hpc[.]world<\/li>\n<\/ul>\n<p>This implies that YNOT Mail is distributing email on behalf of these domains. But at the same time, these domains are advertising themselves as email marketing firms. The domains <span class=\"code-format\">datingcell[.]com<\/span>, <span class=\"code-format\"><a href=\"https:\/\/web.archive.org\/web\/20240905021356\/http:\/www.cuddlydating.com\/\" target=\"_blank\">cuddlydating[.]com<\/a><\/span>, and <span class=\"code-format\">hpc[.]marketing<\/span> previously displayed homepages that promised customers access to \u201cover 220 million addresses.\u201d What struck us was that these sites used virtually the <a href=\"https:\/\/web.archive.org\/web\/20241107225847\/https:\/\/cuddlydating.com\/\" target=\"_blank\"><strong>same web template<\/strong><\/a> as <span class=\"code-format\">fidelityemail[.]com<\/span>, a domain that belongs to VexTrio\u2019s email marketing company <a href=\"https:\/\/web.archive.org\/web\/20240813053809\/https:\/www.fidelitymail.com\/\" target=\"_blank\"><strong>Fidelity Mail<\/strong><\/a>. <\/p>\n<p>Figure 11 presents a side-by-side comparison of the homepages for <span class=\"code-format\">fidelityemail[.]com<\/span> and <span class=\"code-format\">datingcell[.]com<\/span>. Because nothing is simple with VexTrio, of course Fidelity Mail does not use the YNOT Mail SPF record. Instead, it is tied to <span class=\"code-format\">78[.]47[.]103[.]187<\/span>, the IP address for <span class=\"code-format\">mail.holaco[.]de<\/span>. The websites are not only using the same template, but <span class=\"code-format\">datingcell[.]com<\/span> resolves in VexTrio\u2019s Swiss data center IP range. This combination of factors implies that the group relies on third-party servers to conduct some of their email campaigns.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-11.jpg\" alt=\"Figure 11\" \/><\/p>\n<p class=\"image-caption\">Figure 11. Snapshot of the fidelitymail[.]com and datingcell[.]com websites, captured on November 16, 2024<\/p>\n<p>The domain <span class=\"code-format\">datingcell[.]com<\/span> was used to deliver dating scams. We found dating-spam emails in our own spam collection. For example: <\/p>\n<ul class=\"list-spacing\">\n<li>Emails were sent from <span class=\"code-format\">postmaster[@]datingcell[.]com<\/span> via the SMTP host at <span class=\"code-format\">99[.]192[.]179[.]143<\/span>.<\/li>\n<li>That IP belongs to <span class=\"code-format\">smtp[.]trafficiq[.]com<\/span>, a mail-server domain operated by YNOT Mail.<\/li>\n<li>To grab recipients\u2019 attention, VexTrio personalizes the subject lines with second-person phrasing, for example:\n<ul>\n<li>\u201cFakeemaiy01, Eva just sent you a new message &amp; wants to meet \ud83d\udc8c\u201d<\/li>\n<li>\u201cMaili88, do you want to meet? I\u2019m from Bingen am Rhein too\u201d<\/li>\n<li>\u201cDiana from Kingston is viewing your Fakeemaiy01 profile NOW \ud83d\udc8b\u201d<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Each email contains an HTML message that masquerades as a chat or text exchange from a prospective dating partner; see Figure 12.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-12.jpg\" alt=\"Figure 12\" \/><\/p>\n<p class=\"image-caption\">Figure 12. Examples of spam emails sent by VexTrio seen in Infoblox data. This shows the email\u2019s HTML body content, which is embedded with a link that redirects to <span class=\"code-format\">datingcell[.]com<\/span>.<\/p>\n<p>The buttons in the HTML messages are embedded with a <span class=\"code-format\">trafficiq[.]com<\/span> PHP link that belongs to YNOT Mail and tracks user clicks. Afterward, the tracker redirects the victim to VexTrio\u2019s dating scam (see Figure 13).<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-13.jpg\" alt=\"Figure 13\" \/><\/p>\n<p class=\"image-caption\">Figure 13. Spam HTML message contains embedded trafficiq link that redirects to the <span class=\"code-format\">datingcell[.]com<\/span> scam page.<\/p>\n<p>Once the victim lands on the dating-themed scam, VexTrio masquerades as a fictional dating site called \u201cBIGO LOVE.\u201d This fake site is served by IPs in AS5398\u2014part of VexTrio\u2019s data center located in Lugano, Switzerland. The spoofed site walks the visitor through a short questionnaire designed to profile their online behavior (Figure 14). After harvesting this information, VexTrio silently forwards the user to one of its adult content advertisers and collects a referral commission.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-14.jpg\" alt=\"Figure 14\" \/><\/p>\n<p class=\"image-caption\">Figure 14. Dating scam on landing page that uses the <span class=\"code-format\">datingcell[.]com<\/span> domain<\/p>\n<p>We reviewed <span class=\"code-format\">datingcell[.]com<\/span> domain registration records and web archives predating 2023 and found several suspicious indicators. While we cannot definitively confirm that VexTrio owned the domain before 2023, we did uncover artifacts consistent with the group\u2019s known activities, as well as other forms of fraud operation. Figure 15 displays web content that <span class=\"code-format\">datingcell[.]com<\/span> used in late 2017; its purpose was to share contact information of dating candidates.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-15.jpg\" alt=\"Figure 15\" \/><\/p>\n<p class=\"image-caption\">Figure 15. Screenshot of <span class=\"code-format\">datingcell[.]com<\/span> used by a dating portal site in December 2017<\/p>\n<p>In mid-2017, the domain was abused by threat actors for phishing attacks and it targeted various brands including Google products, Dropbox, and the Christian Mingle dating site. Figure 16 shows a phishing page hosted on <span class=\"code-format\">datingcell[.]com<\/span> that impersonated Dropbox while presenting a fake Gmail sign-in form.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-16.jpg\" alt=\"Figure 16\" \/><\/p>\n<p class=\"image-caption\">Figure 16. Screenshot of <span class=\"code-format\">datingcell[.]com<\/span>, which was used in a phishing operation targeting Dropbox in 2017<\/p>\n<p>Early registration records for <span class=\"code-format\">datingcell[.]com<\/span> point to a figure whose background mirrors that of VexTrio\u2019s leadership. In 2011, Yevgen Telychko registered the domain using the email address <span class=\"code-format\">yevgen[@]telychko[.]com<\/span> (Figure 17). According to his <a href=\"https:\/\/www.linkedin.com\/in\/yevgentelychko\/?originalSubdomain=ca\" target=\"_blank\"><strong>LinkedIn page<\/strong><\/a>, Yevgen grew up in Ukraine and has extensive experience in affiliate marketing, including the dating industry. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-17.jpg\" alt=\"Figure 17\" \/><\/p>\n<p class=\"image-caption\">Figure 17. 2011 domain registration details of <span class=\"code-format\">datingcell[.]com<\/span> showing contact details for Yevgen Telychko, a Ukrainian with extensive dating affiliate marketing experience<\/p>\n<p>At the time of writing, the base pages for <span class=\"code-format\">datingcell[.]com<\/span>, <span class=\"code-format\">cuddlydating[.]com<\/span>, and <span class=\"code-format\">hpc[.]marketing<\/span> all display a simple maintenance notice: \u201cThe website is undergoing maintenance. Please come back later.\u201d One of VexTrio\u2019s other email marketing platforms, <span class=\"code-format\">articheck[.]ch<\/span> also appears offline. Homepages of VexTrio\u2019s email marketing platforms <span class=\"code-format\">fidelityemail[.]com<\/span> (Fidelity Mail) and <span class=\"code-format\">datasnap[.]ch<\/span> (Datasnap) are still currently available. Articheck <a href=\"https:\/\/urlscan.io\/result\/ea99d82d-1cc9-4ae8-92e2-e6033311b1cd\/\" target=\"_blank\"><strong>has at times redirected<\/strong><\/a> to DataSnap. See Figure 18.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-18.jpg\" alt=\"Figure 18\" \/><\/p>\n<p class=\"image-caption\">Figure 18. Webpages for <a href=\"https:\/\/urlscan.io\/result\/0adcda56-03f6-47be-a7f1-8aabf1357050\/\" target=\"_blank\"><span class=\"code-format\">articheck[.]ch<\/span><\/a> and <a href=\"https:\/\/urlscan.io\/result\/47f34f6c-3880-4027-84d7-d99f063b7709\/\" target=\"_blank\"><span class=\"code-format\">datasnap[.]ch<\/span><\/a> as captured in 2024 <\/p>\n<h3>And More?<\/h3>\n<p>VexTrio-related DNS records confounded us for years. How was it possible that IP address space almost entirely dedicated to malicious operations also hosted ski resorts, gift shops, and restaurants? The discovery of VexTrio\u2019s true identity as a global enterprise made us realize these were not outliers, they were all part of the extended commercial enterprise. But how? We are not sure. Besides those hosted in VexTrio data centers, the key figures in VexTrio are connected to dozens of companies, many seemingly unrelated to their core spam and scam business model. Many of these businesses are involved in very large-scale financial transactions.<\/p>\n<p>For example, it is a puzzle to us how a <a href=\"https:\/\/profine.energy\/en\/\" target=\"_blank\"><strong>German company<\/strong><\/a>, <a href=\"https:\/\/tracxn.com\/d\/companies\/profine-energy\/__olC0nJrK7fw7bzixNB4CSzXiZl1784ImhTh6K5zfzq0#about-the-company\" target=\"_blank\"><strong>Profine Energy GmbH<\/strong><\/a> ended up in a deal with Kroum Vassilev (through Enevlo EEOD) to create Profine Energy Bulgaria. Kroum is not only the self-described cofounder of AdsPro and Los Pollos but has a long history in industries that are, shall we say, not in the energy sector. This type of business relationship highlights the complex nature of analyzing the VexTrio extended enterprise; it is very hard to separate the good from the bad. According to the <a href=\"https:\/\/portal.registryagency.bg\/CR\/bg\/DocumentAccess\/MjA3MjI2MTQ2JmUmNTU0NjA2NmY1MGVkNDMyMWJkZjhhYWE4NjdjNmU1MTY2U7gnaNR1OsauZROqYYW3CyT7t8JdwYRfQL79-XbTPQ\" target=\"_blank\"><strong>articles of registration<\/strong><\/a>, the initial capital of Profine Energy Bulgaria is 1,000 shares at 10 BGN each, worth about US$6,000 in July 2025. The company would develop \u201cBulgaria\u2019s first floating PV plant in the northwestern part of the country, by the Ogosta reservoir\u201d and that the project would \u201c<a href=\"https:\/\/serbia-energy.eu\/bulgarias-first-floating-solar-power-plant-to-be-built-at-ogosta-reservoir\/\" target=\"_blank\"><strong>cost an estimated 600-800M Euro<\/strong><\/a>\u201d to complete. Profine Energy <a href=\"https:\/\/seenews.com\/news\/germanys-profine-energy-signs-loi-for-1-bln-euro-solar-plant-in-bulgaria-1221697\" target=\"_blank\"><strong>reportedly signed a letter<\/strong><\/a> of intent to <a href=\"https:\/\/www.profine-group.com\/cms16\/files\/2022-11-23-ProfineEnergy-press-release-invest-in-Bulgaria2.pdf?download=1#:~:text=Caption:%20The%20Managing%20Directors%20Markus,as%20other%20Bulgarian%20government%20representatives.&#038;text=About%20Profine%20Energy:,production%20from%20wind%20and%20biomass.\" target=\"_blank\"><strong>invest \u20ac1 billion<\/strong><\/a> into Bulgaria. Profine Energy is a subsidiary of the <a href=\"https:\/\/www.profine-group.com\/en\/\" target=\"_blank\"><strong>Profine Group<\/strong><\/a>, a plastics manufacturing company founded in 2003. According to reporting from September 2024, <a href=\"https:\/\/www.power-technology.com\/data-insights\/top-5-solar-pv-plants-in-development-in-bulgaria\/\" target=\"_blank\"><strong>the solar plant is under development<\/strong><\/a> and expected to be commercial in 2026. Perhaps more than anything, the case of Profine Energy Bulgaria shows that the shady adtech and the adult industry are within arm\u2019s reach of mega investment companies. Figure 19 shows companies that have indirect relationships with VexTrio or its leadership team.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-figure-19.jpg\" alt=\"Figure 19\" \/><\/p>\n<p class=\"image-caption\">Figure 19. Business entities with notable relationships to VexTrio key figures include marketing firms, a software development organization, payment processing, physical access systems, and ski resorts<\/p>\n<h3>To Conceal Fraud is Itself a Fraud<\/h3>\n<p>A scam is a deliberate scheme designed to defraud or deceive someone, usually for financial gain. It typically involves false promises, misrepresentation, or manipulation that persuade the target to hand over money, sensitive information, or some other valuable resource. With that definition in mind, we are astonished that VexTrio has operated\u2014and thrived\u2014for 15 years without facing legal consequences. Its activities fit every hallmark of a scam: using deception to corruptly steer unsuspecting internet users. Whether through bogus push-notification lures, \u201ctoo-good-to-be-true\u201d investment success stories that funnel traffic into cryptocurrency fraud, or blatant trademark abuse on platforms like TikTok and Tinder to inflate affiliate referrals to adult sites, VexTrio epitomizes the very practices the security community condemns.<\/p>\n<p>The quote \u201cThere is nothing more deceptive than an obvious fact\u201d by Arthur Conan Doyle (through Sherlock Holmes) reminds us that even highly educated security professionals are easily fooled by conditions that are simple to interpret. Too often, internet authorities dismiss anything that looks like adtech as low-severity nuisance. Cybercriminals can exploit this tendency, presenting selective facts that appear self-evident while concealing the larger and malicious reality. And so this begs the question, how long, do we as a community, keep turning a blind eye to stories like VexTrio\u2019s? Our takedown efforts have caused temporary disruption, but they fall far short of ending the scheme.<\/p>\n<p>We close with Publilius Syrus\u2019s famous line: \u201cFraus est celare fraudem\u201d\u2014to conceal fraud is itself a fraud.<\/p>\n<p>Now that we covered VexTrio\u2019s fraudulent activities, we will move on to how their infrastructure is configured and the technology stack they rely on to run global operations. Find the next installment here.<\/p>\n<style>\n.savy-seahorse-table {font-size:14px;word-break: keep-all;}.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {padding-right:10px;}.\/*code-format {\tfont-family: 'Courier New';}*\/.image-caption {    font-size: 12px;margin-top:auto;}.list-spacing li{margin-bottom:20px}.img-container, .img-container-3-col {display: flex;}.img-container img {    width: 40%;    margin-bottom: 10px;    height: max-content !important;}.img-container-3-col img {width: 30%;margin-bottom: 10px;}@media (max-width: 767px) {.img-container, .img-container-3-col {display: block;}.img-container img, .img-container-3-col img {width: 100%;}.grid-container {    grid-template-columns: 1fr!important;  }}@media (min-width: 767px) {.img-50{width:50%;}}.grid-container {  display: grid;  grid-template-columns: repeat(2, 1fr);  gap: 40px;  max-width: 800px;  margin: 0 auto;  align-items: stretch;}.grid-item {   display: flex;  flex-direction: column;  justify-content: flex-start;}.grid-item img {  width: 100%;  height: auto;}.image-caption {font-size: 12px;}<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">VexTrio Unmasked<\/span>: A Legacy of Spam and Homegrown Scams');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the second in a three-part, in-depth report covering nearly a year of research into VexTrio. To learn more about the people and entities involved, see the first part here. To learn about VexTrio\u2019s infrastructure and technology stack, see here. VexTrio domains and references from this research can be found in our GitHub repository. [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":12154,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[592,709,902,1287,1288],"class_list":{"0":"post-12121","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-ecosystem","9":"tag-vextrio","10":"tag-tds","11":"tag-malicious-advertising","12":"tag-spam-operation","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Robot Exposes VexTrio&#039;s Online Fraud Empire<\/title>\n<meta name=\"description\" content=\"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Robot Exposes VexTrio&#039;s Online Fraud Empire\" \/>\n<meta property=\"og:description\" content=\"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-12T14:58:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-03T11:37:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"890\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Robot Exposes VexTrio&#039;s Online Fraud Empire\" \/>\n<meta name=\"twitter:description\" content=\"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"25 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"VexTrio Unmasked: A Legacy of Spam and Homegrown Scams\",\"datePublished\":\"2025-08-12T14:58:55+00:00\",\"dateModified\":\"2025-10-03T11:37:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/\"},\"wordCount\":4632,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg\",\"keywords\":[\"Ecosystem\",\"VexTrio\",\"TDS\",\"Malicious Advertising\",\"Spam Operation\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/\",\"name\":\"Robot Exposes VexTrio's Online Fraud Empire\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg\",\"datePublished\":\"2025-08-12T14:58:55+00:00\",\"dateModified\":\"2025-10-03T11:37:02+00:00\",\"description\":\"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg\",\"width\":890,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"VexTrio Unmasked: A Legacy of Spam and Homegrown Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Robot Exposes VexTrio's Online Fraud Empire","description":"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/","og_locale":"en_US","og_type":"article","og_title":"Robot Exposes VexTrio's Online Fraud Empire","og_description":"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/","og_site_name":"Infoblox Blog","article_published_time":"2025-08-12T14:58:55+00:00","article_modified_time":"2025-10-03T11:37:02+00:00","og_image":[{"width":890,"height":520,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Robot Exposes VexTrio's Online Fraud Empire","twitter_description":"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"25 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"VexTrio Unmasked: A Legacy of Spam and Homegrown Scams","datePublished":"2025-08-12T14:58:55+00:00","dateModified":"2025-10-03T11:37:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/"},"wordCount":4632,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg","keywords":["Ecosystem","VexTrio","TDS","Malicious Advertising","Spam Operation"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/","name":"Robot Exposes VexTrio's Online Fraud Empire","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg","datePublished":"2025-08-12T14:58:55+00:00","dateModified":"2025-10-03T11:37:02+00:00","description":"We reveal how VexTrio has profited from spam and scams for decades, gaining persistent access to victims through fake captchas and browser notifications.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams-image-thumbnail.jpg","width":890,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"VexTrio Unmasked: A Legacy of Spam and Homegrown Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12121"}],"version-history":[{"count":9,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12121\/revisions"}],"predecessor-version":[{"id":12155,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12121\/revisions\/12155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12154"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}