Industries

Overview

Industries We Serve

Discover who we empower to make the world safer.

Professional Practices

Private Investigators

Giving private investigators access to extensive digital information.

Risk Protection

Identifying threats with live data to aid risk management.

Insurance & Fraud

Detecting fraud and mitigating risks with real-time analysis.

Cyber Security

Discovering, assessing and mitigating potential cyber threats.

Law Professionals

Aiding legal professionals in digital evidence-gathering.

Anti-Money Laundering

Boosting AML efforts with actionable intelligence on suspicious activity.

Service Sectors

Government
Free Access

Empowering governments with swift digital identity verification.

Law Enforcement
Free Access

Providing tools for law enforcement to accurately track digital footprints.

Journalism
Free Access

Enabling journalists to authenticate sources and combat disinformation.

Non-Profits
Free Access

Helping investigative non-profits make the world a safer place.

Products
OSINT PlatformAPIEnterprisePalette
Insights
Intel HubCase StudiesTraining LogPublicationsPress Releases
Contact
Our TeamContact Us
TrainingPricing
Sign Up
Search Now
All Case Studies
5 min read

Russia’s Email Problem: How OSINT Exposes Russian Embassies Worldwide

Written by
OSINT Industries Team
Published on
March 2, 2026
Submit a Case Study

Jordan investigated 342 Russian embassy emails with OSINT Industries. This is what he found. 

"I thought it would be easier to carry just one device for my work and for my personal emails instead of two… and obviously, it hasn't worked out that way.” – Hillary Clinton, [Source: BBC]

By now, an email scandal is almost an electoral tradition. American politics and high-profile email controversies go together like bread and butter - or peanut butter and jelly, to be more accurate.

Hillary Clinton, found innocent regarding her personal emails, on her phone. [Source: LA Times]

Email has been at the centre of some of the most consequential political revelations of this century, and that’s excluding the legend of ‘Hillary’s emails’. To start that year, an internal audit by the U.S. Inspector General found Ambassador Caroline Kennedy and other senior staff at Tokyo’s US embassy used personal email accounts for official government business, including messages classified as “sensitive but unclassified (SBU).” By midway through 2016, the Democratic National Committee (DNC) - central organisational body for the U.S. Democratic Party - saw Russia-linked hackers Guccifer 2.0 get their hands on 19,000 emails and 8,000 attachments from senior figures. With primary campaigns ongoing, DNC chair Debbie Wasserman Schultz could have done without exposure of party bias against then-candidate Bernie Sanders. Wasserman Schultz was prompted to resign shortly before the party convention, and the lesson she learned was pretty blunt: once your email security fails, you lose control over information forever.

Still, by March, campaign chair John Podesta had fallen victim to a spear-phishing email. An aide had made a typo, writing: “This is a legitimate email… John needs to change his password immediately.” The FBI and CIA assessed the same Russia-linked group was to blame.

"The sort of ways you handle personal mail and the way you handle highly sensitive mail is very different… This is why security-conscious enterprises want to keep a complete separation.” – Nicko van Someren, CTO for secure communications company Good Technology Corp. [Source: USA Today]

Republican Colin Powell, former U.S. Secretary of State under President George W. Bush conducted official government business using a personal AOL email account for over twenty years. When Powell’s personal AOL account was another victim of 2016, a cache of his emails exposed a shocking amount of foreign policy, internal political dynamics, and unfavorable assessments of other officials. He’d even offered advice to other officials on managing government correspondence outside official systems - and around 90 had taken up the challenge.

Some political figures even persist in using ‘old-school’ consumer emails with little security, like AOL. [Source: PBS]

Hillary Clinton, John Podesta, Colin Powell, Caroline Kennedy, Jared Kushner, Steven Miller, Mike Pence, Reince Priebus, Sarah Palin, National Security Adviser Michael Waltz, Obama’s transition team and Ivanka Trump have something in common. They all failed to learn lessons about bad email security. 

Using a Blackberry, AOL, Gmail or some other platform, they have all used private emails for government business or government emails for private business. Many of these figures have suffered far-reaching consequences, and not just in the court of public opinion. The post-2016 compromise and public release of political and embassy emails in the United States demonstrates above all else that dangerous email behaviors will be weaponised for geopolitical effect. The pattern with perpetrators exploiting these soft spots has made another world power just as synonymous in the news with email: Russia. 

Global cybersecurity reporting indicates that Russia-aligned email attack campaigns have targets that extend even beyond politics. Data pillaged from vulnerable emails - crossover between personal and official accounts being a prime source of vulnerability - is invaluable to Kremlin-backed operators. Civil society organisations, NGOs, and even former ambassadors are easy targets for Russian bad actors seeking to harvest credentials or infiltrate sensitive networks - all because somebody made a poor choice about an old Hotmail account. 

But does Russia have its own email vulnerabilities?

Back in October 2016, Ukrainian hacktivists CyberHunta proved they might. The collective, part of the wider Ukraine Cyber Alliance, did so to the tune of a 1GB dump including 2,337 emails. Vladislav Surkov, Russia’s ‘grey cardinal’ managing Russian policy toward Ukraine, let his assistants use a vulnerable inbox to send data and attachments related to separatist coordination, including correspondence with separatists like Denis Pushilin. 

‘Grey cardinal’ Vladislav Surkov with Vladimir Putin. [Source: FT/AFP]

The Kremlin was quick to deny the authenticity of the leak. That the emails included scans of Surkov’s passport and family documents made this difficult to say the least. Since Surkov, we’ve seen the likes of the 2021 Vulkan Files and 2023 Cyber Resistance 11GB mail hack on Deputy Duma Chairman Aleksandr Babakov.

Now a new report shows an OSINT Industries-backed researcher proving Russian diplomats, when it comes to email, are stuck in 2016. They’re still making the massive email mistakes that good guys - or worse, even badder guys - can exploit. With just a little OSINT, a keen analyst would be able to turn the tables on Russian leakers; the fault for which would lie with embassies themselves. 

There are approximately 143 Russian embassies worldwide, across every continent. This is what gets exposed when you search their public email addresses on OSINT Industries.

“In retrospect, as I look back at it now, even though it was allowed, I should have used two accounts. One for personal, one for work-related.” – Hillary Clinton,  [Source: Guardian]

Meet Jordan, an OSINT/SOCMINT Analyst.

Jordan S. is an OSINT/SOCMINT Analyst, and an OSINT Industries user. A stellar example of an independent OSINT professional, Jordan’s investigations have been previously featured as Case Studies.

OSINT has supported Jordan’s work from video game writing to due diligence, SOCMINT, missing persons, and journalistic efforts - including in difficult OSINT climates like Japan. It’s been a part of Jordan’s life since he “was 11, without even knowing it”. Soon he was a teenager “tracking down sources of information for facts that had a [citation needed] template” on wikisites. 

Jordan began his career as a Deputy Director. Now, his own site employs a Deputy Director under him. Constantly scouting for opportunities to put his OSINT analysis skills to the test, OSINT Industries is an everyday part of Jordan’s workflow.

This time, inspired by OSINT Industries CEO Nathaniel Fried’s Donetsk and South African government email investigations, Jordan looked Eastward. 

“Much has been said about federal officials using personal email accounts to conduct government business and why that’s a bad idea, yet this still continues.” – Jordan, an OSINT and SOCMINT Analyst [Source: OSINT Industries]

Jordan found that Russia’s 143 embassies worldwide publicize official emails as points of contact: a disclosure that “opens up many new avenues for collection of OSINT”. Painstakingly, he collected on a spreadsheet 324 email addresses for every Russian embassy in the world, and began to use our platform to follow their digital footprints.

Running official addresses through OSINT Industries, it’s normal to expect few if any registrations to online platforms and consumer services. At least, that’s how it should be. 

You’ve Got Mail, Moscow: The Scale of Exposure

“This is not a normal distribution of accounts for official Russian government email addresses…” – Jordan, an OSINT and SOCMINT Analyst [Source: OSINT Industries]

Running 324 official worldwide Russian embassy email addresses through OSINT Industries, Jordan found an astonishing number of hits:

Compared to other government examples, the number of signups was extremely anomalous. Jordan found that in addition to - “or instead of” - diplomatic communications, Russian diplomats are using their emails to sign up for Facebook, Call of Duty and XVideos. Dating service WayToHey and LovePlanet had one signup each.

Even worse, many of Russia’s diplomatic emails are flawed from the start: two email addresses are registered with Yahoo, two are registered with Hotmail, fifteen are registered with Gmail, one is registered with MSN, and eighteen are registered with Yandex. Personal email providers like these offer nothing near the level of security required for diplomatic communications. 

A screenshot of a phoneAI-generated content may be incorrect.

Russian attaché office contact email addresses. [Source: OSINT Industries/Jordan S. via washington.mid.ru)

Jordan then found the defense, military, air and navy attaché offices of the Russian embassy in Washington, D.C. don’t use secure email services either. They advertise their emails as defattru@msn[.]com, rusmilatt@hotmail[.]com, rusafatt@gmail[.]com and rusnavyoffice@yahoo[.]com respectively. The security risk this creates is incalculable.

‍“Personal email accounts… They are prime targets for attackers.” – Nabil Hannan, chief information security officer at NetSPI. [Source: WSJ]

OSINT Industries searches suggest separation of personal and private is being altogether ignored by Russian embassy officials; officials often occupying extremely sensitive positions in their host countries. Next, Jordan set out to investigate just what it is these accounts are up to. What, we might ask, does a Russian diplomat post on Instagram?

Signed Up and Signed Away: The Attack Surface Expands

Jordan delineated his findings by OSINT Industries module: Yandex, Facebook, Twitter, and Google. Even a routine digital presence on each platform leaves an open door for OSINT, and serious operational security risks for embassies. 

Yandex (Яндекс)

31 of the email dresses used had accounts on Yandex, effectively Russia’s Google. More than just Russia’s dominant search engine, Yandex - like Google - is an email provider through Yandex Mail, a cloud storage platform, a maps site, a browser, a way to hail rides and most recently an AI provider.

All but 2 of the Yandex accounts use the Russian coat of arms as their profile picture. Two don’t. The first, rusconsbasrah-iraq@yandex[.]ru or username “Vagif G.” and a profile picture showing an unknown building. The second, rusemb-minsk@yandex[.]rugoes a step further. It shows the Russian embassy in Minsk, Belarus. Bad actors could potentially geolocate the building from this image with relative ease. 

Reports suggest the Surkov leaks occurred in part through Yandex-linked inboxes.

Facebook and Twitter 

46 embassy emails are connected to Facebook accounts.

If this wasn’t already inappropriate enough, using OSINT Industries on the Tokyo embassy email (pressjp@mid[.]ru) reveals a hint for an additional email address via Facebook: t*****1@gmail[.]com. The Zimbabwe embassy email russconswdc@gmail[.]com reveals a second partial email via Facebook too: r*****c@y*******[.]ru. The same occurs with veleposlanstvo-ruske-federacije@zg[.]htnet[.]hr, the address for Russia’s Croatia embassy in Zagreb: OSINT Industries’ Facebook module reveals v*****e@y*******[.]ru.

Jordan found 20 of the Facebook accounts have additional phone number hints:

These include at-risk states like Pakistan, Iran and Norway. By linking embassy emails to Facebook accounts, these diplomats take the risk of bad actors (or competent analysts) finding these personal emails and phone numbers, likely added as credential-recovery data. Phishing, SIM-swap attacks, and account takeover become a whole lot easier with this data accessible through simple OSINT - no advanced hacking required.

Likewise, 72 Russian embassy email addresses are registered on Twitter. OSINT Industries identified 18 that have partial phone number hints, including states as major as Australia:

Google Maps

Every OSINT investigator or analyst knows Google Maps is crucial for GeoINT.  

59 Russian embassy emails have Google accounts. According to Jordan’s research, only one of them has made the (inadvisable) decision to post reviews on Maps.  The Russian embassy in Dhaka, Bangladesh gave two five star ratings: the Fools Diner at H.No, 67/C Rd No 13B, Dhaka 1213, Bangladesh on June 29, 2017, and North End Coffee Roasters at Justice Shahabuddin Ahamed Park, Dhaka 1212, Bangladesh on March 18, 2023.

We can only assume the service is worth compromising your safety for. 

The Russian embassy in Dhaka, Bangladesh’s reviews of two local businesses on Google Maps. [Source: OSINT Industries/Google]

Jordan found no other embassy emails have posted reviews on Maps, but several have posted photos. 

The Russian Embassy in South Africa (ruspospr@mweb.co[.]za) posted a photo of the building’s exterior in March 2012. Google Maps lists an “unknown place” as the photos’ location; the plaque visible in the photos makes clear that this is the Russian embassy. 

Photo posted by the Russian embassy in Pretoria, South Africa to Google Maps. [Source: OSINT Industries/Jordan S. via Google Maps]

The Russian Consul of Sri Lanka and Maldives (rusconsul.srilanka@gmail[.]com) posted two exterior photos in September 2024, featuring their door’s locking mechanism. 

All these photo uploads remain up to this day for anybody to see. This is a major OSINT misstep. Altogether, the content posted by these email accounts on Maps makes embassy staff easier to profile, locations easier to confirm, and officials or employees easier to target for harm. 

Images posted by the Russian embassy of Sri Lanka and the Maldives. [Source: OSINT Industries/Jordan S. via Google Maps]

The Napster Anomaly: A Civilian in the Loop

Jordan found one anomaly that was truly bizarre. 317 Russian embassy and consulate email addresses are registered on Napster - more than Facebook, Google and Twitter combined. 

This includes Washington, D.C., Zimbabwe, Jamaica, Bangladesh, Iran, Sri Lanka, UAE, Japan and India. 

In the West, music streaming site Napster is as obsolete as flip phones or Blockbuster. OSINT Industries has confirmed this old-school music site isn’t widely popular in Russia either. Russians prefer to use homegrown alternatives like market leader Yandex Music (Яндекс Музыка), VK Music (ВКонтакте), or recently available Spotify – in fact, Napster has never been officially accessible in Russia, and ceased to stream music at all this January.

Even weirder, Jordan found at least 16 official embassy emails are directly linked to one Napster account: “Misterking”. The account bio reads "radiohead1234", and email address m*******king@gmail[.]com. Reverse searching the innocuous profile picture produced no results.

Via OSINT Industries, Jordan could link “Misterking” to:

  1. darconsul@gmail[.]com 
  2. rusembzimbabwe@gmail[.]com
  3. rusconsjamaica@gmail[.]com
  4. rusafatt@gmail[.]com
  5. russconswdc@gmail[.]com
  6. rusembbd@gmail[.]com
  7. russianconsulgoa@gmail[.]com
  8. honycghydrusfed@gmail[.]com
  9. rus.consul.kolkata@gmail[.]com
  10. rusembiran@gmail[.]com
  11. pressservice.tokyo@gmail[.]com
  12. rusemb.srilanka@gmail[.]com
  13. russingtrade@gmail[.]com
  14. rusconsul.srilanka@gmail[.]com
  15. rusembuae@gmail[.]com
  16. ruvn.press@gmail[.]com

‍

Profile pictures for “Misterking” on Napster and more. [Source: OSINT Industries/Jordan S.]

Who is ‘Misterking’?

An OSINT Industries search on m*******king@gmail[.]com produced hundreds of additional results too. Was this a burner account or something more concrete? 

Name: M****** K***

Locations: Greater Seattle Area and Renton, Washington (based on Google, Yelp, LinkedIn, MyFitnessPal, Redfin, Peloton)

Activity period: Since at least 2010 (based on Chess.com account creation) - present (based on Google, Chess.com)

Registered on:

  • Google (multiple devices across a decade)
  • LinkedIn (public profile)
  • Airbnb (with US phone number)
  • Yelp (266 followers, extensive review history)
  • Spotify
  • Pandora
  • Napster (obviously)
  • Trello
  • Dropbox
  • PayPal
  • Microsoft
  • Other fitness, mapping, and social platforms

All this shows a long-standing personal digital footprint - it’s a real civilian account. At least 16 Russian embassy email addresses are linked to a single Napster account registered to a seemingly random US civilian.

OSINT Industries’ own investigations have been unable to locate a meaningful connection between M****** K*** and Russia. His children’s faces are clearly visible in his posted content; although his career in optical treatment is apolitical, one Google Review placed him at a taco stand just off DC’s National Mall. 

To make things worse, this well-connected civilian’s credentials have appeared in over 20 major data breaches from 2008–2024.

Distiller

Alongside Napster, Jordan found another anomaly. 332 embassy addresses have profiles on Distiller, the liquor-reviewing app and “social network for whiskey lovers”. Why so many Russian embassy emails would be attached to a whiskey app is difficult to comprehend. Security risks aside, it’s surely not an endorsement of Russian vodka.

Jordan states “if I'd had more time I would've looked deeper into…  hundreds of accounts that were detected on the Distiller website”. It’s possible that this anomaly links to the previous Napster activity, or further illuminates the choice to link with civilians like ‘Misterking’

This Was Not a Hack: A System That Fails Repeatedly

“The vast majority of the email addresses have been affected by data breaches…” –  Jordan, an OSINT and SOCMINT Analyst [Source: OSINT Industries]

The most startling element of Jordan’s report is the sheer quantity of data breaches Russian embassy emails have been subject to. Jordan highlighted the “February 2019 Verifications.io breach and March 2022 Vladolf Putler paste” as major sources. 

Over 190 distinct Russian diplomatic email addresses have been breached, from 90 countries and territories, from 2011 to 2025. 

Email OSINT mistakes - reusing credentials, using consumer providers, publicising credentials  - caused these breaches, not sophisticated attacks or hacking attempts. Consumer email accounts are over 4x more likely to appear repeatedly in breach datasets than official domains, making the causes crystal clear in Jordan’s data. 61% of emails breached are mail[.]ru, yandex[.]ru, gmail[.]com, hotmail[.]com, yahoo[.]com addresses.

Only numbers can address the scale and scope of these failures. Statistically speaking:

  • 100% of the 324 addresses appear in at least one breach dataset.
  • Roughly 80% of Russian embassy emails appear in two or more breaches, indicating credential reuse.
  • Roughly 50% appear in five or more separate breach events, indicating persistent credential reuse after breach has occurred.
  • Roughly 10% appear in ten or more breaches, indicating chronic credential reuse - likely after notification of a breach.

The most common breach types are mail verification and enrichment datasets (e.g. Verifications.io, Covve, Data Enrichment Exposure), affecting 75–80% of addresses. Spam botnets or combo lists made up 60–65%; major platform breaches (i.e. Adobe, LinkedIn, Twitter, Canva, Bitly, Nitro, etc) made up 20-25%; the highest-risk credential-stealer logs (i.e. RedLine, ALIEN TXTBASE, stealer dumps) made up 35-40%.

A shocking (or satisfying) 55-60% of breaches came from politically motivated leak collections, like ‘Vladolf Putler’.

Geographically, many exposed accounts cover conflict zones, sanctions-heavy environments or intelligence-contested regions. The Americas represent 7% of those breached, 21% come from Asia and the Pacific, and 34% come from Europe. Africa and the Middle East, some of Russia’s most volatile interests, dominate with 38% of breached credentials.

Addresses with breached credentials include embassies and consulates, postings in NATO and EU states, and the by-now usual email suspects in military, naval, and defence attaché offices like Washington, D.C.

From a temporal angle, historic failure isn’t just historic. The earliest breach came in 2011, with the peak exposure period during the email (in)security golden age of 2017-20. A second spike came in 2022, driven by Ukraine-related dump collections. Stealer logs and Telegram combo lists continue through 2024–2025 – so current criminal ecosystems have access to embassy-linked credentials, as well as political opponents.

Risk-taking email behavior from Russian embassies is not a bug, it’s a feature. These breaches are the result.

Predictable Outcomes: How OSINT Cuts Both Ways

Jordan’s findings point to Russian diplomatic and military email infrastructure as sloppy, over-exposed, and repeatedly compromised. If your diplomatic email system runs on Gmail, reaching the credentials of the world’s most dangerous superpower doesn’t take elite adversaries burning zero-days. Compromises are the natural and predictable outcome of Russian diplomats’ own OpSec and OSINT mistakes. 

The contested Russian embassy in Washington DC. [Source: Reuters]

Today, they’re breached. Tomorrow, Russian embassy officials could be facing long-term surveillance or infiltration, or impersonation of diplomats and military officials. Internal compromises like credential-stuffing and SIM-swap attacks are painful for an individual, but the stakes are so much higher here. Even a simple social engineering attempt could have devastating geopolitical ramifications. The illegal war in Ukraine has led to the closure of countless Russian consulates and embassies, and considering their security measures, this may be doubly wise. 

The Russians’ consumer emails, credential reuse, public platform registrations, and careless behavior are mistakes, but they’re also intelligence opportunities - for adversaries, but also for the right investigator. An attack surface is also an OSINT gateway. In good hands, Jordan’s work with OSINT Industries is only the beginning. 

It’s also worth stating that Jordan’s incredible work would have been impossible without our platform.

“Russia, Russia, Russia”... Donald Trump’s words here intended to express that sustained Russian interference efforts in the US were a fraud; a hoax that proved to be anything but. With simple OSINT Industries searches, Jordan proved Russia’s own institutions suffer from the very email weaknesses they have weaponised abroad.

"Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing… I've got to be honest with you, I'd love to see them." – U.S. President Donald Trump on email hacking. [Source: BBC]

To find out more about Jordan’s work, visit:

Jordan’s LinkedIn

See Jordan’s previous work with OSINT Industries in another Case Study.

“In a transgressive YouTube culture where male-on-male sexual assault is often reduced to a punchline, this OSINT investigation clearly demarcates where the culture should change, and the laughter should end…”

Read more: Comedy to Crime Scene: Calling Out a Youtube Sexual Assaulter With OSINT

‍

OSINT platform free trial

Try the world's most popular OSINT platform for free. Elevate your enterprise investigations with unmatched accuracy.

Get Free Trial
Get our OSINT newsletter.

The latest and greatest of all-things-OSINT at your fingertips, every two weeks.

By subscribing you agree to our Privacy Policy.

Start your free enterprise trial

Get Free Trial

Reveal what's behind any contact, instantly.

Search Now

We want to hear your story!

Inspire Others

Educate about what OSINT can do.

Positive Publicity

‍Share your success with the world.

Support #OSINT4Good

Be part of the OSINT story.

Share your story

Don’t let your hard work die in darkness. Share what you’ve accomplished, and you could be our next Case Study.

Related posts

View all
Law Enforcement
Mar 2, 2026

OSINT, Wiretaps and Encrypted Apps: How El Chapo Fell (and How OSINT Would Catch Him Today)

Wiretaps caught El Chapo. See how modern OSINT narcotics investigations use phone number intelligence, encrypted apps and wiretap data to identify drug trafficking networks.
Investigators
Mar 2, 2026

Russia’s Email Problem: How OSINT Exposes Russian Embassies Worldwide

Using OSINT Industries, Jordan analyzed 342 Russian embassy emails. This Russia-focussed email OSINT investigation revealed breaches, poor OpSec, and a high likelihood of exposure.
Investigators
Jan 20, 2026

A Cub in a Crate: OSINT Against Wildlife Trafficking and the Illegal Tiger Trade

Follow a tiger cub trafficked for sale, and the investigators using OSINT to save her. See how Wildlife Justice Commission prove OSINT can fight brutal animal trafficking like the tiger trade.
Get our OSINT newsletter.

The latest and greatest of all-things-OSINT at your fingertips, every two weeks.

#OSINT4Good
Law EnforcementGovernmentJournalismNon-Profits
Industry
Insurance + FraudCyber SecurityLaw ProfessionalsAnti-Money LaunderingPrivate InvestigatorsDigital Risk Protection
Solutions
OSINT PlatformOSINT TrainingEnterprise API Access
Request Free Access
Law EnforcementGovernmentJournalistsNon-Profits
Join the Community
Twitter
YouTube
LinkedIn
Bluesky
Telegram (Updates)
Telegram (Community)
© 2026 OSINT. All right reserved.
Terms of UseEthics & CompliancePrivacy PolicyContact us