We received another handcrafted phishing e-mail!
The spoofed headers is cool, and the CloudFlare Ipfs is cute. Thank you, we appreciate it.
We feel so special, we are blushing.
Thank you, sweetie pie
The spoofed headers is cool, and the CloudFlare Ipfs is cute. Thank you, we appreciate it.
We feel so special, we are blushing.
Thank you, sweetie pie
🤣140❤28🥰8👍4😁4🤯3
You're all so goofy, it's unbelievable.
You've all been reported to the cyber police and it WILL be backtraced!!!!111
You've all been reported to the cyber police and it WILL be backtraced!!!!111
🤣221🤓10😁6❤🔥3👍3❤1
Today the United States Department of Justice announced the arrest of two individuals tied to compromising a Fantasy Sports website and a betting website.
The individuals arrested were Nathan Austad a/k/a "Snoopy" and Kamerin Stokes a/k/a TheMFNPlug
More information: https://www.justice.gov/usao-sdny/pr/two-more-men-charged-hacking-fantasy-sports-and-betting-website
The individuals arrested were Nathan Austad a/k/a "Snoopy" and Kamerin Stokes a/k/a TheMFNPlug
More information: https://www.justice.gov/usao-sdny/pr/two-more-men-charged-hacking-fantasy-sports-and-betting-website
www.justice.gov
Two More Men Charged With Hacking Fantasy Sports And Betting Website
Damian Williams, the United States Attorney for the Southern District of New York, and James Smith, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the unsealing of a six-count criminal…
🤣52😢6😱3❤2🔥2
We've added a new linux malware paper. Yes, they exist.
2024-01-30 - Implementing Remote Persistent Keylogger Executing in User-Space exploiting Utilities in GNU Linux Operating Systems
It is a lengthy paper noscript.
Check it out here: https://vx-underground.org/Papers/Linux/Persistence
2024-01-30 - Implementing Remote Persistent Keylogger Executing in User-Space exploiting Utilities in GNU Linux Operating Systems
It is a lengthy paper noscript.
Check it out here: https://vx-underground.org/Papers/Linux/Persistence
Vx Underground
The largest collection of malware source code, samples, and papers on the internet.
❤44🔥11😱7👍4🫡2🤓1
In the past we've tried to prevent Lockbit ransomware group from attacking healthcare facilities and non-profit institutions. We have never had success.
The reason why derives from either ignorance on their end (intentional, or not, it's up to your interpretation), and ambiguity of their ruleset from affiliates.
Recently Lockbit ransomware group attacked a non-profit healthcare institute in Chicago. The facility is Saint Anthony Hospital. The facility clearly states they're a non-profit and religious institution. Attacking this facility is a blatant violation of the Lockbit ruleset which is defined by their administrative staff.
However, when we approached the Lockbit administration we received a reply with a link to the organizations financial disclosures. Lockbit ransomware group believes that a non-profit institution in the United States means employees are not paid and the organization quite literally has no money.
In other words, they will not ransom a company if they quite literally have no money.
If you attempt to educate and present information to Lockbit administrative staff on non-profit institution laws in the United States they will state the organization is corrupt and they will imply (directly or indirectly) it is a money laundering operation and the facility is dirty and deserves to be ransomed.
In summary: the rules are a facade
The reason why derives from either ignorance on their end (intentional, or not, it's up to your interpretation), and ambiguity of their ruleset from affiliates.
Recently Lockbit ransomware group attacked a non-profit healthcare institute in Chicago. The facility is Saint Anthony Hospital. The facility clearly states they're a non-profit and religious institution. Attacking this facility is a blatant violation of the Lockbit ruleset which is defined by their administrative staff.
However, when we approached the Lockbit administration we received a reply with a link to the organizations financial disclosures. Lockbit ransomware group believes that a non-profit institution in the United States means employees are not paid and the organization quite literally has no money.
In other words, they will not ransom a company if they quite literally have no money.
If you attempt to educate and present information to Lockbit administrative staff on non-profit institution laws in the United States they will state the organization is corrupt and they will imply (directly or indirectly) it is a money laundering operation and the facility is dirty and deserves to be ransomed.
In summary: the rules are a facade
😢85❤25🫡14🤣9😁6🤔6👍3😱3🤯2😍2
vx-underground
In the past we've tried to prevent Lockbit ransomware group from attacking healthcare facilities and non-profit institutions. We have never had success. The reason why derives from either ignorance on their end (intentional, or not, it's up to your interpretation)…
Additionally, it should be stated that this pseudo-ruleset applies to educational institutions as well. We are aware of several instances where affiliates ransomed public education facilities (K-12 schools).
When we bring up the fact these are state-funded educational facilities and have no money, they do not believe us or they assert that they do have money because the facility owns computers.
"If they money for computers, they have money to pay me"
When we bring up the fact these are state-funded educational facilities and have no money, they do not believe us or they assert that they do have money because the facility owns computers.
"If they money for computers, they have money to pay me"
🤯51🫡12❤11🤣8😁3😢3👍1👏1
We met a wonderful man on Telegram yesterday. He currently resides in a level 5 maximum security prison. He is serving 30 years in prison.
His associate smuggled a cell phone into prison, presumably through his anus, so they could do things on the internet.
Very cool 👍
His associate smuggled a cell phone into prison, presumably through his anus, so they could do things on the internet.
Very cool 👍
👍104🤣63❤11🥰5🫡4🤝1
This media is not supported in your browser
VIEW IN TELEGRAM
Free Joey D! He didn't do anything wrong!
*Joey is serving 30 years in a maximum security prison for shooting, and nearly killing, 3 people during a drug deal gone bad
*Joey is serving 30 years in a maximum security prison for shooting, and nearly killing, 3 people during a drug deal gone bad
🤓89🤣40😎36🤯8🤔5😁4👍3🔥3🎉3👏2🫡1
The United States Department of Justice has been arresting and/or indicting individuals involved in cyber criminals left-and-right.
They've indicted 8 individuals within the past 2 weeks.
Individuals arrested and/or indicted:
- "R" a/k/a "R$" a/k/a "ElSwapo1"
- "Em"
- "Carti" a/k/a/ "Punslayer"
- "Snoopy"
- "TheMFNPlug"
- "Joey"
- "Sosa" a/k/a "Elijah" a/k/a "King Bob"
- "The Real Jewt King"
NOTE: Reposted, phrasing improved
They've indicted 8 individuals within the past 2 weeks.
Individuals arrested and/or indicted:
- "R" a/k/a "R$" a/k/a "ElSwapo1"
- "Em"
- "Carti" a/k/a/ "Punslayer"
- "Snoopy"
- "TheMFNPlug"
- "Joey"
- "Sosa" a/k/a "Elijah" a/k/a "King Bob"
- "The Real Jewt King"
NOTE: Reposted, phrasing improved
👍45🔥16😱13🫡12😢8❤7😁3❤🔥2🥰2🤣1
If you're interested in keeping up with ransomware attacks and/or ransomware victims, a group of researchers have ported the vx-underground ransomware news bot over to Telegram
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
Telegram
Ransomware News (VX)
This is NOT the official channel of vx-underground.org /
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
❤42👍13🤓6🔥3🤯1
This media is not supported in your browser
VIEW IN TELEGRAM
Hackers looking for their next target
🤣188😁32🫡12❤6🤯3🤓3🙏2😍2
we are trying to sleep.
everytime we check twitter we see more arrests or high profile breaches
everyone just clam down for a second ok
ok ttyl
everytime we check twitter we see more arrests or high profile breaches
everyone just clam down for a second ok
ok ttyl
🫡67👍10😇6😘3😢1🤝1
Today it was announced by authorities in Georgia that a murder suspect was accidentally released from Clayton County Jail following a 'cyber security incident' which resulted in 'widespread system outage'
tl;dr ransomware freed a suspected murderer
https://whee.net/2024/02/01/murder-suspect-mistakenly-released-from-jail-after-cybersecurity-incident/
tl;dr ransomware freed a suspected murderer
https://whee.net/2024/02/01/murder-suspect-mistakenly-released-from-jail-after-cybersecurity-incident/
🤔42🤯16🔥11🤣9😱6🫡6❤3😎3
Today CloudFlare reported that they had been compromised on Thanksgiving, 2023. They state that the Threat Actor got access via Okta, which was compromised in October, 2023
This is the 2nd time CloudFlare was compromised through Okta
No data was stolen
https://blog.cloudflare.com/thanksgiving-2023-security-incident
This is the 2nd time CloudFlare was compromised through Okta
No data was stolen
https://blog.cloudflare.com/thanksgiving-2023-security-incident
The Cloudflare Blog
Thanksgiving 2023 security incident
On Thanksgiving Day, November 23, 2023, Cloudflare detected a threat actor on our self-hosted Atlassian server. Our security team immediately began an investigation, cut off the threat actor’s access, and no Cloudflare customer data or systems were impacted…
🤯57🤣38😱7🔥5🫡2❤1