Today we met a gentleman who shared with us tons of information on random places — including police departments.
He told us that in his spare time he enjoys watching police body cam footage for credential exposure
He told us that in his spare time he enjoys watching police body cam footage for credential exposure
🤣124🤯17❤16😎8🤔5👍1
vx-underground
Today we met a gentleman who shared with us tons of information on random places — including police departments. He told us that in his spare time he enjoys watching police body cam footage for credential exposure
For example, based on his understanding of hundreds or possibly thousands of police body cam footage, he has learned that Walmart employee usernames are in the format of username.store_number
🤣108🔥20🤯13🤔9🤝6❤5👍1🤓1🫡1
Earlier today (or yesterday depending on where you live) RansomHub ransomware group listed Change Healthcare – an organization which was previously ransomed by ALPHV ransomware group.
If you're not familiar with the ... 'lore' ..., it should probably be noted that Change Healthcare did pay (although they deny it, but transaction details discovered by researchers indicate otherwise) and upon receiving roughly $22,000,000 from Change Healthcare ALPHV administration pulled an exit scam.
Under normal circumstances ALPHV administration group receives roughly 20% of the ransom payment (depending on various factors) and the remaining 80% of the ransom money goes to the person (or persons) responsible for deploying the ransomware on the victim organization. When ALPHV received $22,000,000 they did not pay the affiliate their 80% cut. They just left.
This left many researchers wondering: what happened to the data? Will Change Healthcare be extorted again?
Well now, assuming RansomHub is telling the truth, we know the answer. Besides listing Change Healthcare on their site, they also briefly explained that they now have the Change Healthcare data, so they're extorting Change Healthcare again.
However, it is not clear if RansomHub is a rebrand of ALPHV ransomware group, the affiliate at ALPHV is moving to RansomHub, or if this is a scam by RansomHub ransomware group trying to intimidate Change Healthcare into paying again.
We have not investigated the current Change Healthcare listing on RansomHub's website to indicate if this is a scam.
If we had to guess, we would guess the ransomware affiliate from ALPHV simply moved over to RansomHub and want to collect their approx. $17,600,000 they believed they're due.
¯\_(ツ)_/¯
Special thanks to Dominic Alvieri for sharing the RansomHub explanation post with us.
If you're not familiar with the ... 'lore' ..., it should probably be noted that Change Healthcare did pay (although they deny it, but transaction details discovered by researchers indicate otherwise) and upon receiving roughly $22,000,000 from Change Healthcare ALPHV administration pulled an exit scam.
Under normal circumstances ALPHV administration group receives roughly 20% of the ransom payment (depending on various factors) and the remaining 80% of the ransom money goes to the person (or persons) responsible for deploying the ransomware on the victim organization. When ALPHV received $22,000,000 they did not pay the affiliate their 80% cut. They just left.
This left many researchers wondering: what happened to the data? Will Change Healthcare be extorted again?
Well now, assuming RansomHub is telling the truth, we know the answer. Besides listing Change Healthcare on their site, they also briefly explained that they now have the Change Healthcare data, so they're extorting Change Healthcare again.
However, it is not clear if RansomHub is a rebrand of ALPHV ransomware group, the affiliate at ALPHV is moving to RansomHub, or if this is a scam by RansomHub ransomware group trying to intimidate Change Healthcare into paying again.
We have not investigated the current Change Healthcare listing on RansomHub's website to indicate if this is a scam.
If we had to guess, we would guess the ransomware affiliate from ALPHV simply moved over to RansomHub and want to collect their approx. $17,600,000 they believed they're due.
¯\_(ツ)_/¯
Special thanks to Dominic Alvieri for sharing the RansomHub explanation post with us.
👍38🤔11😢7❤5👏5
Security researcher Jonas Lyk has found a DoS vulnerability in Discord.
If you try to paste the string "http://./\<#0>: ://./<#0>" into Discord it will crash
¯\_(ツ)_/¯
If you try to paste the string "http://./\<#0>: ://./<#0>" into Discord it will crash
¯\_(ツ)_/¯
👍56😱24😁16🎉8❤3🤣2😍1
Sugargoo, a competitor to PandaBuy, has allegedly been compromised. Individuals operating under the monikers "IntelBroker" and "Sanggiero" are claiming responsibility for the breach.
- The data they claim to have exfiltrated is primarily user activity and settings. However, the data does include the users email address. The data stolen is not nearly as severe as the PandaBuy breach
- The data has not been made public. The individuals responsible for the breach are trying to sell the data.
- IntelBroker and Sanggiero are the same individuals who compromised PandaBuy
- In a twist of fate, the breach was mostly unnoticed until Sugargoo administrators began timing-out people from their Discord who questioned staff members on the breach. This resulted in more people discussing the issue.
Thank you, Faderz for sharing the screenshot with us as proof.
- The data they claim to have exfiltrated is primarily user activity and settings. However, the data does include the users email address. The data stolen is not nearly as severe as the PandaBuy breach
- The data has not been made public. The individuals responsible for the breach are trying to sell the data.
- IntelBroker and Sanggiero are the same individuals who compromised PandaBuy
- In a twist of fate, the breach was mostly unnoticed until Sugargoo administrators began timing-out people from their Discord who questioned staff members on the breach. This resulted in more people discussing the issue.
Thank you, Faderz for sharing the screenshot with us as proof.
🤣44👍7❤1🤯1
vx-underground
Sugargoo, a competitor to PandaBuy, has allegedly been compromised. Individuals operating under the monikers "IntelBroker" and "Sanggiero" are claiming responsibility for the breach. - The data they claim to have exfiltrated is primarily user activity and…
tl;dr if your company has allegedly been compromised, do not start banning, or timing out people, who are asking questions about it. It only fuels the fire and makes the questioning and rumors more ferocious.
🫡41👍9❤5🤣1
Good morning, afternoon, or night.
Today we mailed out the remaining vx-underground collection harddrives. It was sent to 6 people.
To those people: during packaging we discovered some sort of mysterious goo on the harddrive boxes. We do not know what it is. It is mysterious.
Today we mailed out the remaining vx-underground collection harddrives. It was sent to 6 people.
To those people: during packaging we discovered some sort of mysterious goo on the harddrive boxes. We do not know what it is. It is mysterious.
🤔62🤣36❤13😍3👍1🎉1
Shoutout to the homies at Stanford for helping us get free Robux 🙏🙏🙏
❤54😁23🤣20🔥6🫡4🙏2
Shoutout to the homies at Harvard for the free Robux. Coming in clutch to help us get some new drip
🤣125❤26😱7👍6🤓4🎉2🥰1😁1
We expect Harvard and Stanford to give us PhDs in Computer Science for our thesis on free robux
🔥79🤣31❤13😁4🤔1🤩1
Some people thought the Robux thing we tweeted was an actual way to get Robux for free 😭😭😭😭
You're now banned from the internet. Forever.
You're now banned from the internet. Forever.
🤣178🔥15😁11❤6👏5😢4👍2🤔2🤯1😱1
Shoutout to the homies at University of Virginia for the free Robux.
They also helped find viruses on our computer. They said they'll fix it if we call +1-877-339-0559
Blessed 😭🙏
They also helped find viruses on our computer. They said they'll fix it if we call +1-877-339-0559
Blessed 😭🙏
🥰82🤣60😁5👍4❤3🤔1😱1