Today a Threat Actor(s) operating under the moniker "FutureSeeker" claimed to have compromised TrumpHotels-dot-com.
The Threat Actor(s) appear to have compromised TrumpHotels e-mail notification system. Specifically, the service responsible for reminding and/or verifying reservation details for guests. The data present includes:
- UniqueId (SQL Table)
- First name
- Last name
- Email
- Creation Date
- Unit ID (N/A)
- Status
- Last updated
- Expiration Date
- Sampling exclusion
164,910 records are present in the data dump.
The data exfiltrated from the Threat Actor(s) range from January 18th, 2018 to January 15th, 2025.
While the information does unveil the guests present at the hotel(s) operated by the Trump organization, no PII from guests (omit name, e-mail, reservation date) are present within the data dump. Furthermore, the information does not include wherein the guests resided or date of departure from the hotel(s).
Based on review of the data we do not believe this compromise to be politically motivated or financially motivated. Rather, because of the recent inauguration of the United States president, we perceive this compromise as a way for the Threat Actor(s) to verify their legitimacy as a Threat Group and/or Actor.
The Threat Actor(s) appear to have compromised TrumpHotels e-mail notification system. Specifically, the service responsible for reminding and/or verifying reservation details for guests. The data present includes:
- UniqueId (SQL Table)
- First name
- Last name
- Creation Date
- Unit ID (N/A)
- Status
- Last updated
- Expiration Date
- Sampling exclusion
164,910 records are present in the data dump.
The data exfiltrated from the Threat Actor(s) range from January 18th, 2018 to January 15th, 2025.
While the information does unveil the guests present at the hotel(s) operated by the Trump organization, no PII from guests (omit name, e-mail, reservation date) are present within the data dump. Furthermore, the information does not include wherein the guests resided or date of departure from the hotel(s).
Based on review of the data we do not believe this compromise to be politically motivated or financially motivated. Rather, because of the recent inauguration of the United States president, we perceive this compromise as a way for the Threat Actor(s) to verify their legitimacy as a Threat Group and/or Actor.
🤣64👍9🔥5❤1🥰1😢1
Just used my botnet swarm to DDoS 300 elite hackers and scrape all their personal information from the IP address when my IP address was locked
🤣118❤16🤓13❤🔥7🔥6🤔4🤯3😁2😢2👍1
Yesterday Google updated their AI Principles. Google has removed their pledge to not use AI for weapons or surveillance.
“There’s a global competition taking place for AI leadership within an increasingly complex geopolitical landscape” — Demis Hassabis, CEO of Google DeepMind
“There’s a global competition taking place for AI leadership within an increasingly complex geopolitical landscape” — Demis Hassabis, CEO of Google DeepMind
🤣91😱16😢16🤯4🎉4😁3👍2❤1
vx-underground
Yesterday Google updated their AI Principles. Google has removed their pledge to not use AI for weapons or surveillance. “There’s a global competition taking place for AI leadership within an increasingly complex geopolitical landscape” — Demis Hassabis,…
To help people understand what's going on we've brought in our corporate translator cat.
“We realized there is a lot of money in making weapons and spying on people. Fuck the pledge. I love money” — Demis Hassabis, CEO of Google DeepMind
“We realized there is a lot of money in making weapons and spying on people. Fuck the pledge. I love money” — Demis Hassabis, CEO of Google DeepMind
💯138🔥12🥰9😢5❤🔥3😁3❤1🎉1
This media is not supported in your browser
VIEW IN TELEGRAM
December 24th, 2024, Clone Robotics unveiled their "Torso 2"
It has an actuated lumbar spine and all corresponding abdominal muscles. It's "skin" encloses 910 muscle fibers. It has 164 degrees of motion and 182 sensors for control feedback.
This is their demo
It has an actuated lumbar spine and all corresponding abdominal muscles. It's "skin" encloses 910 muscle fibers. It has 164 degrees of motion and 182 sensors for control feedback.
This is their demo
😱83❤20🤯9😢2🔥1👏1
vx-underground
December 24th, 2024, Clone Robotics unveiled their "Torso 2" It has an actuated lumbar spine and all corresponding abdominal muscles. It's "skin" encloses 910 muscle fibers. It has 164 degrees of motion and 182 sensors for control feedback. This is their…
Clone Robotics also noted the skin is very "comfy" and you can "give it a hug".
🤣77🤔11❤10😁4😢3
February 1st, the Cybersecurity and Infrastructure Security Agency (CISA) released a report on two patient health monitors (CONTEC CMS8000), produced in China, containing backdoors.
February 2nd, Claroty, a United States-based cybersecurity company which specializes in the healthcare domain of cybersecurity, reviewed the firmware of the CONTEC CMS8000 and came to a different conclusion.
Interestingly, the IP addresses discussed by CISA in their report (202.114.4.119 202.114.4.120), are in the operations manual of the CONTEC CMS8000. Additionally, the user manual provides instructions on configuring the Central Management System (CMS) with the IP address listed in healthcare networks.
More information:
https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated
February 2nd, Claroty, a United States-based cybersecurity company which specializes in the healthcare domain of cybersecurity, reviewed the firmware of the CONTEC CMS8000 and came to a different conclusion.
Interestingly, the IP addresses discussed by CISA in their report (202.114.4.119 202.114.4.120), are in the operations manual of the CONTEC CMS8000. Additionally, the user manual provides instructions on configuring the Central Management System (CMS) with the IP address listed in healthcare networks.
More information:
https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated
Claroty
Do the CONTEC CMS8000 Patient Monitors Contain a Chinese Backdoor? The Reality is More Complicated…
Team82 investigated what CISA labeled a backdoor in the Contec CMS8000 patient monitoring system and concluded that instead, the decision to include a hardcoded IP address is instead an insecure and risky design choice on the part of the vendor.
😁35🤣14🔥7👍4🤯3❤2
Sorry, Claroty, you didn't deserve that. I'm just really annoyed with constant web pop ups and shitty AI agents and sales person buzzwords
🤣45💯8😢6😎4❤🔥2
malloc, HeapAlloc, GlobalAlloc, LocalAlloc, IMalloc, RtlAllocateHeap are for cowards.
Real gamers call NtAllocateVirtualMemory and recreate the heap structure themselves
Real gamers call NtAllocateVirtualMemory and recreate the heap structure themselves
❤72🤓27😁8🫡6👍5😎3🤣2🔥1🤔1😢1
vx-underground
malloc, HeapAlloc, GlobalAlloc, LocalAlloc, IMalloc, RtlAllocateHeap are for cowards. Real gamers call NtAllocateVirtualMemory and recreate the heap structure themselves
(we've literally never done this, would be needlessly over complicated with little benefit other than making your code needlessly over complicated)
🤓67😢3🤣1
You can keep malware on your computer for free if you want
❤93🤝25🤓6🙏5👍4🎉4🥰2💯1
forgive me lord for i have sinned.
i prefer chatgpt over most search engines now because theyre ass.
i prefer chatgpt over most search engines now because theyre ass.
🔥108😢47🤣14❤7🤓6💯5❤🔥1