vx-underground
Photo
We got curious about this and did some investigating.
When we Googled these images it brought up web articles that first popped up around 2020. This is an old computer store located in Norman, Oklahoma. This store, "Computer Factory Outlet", was located in a strip mall where the property owner had a series of financial problems which resulted in the place being shutdown. Due to legal issues, the store was left in a weird limbo-like-state since at least 2007.
We contacted some of our colleagues at the University of Oklahoma and asked if they're capable of visiting the store. We were curious what it's current state is.
This afternoon they visited the store. Unfortunately, the store has been cleared out. All the old-school cool computer stuff is long gone.
When we Googled these images it brought up web articles that first popped up around 2020. This is an old computer store located in Norman, Oklahoma. This store, "Computer Factory Outlet", was located in a strip mall where the property owner had a series of financial problems which resulted in the place being shutdown. Due to legal issues, the store was left in a weird limbo-like-state since at least 2007.
We contacted some of our colleagues at the University of Oklahoma and asked if they're capable of visiting the store. We were curious what it's current state is.
This afternoon they visited the store. Unfortunately, the store has been cleared out. All the old-school cool computer stuff is long gone.
😢92❤6😱6🤓3👍2🎉1🤣1
vx-underground
We got curious about this and did some investigating. When we Googled these images it brought up web articles that first popped up around 2020. This is an old computer store located in Norman, Oklahoma. This store, "Computer Factory Outlet", was located in…
Store state in 2020
❤50🤓11😢3👍2🤣1
Earlier today we made a post regarding the arrest of 8base ransomware group. We have deleted that post due to misinformation. This is a correction post.
Note: Our original source of the 8base ransomware group takedown was incorrect. Thank you to "Deleted Account" (their name, literally), for correcting us and providing accurate sources of information.
On February 10th, the Thailand Technology Crime Suppression Division, Thailand Immigration Police, and Thailand "Region 8" police, executed Operation PHOBOS AETOR.
The operation resulted in the raid of 4 different locations within the Phuket province. The raids resulted in the arrest of 4 currently unidentified men. Thai officials seized electronic devices and digital wallets.
The individuals apprehended have been charged with "Conspiracy to Commit an Offense Against the United States" and "Conspiracy to Commit Wirefraud".
Operation Phobos Aetor is a result of international cooperation between the United States government, Swiss Federation, EUROPOL partners, and Royal Thai Police. The Swiss Federation has requested extradition of the 4 men arrested.
The individuals arrested are believed to have compromised over 1,000 companies and stolen approx. $16,500,000.
The individuals suspected lovers (women pictured) have not been arrested. They do not appear to be involved in 8base ransomware group.
Note: Our original source of the 8base ransomware group takedown was incorrect. Thank you to "Deleted Account" (their name, literally), for correcting us and providing accurate sources of information.
On February 10th, the Thailand Technology Crime Suppression Division, Thailand Immigration Police, and Thailand "Region 8" police, executed Operation PHOBOS AETOR.
The operation resulted in the raid of 4 different locations within the Phuket province. The raids resulted in the arrest of 4 currently unidentified men. Thai officials seized electronic devices and digital wallets.
The individuals apprehended have been charged with "Conspiracy to Commit an Offense Against the United States" and "Conspiracy to Commit Wirefraud".
Operation Phobos Aetor is a result of international cooperation between the United States government, Swiss Federation, EUROPOL partners, and Royal Thai Police. The Swiss Federation has requested extradition of the 4 men arrested.
The individuals arrested are believed to have compromised over 1,000 companies and stolen approx. $16,500,000.
The individuals suspected lovers (women pictured) have not been arrested. They do not appear to be involved in 8base ransomware group.
😢46😁14👍10🤣6🫡6🤔5❤3🤓2👏1🤝1😎1
Today the State of California sentenced Alan Filion to 4 years in prison for being a "serial swatter".
This case is notable in that a majority of the crimes committed by Mr. Filion occurred when he was a minor. He also plead guilty to seek leniency.
https://www.justice.gov/opa/pr/california-teenager-sentenced-48-months-prison-nationwide-swatting-spree
This case is notable in that a majority of the crimes committed by Mr. Filion occurred when he was a minor. He also plead guilty to seek leniency.
https://www.justice.gov/opa/pr/california-teenager-sentenced-48-months-prison-nationwide-swatting-spree
www.justice.gov
California Teenager Sentenced to 48 Months in Prison for Nationwide
Alan W. Filion, 18, of Lancaster, California, was sentenced today to 48 months in prison for making interstate threats to injure the person of another.
🤣42🎉14🙏7🤯5👍2😢2❤1😘1
Hi,
I've resumed work on my "VX-API".
It's basically a collection of my malware coding snippets I wrote. Feel free to copy-paste from it or study it.
This is incomplete. I'll add more later.
- smelly smellington
https://vx-api.gitbook.io/vx-api
I've resumed work on my "VX-API".
It's basically a collection of my malware coding snippets I wrote. Feel free to copy-paste from it or study it.
This is incomplete. I'll add more later.
- smelly smellington
https://vx-api.gitbook.io/vx-api
vx-api.gitbook.io
Introduction | vx-api
❤61🔥8🤔6🤓4😢2❤🔥1
> go online
> check new doj press release on 8base
> says 8base attacked children's hospital
> says 8base is facing 130 YEARS IN PRISON
Holy cannoli. Feds are NOT playing fam
> check new doj press release on 8base
> says 8base attacked children's hospital
> says 8base is facing 130 YEARS IN PRISON
Holy cannoli. Feds are NOT playing fam
🤣69🤯17🫡7😢5🤓5
vx-underground
> go online > check new doj press release on 8base > says 8base attacked children's hospital > says 8base is facing 130 YEARS IN PRISON Holy cannoli. Feds are NOT playing fam
This is a new record. On average we've seen ransomware affiliates receive 20 - 40 years in prison.
Previously, the record holder for time faced was Alexander Moucka a/k/a Waifu with his charge of 100 years in prison.
130 years is the new record.
See you in 2155, 8base
Previously, the record holder for time faced was Alexander Moucka a/k/a Waifu with his charge of 100 years in prison.
130 years is the new record.
See you in 2155, 8base
🫡64💯10🤓5😢4❤1👍1🔥1🤣1
vx-underground
This is a new record. On average we've seen ransomware affiliates receive 20 - 40 years in prison. Previously, the record holder for time faced was Alexander Moucka a/k/a Waifu with his charge of 100 years in prison. 130 years is the new record. See you…
Actually, there was a couple who was producing CSAM of their child and selling it online. The husband and wife were sentenced to 10,000 years in prison to ensure they'd never be paroled.
The judge also did this because he could not impose the death penalty
The judge also did this because he could not impose the death penalty
👍72🔥31❤10🤣6🤓6😢4🤝3❤🔥1🥰1👏1
Moments ago Doxbin was compromised.
A group named "Tooda" has taken credit for the compromise.
In summary, administrative staff from Doxbin got into a verbal altercation with members of Tooda. Doxbin administration accused a Tooda member of being a pedophile.
Tooda retaliated by compromising Doxbin.
Upon compromise of Doxbin, Tooda members did the following (in maybe different steps):
- Dumped every account
- Purged all accounts on the website
- Locked the administrative accounts
- Released Doxbin (alleged) administration PII
- Leaked a so-called "blacklist" — a collection of people who have allegedly paid to not have their information posted on Doxbin
Tooda has claimed online they intend to release the dumped details of Doxbin users. This document is believed to contain roughly 136,000 e-mails and usernames on Doxbin.
Additionally, Tooda has released photos of the Doxbin administrative panel. We have censored some of the content within the panel to protect the privacy of others.
Thank you to "Tongue /🔪", VXDB, and the dozen other people who spammed us online to notify us of the compromise.
A group named "Tooda" has taken credit for the compromise.
In summary, administrative staff from Doxbin got into a verbal altercation with members of Tooda. Doxbin administration accused a Tooda member of being a pedophile.
Tooda retaliated by compromising Doxbin.
Upon compromise of Doxbin, Tooda members did the following (in maybe different steps):
- Dumped every account
- Purged all accounts on the website
- Locked the administrative accounts
- Released Doxbin (alleged) administration PII
- Leaked a so-called "blacklist" — a collection of people who have allegedly paid to not have their information posted on Doxbin
Tooda has claimed online they intend to release the dumped details of Doxbin users. This document is believed to contain roughly 136,000 e-mails and usernames on Doxbin.
Additionally, Tooda has released photos of the Doxbin administrative panel. We have censored some of the content within the panel to protect the privacy of others.
Thank you to "Tongue /🔪", VXDB, and the dozen other people who spammed us online to notify us of the compromise.
🤣114👍17❤11😁8👏3🤔3😢3🔥2🤓2🫡1
Updates to the Doxbin compromise:
tl;dr tl;dr entire conflict is the result of two people fighting over losing access to accounts (?)
We received a notification from a disposable e-mail notifying us of a message from yet another disposable alias "PunchMadeHacks" (?)
In summary: A person familiar with the current Doxbin compromise asserts the site was not "compromised" in the traditional sense. Rather "Tooda", the group claiming responsibility for the "compromise", only successfully retrieved credentials to the Doxbin administrator login. Implying "Tooda" does not have backend access and are limited to what the administrative panel allows.
The remainder of the message from "PunchMadeHacks" provide backstory and insight into the conflict taking place. They claim information on the so-called "blacklist" has been circulating prior to this ... "compromise" (?) and details on the userbase have also been leaked. The message continues to heavily criticizes "Tooda", the previous Doxbin administration, and other monikers we're not familiar with.
The message concludes with "PunchMadeHacks" criticizing us, calling us "clowns" for highlighting the "worst parts of the actual event" — likewise they criticized us for our discussion of "Waifu".
tl;dr tl;dr entire conflict is the result of two people fighting over losing access to accounts (?)
We received a notification from a disposable e-mail notifying us of a message from yet another disposable alias "PunchMadeHacks" (?)
In summary: A person familiar with the current Doxbin compromise asserts the site was not "compromised" in the traditional sense. Rather "Tooda", the group claiming responsibility for the "compromise", only successfully retrieved credentials to the Doxbin administrator login. Implying "Tooda" does not have backend access and are limited to what the administrative panel allows.
The remainder of the message from "PunchMadeHacks" provide backstory and insight into the conflict taking place. They claim information on the so-called "blacklist" has been circulating prior to this ... "compromise" (?) and details on the userbase have also been leaked. The message continues to heavily criticizes "Tooda", the previous Doxbin administration, and other monikers we're not familiar with.
The message concludes with "PunchMadeHacks" criticizing us, calling us "clowns" for highlighting the "worst parts of the actual event" — likewise they criticized us for our discussion of "Waifu".
🤣88👍8🤓6🔥5❤2🤔1😢1