Today the State of California sentenced Alan Filion to 4 years in prison for being a "serial swatter".
This case is notable in that a majority of the crimes committed by Mr. Filion occurred when he was a minor. He also plead guilty to seek leniency.
https://www.justice.gov/opa/pr/california-teenager-sentenced-48-months-prison-nationwide-swatting-spree
This case is notable in that a majority of the crimes committed by Mr. Filion occurred when he was a minor. He also plead guilty to seek leniency.
https://www.justice.gov/opa/pr/california-teenager-sentenced-48-months-prison-nationwide-swatting-spree
www.justice.gov
California Teenager Sentenced to 48 Months in Prison for Nationwide
Alan W. Filion, 18, of Lancaster, California, was sentenced today to 48 months in prison for making interstate threats to injure the person of another.
🤣42🎉14🙏7🤯5👍2😢2❤1😘1
Hi,
I've resumed work on my "VX-API".
It's basically a collection of my malware coding snippets I wrote. Feel free to copy-paste from it or study it.
This is incomplete. I'll add more later.
- smelly smellington
https://vx-api.gitbook.io/vx-api
I've resumed work on my "VX-API".
It's basically a collection of my malware coding snippets I wrote. Feel free to copy-paste from it or study it.
This is incomplete. I'll add more later.
- smelly smellington
https://vx-api.gitbook.io/vx-api
vx-api.gitbook.io
Introduction | vx-api
❤61🔥8🤔6🤓4😢2❤🔥1
> go online
> check new doj press release on 8base
> says 8base attacked children's hospital
> says 8base is facing 130 YEARS IN PRISON
Holy cannoli. Feds are NOT playing fam
> check new doj press release on 8base
> says 8base attacked children's hospital
> says 8base is facing 130 YEARS IN PRISON
Holy cannoli. Feds are NOT playing fam
🤣69🤯17🫡7😢5🤓5
vx-underground
> go online > check new doj press release on 8base > says 8base attacked children's hospital > says 8base is facing 130 YEARS IN PRISON Holy cannoli. Feds are NOT playing fam
This is a new record. On average we've seen ransomware affiliates receive 20 - 40 years in prison.
Previously, the record holder for time faced was Alexander Moucka a/k/a Waifu with his charge of 100 years in prison.
130 years is the new record.
See you in 2155, 8base
Previously, the record holder for time faced was Alexander Moucka a/k/a Waifu with his charge of 100 years in prison.
130 years is the new record.
See you in 2155, 8base
🫡64💯10🤓5😢4❤1👍1🔥1🤣1
vx-underground
This is a new record. On average we've seen ransomware affiliates receive 20 - 40 years in prison. Previously, the record holder for time faced was Alexander Moucka a/k/a Waifu with his charge of 100 years in prison. 130 years is the new record. See you…
Actually, there was a couple who was producing CSAM of their child and selling it online. The husband and wife were sentenced to 10,000 years in prison to ensure they'd never be paroled.
The judge also did this because he could not impose the death penalty
The judge also did this because he could not impose the death penalty
👍72🔥31❤10🤣6🤓6😢4🤝3❤🔥1🥰1👏1
Moments ago Doxbin was compromised.
A group named "Tooda" has taken credit for the compromise.
In summary, administrative staff from Doxbin got into a verbal altercation with members of Tooda. Doxbin administration accused a Tooda member of being a pedophile.
Tooda retaliated by compromising Doxbin.
Upon compromise of Doxbin, Tooda members did the following (in maybe different steps):
- Dumped every account
- Purged all accounts on the website
- Locked the administrative accounts
- Released Doxbin (alleged) administration PII
- Leaked a so-called "blacklist" — a collection of people who have allegedly paid to not have their information posted on Doxbin
Tooda has claimed online they intend to release the dumped details of Doxbin users. This document is believed to contain roughly 136,000 e-mails and usernames on Doxbin.
Additionally, Tooda has released photos of the Doxbin administrative panel. We have censored some of the content within the panel to protect the privacy of others.
Thank you to "Tongue /🔪", VXDB, and the dozen other people who spammed us online to notify us of the compromise.
A group named "Tooda" has taken credit for the compromise.
In summary, administrative staff from Doxbin got into a verbal altercation with members of Tooda. Doxbin administration accused a Tooda member of being a pedophile.
Tooda retaliated by compromising Doxbin.
Upon compromise of Doxbin, Tooda members did the following (in maybe different steps):
- Dumped every account
- Purged all accounts on the website
- Locked the administrative accounts
- Released Doxbin (alleged) administration PII
- Leaked a so-called "blacklist" — a collection of people who have allegedly paid to not have their information posted on Doxbin
Tooda has claimed online they intend to release the dumped details of Doxbin users. This document is believed to contain roughly 136,000 e-mails and usernames on Doxbin.
Additionally, Tooda has released photos of the Doxbin administrative panel. We have censored some of the content within the panel to protect the privacy of others.
Thank you to "Tongue /🔪", VXDB, and the dozen other people who spammed us online to notify us of the compromise.
🤣114👍17❤11😁8👏3🤔3😢3🔥2🤓2🫡1
Updates to the Doxbin compromise:
tl;dr tl;dr entire conflict is the result of two people fighting over losing access to accounts (?)
We received a notification from a disposable e-mail notifying us of a message from yet another disposable alias "PunchMadeHacks" (?)
In summary: A person familiar with the current Doxbin compromise asserts the site was not "compromised" in the traditional sense. Rather "Tooda", the group claiming responsibility for the "compromise", only successfully retrieved credentials to the Doxbin administrator login. Implying "Tooda" does not have backend access and are limited to what the administrative panel allows.
The remainder of the message from "PunchMadeHacks" provide backstory and insight into the conflict taking place. They claim information on the so-called "blacklist" has been circulating prior to this ... "compromise" (?) and details on the userbase have also been leaked. The message continues to heavily criticizes "Tooda", the previous Doxbin administration, and other monikers we're not familiar with.
The message concludes with "PunchMadeHacks" criticizing us, calling us "clowns" for highlighting the "worst parts of the actual event" — likewise they criticized us for our discussion of "Waifu".
tl;dr tl;dr entire conflict is the result of two people fighting over losing access to accounts (?)
We received a notification from a disposable e-mail notifying us of a message from yet another disposable alias "PunchMadeHacks" (?)
In summary: A person familiar with the current Doxbin compromise asserts the site was not "compromised" in the traditional sense. Rather "Tooda", the group claiming responsibility for the "compromise", only successfully retrieved credentials to the Doxbin administrator login. Implying "Tooda" does not have backend access and are limited to what the administrative panel allows.
The remainder of the message from "PunchMadeHacks" provide backstory and insight into the conflict taking place. They claim information on the so-called "blacklist" has been circulating prior to this ... "compromise" (?) and details on the userbase have also been leaked. The message continues to heavily criticizes "Tooda", the previous Doxbin administration, and other monikers we're not familiar with.
The message concludes with "PunchMadeHacks" criticizing us, calling us "clowns" for highlighting the "worst parts of the actual event" — likewise they criticized us for our discussion of "Waifu".
🤣88👍8🤓6🔥5❤2🤔1😢1
Today Jairo Jaime Tinajero, 25, of Kentucky, United States, plead guilty to a series of charges in relation to online activity in a group named "764".
The court details are pretty bad. In summary, Mr. Tinajero and a currently unidentified co-conspirator enticed an underage woman to produce CSAM (child sexual abuse material) for them. When the victim refused to produce more CSAM, Mr. Tinajero and the co-conspirator decided to murder the victim.
Court details show Mr. Tinajero discussing the murder on Telegram and Mr. Tinajero trying to recruit others on Telegram to assist in the murder of the underage victim.
No information is available on how the United States Federal Bureau of Investigation retrieved his private Telegram messages between other people.
Due to the severity of the crimes Mr. Tinajero is being charged with the following:
- Racketeering Conspiracy (20 years)
- Online Enticement (10 years)
- Production of child sexual abuse material (x3) (15 - 30 years per count)
- Distribution of child sexual abuse material (CSAM) (x3) (5 years - 30 years per count)
- Interstate communications of threats (x5) (5 years per count)
- Cyberstalking (5 years)
- Conspiracy to murder in aid of racketeering (10 years)
Due to the severity of the crimes, and a plea deal, Mr. Tinajero is applicable for additional sentencing under U.S.S.G. § 3A1.4 n. 4. This charge means Mr. Tinajero (in some capacity) aided or promoted terrorism which enhances his sentencing. If the charge is applied, this would add an additional 75 years - life.
Mr. Tinajero is facing (at maximum), 3 life sentences, or 325 years in prison.
The court details are pretty bad. In summary, Mr. Tinajero and a currently unidentified co-conspirator enticed an underage woman to produce CSAM (child sexual abuse material) for them. When the victim refused to produce more CSAM, Mr. Tinajero and the co-conspirator decided to murder the victim.
Court details show Mr. Tinajero discussing the murder on Telegram and Mr. Tinajero trying to recruit others on Telegram to assist in the murder of the underage victim.
No information is available on how the United States Federal Bureau of Investigation retrieved his private Telegram messages between other people.
Due to the severity of the crimes Mr. Tinajero is being charged with the following:
- Racketeering Conspiracy (20 years)
- Online Enticement (10 years)
- Production of child sexual abuse material (x3) (15 - 30 years per count)
- Distribution of child sexual abuse material (CSAM) (x3) (5 years - 30 years per count)
- Interstate communications of threats (x5) (5 years per count)
- Cyberstalking (5 years)
- Conspiracy to murder in aid of racketeering (10 years)
Due to the severity of the crimes, and a plea deal, Mr. Tinajero is applicable for additional sentencing under U.S.S.G. § 3A1.4 n. 4. This charge means Mr. Tinajero (in some capacity) aided or promoted terrorism which enhances his sentencing. If the charge is applied, this would add an additional 75 years - life.
Mr. Tinajero is facing (at maximum), 3 life sentences, or 325 years in prison.
😱51👏27🤣15❤6👍6🫡6😢1🤝1
vx-underground
Today Jairo Jaime Tinajero, 25, of Kentucky, United States, plead guilty to a series of charges in relation to online activity in a group named "764". The court details are pretty bad. In summary, Mr. Tinajero and a currently unidentified co-conspirator enticed…
Note: The victim was not murdered. Mr. Tinajero was apprehended while plotting the murder.
🔥58❤20👏10😢2🤣2
On Monday the United States Department of Justice did a press release on the takedown of 8base ransomware group.
Two Russian nationals residing in Thailand, Roman Berezhnoy (33) and Egor Nikolaevich Glebov (39), deployed Phobos ransomware (under the branding of 8base) to over 1,000 public and private entities. Their ransom profits exceeded $16,500,000.
From May, 2019 to October, 2024, Mr. Berezhnoy and Mr. Glebov deployed their ransomware payload most notably to children's hospitals, healthcare facilities, and educational institutes.
The United States government, in conjunction with international partners in Europe (notably, Germany), disrupted over 100 servers related to 8base ransomware group or their affiliates.
Mr. Berezhnoy and Mr. Glebov are facing the following charges:
- Wire fraud conspiracy (20 years)
- Wire fraud (20 years)
- Conspiracy to commit computer fraud and abuse (10 years)
- Causing intentional damage to protected computers (x3) (10 years per count)
- Extortion in relation to damage to a protected computer (x3) (10 years per count)
- Transmitting a threat to impair the confidentiality of stolen data (5 years)
- Unauthorized access and obtaining information from a protected computer (5 years)
Mr. Berezhnoy and Mr. Glebov are facing a maximum sentence of 120 years in prison.
Two Russian nationals residing in Thailand, Roman Berezhnoy (33) and Egor Nikolaevich Glebov (39), deployed Phobos ransomware (under the branding of 8base) to over 1,000 public and private entities. Their ransom profits exceeded $16,500,000.
From May, 2019 to October, 2024, Mr. Berezhnoy and Mr. Glebov deployed their ransomware payload most notably to children's hospitals, healthcare facilities, and educational institutes.
The United States government, in conjunction with international partners in Europe (notably, Germany), disrupted over 100 servers related to 8base ransomware group or their affiliates.
Mr. Berezhnoy and Mr. Glebov are facing the following charges:
- Wire fraud conspiracy (20 years)
- Wire fraud (20 years)
- Conspiracy to commit computer fraud and abuse (10 years)
- Causing intentional damage to protected computers (x3) (10 years per count)
- Extortion in relation to damage to a protected computer (x3) (10 years per count)
- Transmitting a threat to impair the confidentiality of stolen data (5 years)
- Unauthorized access and obtaining information from a protected computer (5 years)
Mr. Berezhnoy and Mr. Glebov are facing a maximum sentence of 120 years in prison.
🤣40🔥17👍10❤4😱4😢2
Here is "Jeff" my Windows Component Object Model-only (kind of) keylogger.
https://vx-api.gitbook.io/vx-api/my-projects/jeff-com-only-keylogger
https://vx-api.gitbook.io/vx-api/my-projects/jeff-com-only-keylogger
vx-api.gitbook.io
"Jeff", COM-only keylogger | vx-api
❤🔥41😁7👍4❤3😢2
Thinking about when, in 2015, the Federal Bureau of Investigation employed "Network Investigative Techniques" a/k/a "NIT" to catch pedophiles visiting a CSAM website.
"NIT" acted as drive-by malware and would allow law enforcement remote access to peoples machines (allegedly)
"NIT" acted as drive-by malware and would allow law enforcement remote access to peoples machines (allegedly)
❤44😱11🤯7😢3🤔2
Per 404mediaco — the United States Department of Government Efficiency (D.O.G.E.), the newly formed government agency ran by Elon Musk, appears to have some security problems.
Two web security experts discovered it is possible to push updates to the D.O.G.E. database.
Two web security experts discovered it is possible to push updates to the D.O.G.E. database.
🤣132❤13😁8😱6🤓5👏2