StreamElements web store was compromised. Over 100,000 people impacted.
The Threat Actor responsible was kind enough to notify the impacted customers by sending all of them an email from "Diddy Squad".
The Threat Actor responsible was kind enough to notify the impacted customers by sending all of them an email from "Diddy Squad".
❤72😁44💯7👍6🥰3😢1
1. StreamElements confirms there was a data breach. However, they assert their web shop is ran be an external entity. They were not compromised, but customer data was still stolen. ¯\_(ツ)_/¯
2. WoW! ISP breach was (probably) the result of information stealer malware (the usual suspect). HudsonRock confirms the names and information displayed in the video from Arkana ransomware were previously found in information stealer logs.
tl;dr employee with actual access to stuff at isp somehow does oopsie, detonates infostealer malware, ransomware nerds get it, chaos ensues
tl;dr tl;dr big hacks always infostealers, phishing, or social engineering
tl;dr x3 ¯\_(ツ)_/¯
2. WoW! ISP breach was (probably) the result of information stealer malware (the usual suspect). HudsonRock confirms the names and information displayed in the video from Arkana ransomware were previously found in information stealer logs.
tl;dr employee with actual access to stuff at isp somehow does oopsie, detonates infostealer malware, ransomware nerds get it, chaos ensues
tl;dr tl;dr big hacks always infostealers, phishing, or social engineering
tl;dr x3 ¯\_(ツ)_/¯
🔥50🤣18👍8❤🔥6😢1
> researcher releases cool paper
> *crickets*
> influencer with mailing list appears
> shares stolen lame cheat sheet png
> 100000 likes
> 50000 retweets
> noobs in comments foaming out mouth
> *crickets*
> influencer with mailing list appears
> shares stolen lame cheat sheet png
> 100000 likes
> 50000 retweets
> noobs in comments foaming out mouth
❤80🤣42😢32🔥8🤓3💯2
Hello, how are you?
First and foremost: thank you to our friends at TorGuard for the hosting they've been providing us. It's a wonderful gift and it makes our lives WAY easier. Thank you, Mr. TorGuard.
Anyway, we're almost done restoring the virus-dot-exchange. We've successfully uploaded 26,356,958 malwares. We have more to add, but we're almost done. It's truly a Christmas miracle. In an ideal world, the migration will be completed ... next week sometime.
Following the completion of the restoration of the virus exchange, we'll be hammering vx-underground with new APT malware samples and papers. Additionally, we've got tons of new malware we need to add from the InTheWild collection and VirusSign collection. We will also resume malware ingestion.
Sometime during this chaos, we'll be adding more work from Cryakl. We want to review our malware builders collection to ensure it's sterile-ish (no way we can truly confirm a malware builder is safe, use at your own caution, use common sense).
I'll also ensure during the work more kitty cat pictures will be present on social media (it irritates some of our more serious followers, no idea why we find that so humorous, but it is) and continue being cybercrime TMZ.
Have a nice morning, evening, or night.
- smelly smellington
First and foremost: thank you to our friends at TorGuard for the hosting they've been providing us. It's a wonderful gift and it makes our lives WAY easier. Thank you, Mr. TorGuard.
Anyway, we're almost done restoring the virus-dot-exchange. We've successfully uploaded 26,356,958 malwares. We have more to add, but we're almost done. It's truly a Christmas miracle. In an ideal world, the migration will be completed ... next week sometime.
Following the completion of the restoration of the virus exchange, we'll be hammering vx-underground with new APT malware samples and papers. Additionally, we've got tons of new malware we need to add from the InTheWild collection and VirusSign collection. We will also resume malware ingestion.
Sometime during this chaos, we'll be adding more work from Cryakl. We want to review our malware builders collection to ensure it's sterile-ish (no way we can truly confirm a malware builder is safe, use at your own caution, use common sense).
I'll also ensure during the work more kitty cat pictures will be present on social media (it irritates some of our more serious followers, no idea why we find that so humorous, but it is) and continue being cybercrime TMZ.
Have a nice morning, evening, or night.
- smelly smellington
❤70👍17🫡5🤔2😢1
vx-underground
We get probably 2 or 3 messages about this scam e-mail a month. We've also been informed by some people they've actually paid the 'ransom'.
Interestingly, a majority of people who have told us they've paid the 'ransom' are people who we believe to be mentally ill. The people have suggested the government is tracking them, the former (or current) presidential administration is targeting them, or they have some sort of connection to a higher spiritual being.
tl;dr mentally ill people falling for it, sad tbh
tl;dr mentally ill people falling for it, sad tbh
🤣64😢40🥰3🤯3😱3👍1
vx-underground
Interestingly, a majority of people who have told us they've paid the 'ransom' are people who we believe to be mentally ill. The people have suggested the government is tracking them, the former (or current) presidential administration is targeting them, or…
More interestingly (maybe?), we've also witnessed people who are exhibitionists seem excited by the prospect of being extorted and having their genitals exposed to people they know.
The internet is a cool place
The internet is a cool place
🤣91🔥14💯7❤2🎉2
cl0p ransomware claims to have compromised Sam's Club.
For non-Ameriburgers — Sam's Club is a place where Americans pay a fee to get access to a store where you can buy food in bulk for cheaper. You can buy Monster Energy drinks by the pallet (no idea why you'd want to do it, but we do it).
Based on the history of cl0p ransomware, cl0p ransomware (probably) isn't lying. cl0p also historically exfiltrates data, they have not (to the best of our knowledge) actually "locked" machines on a network.
¯\_(ツ)_/¯
Information via AlvieriD
For non-Ameriburgers — Sam's Club is a place where Americans pay a fee to get access to a store where you can buy food in bulk for cheaper. You can buy Monster Energy drinks by the pallet (no idea why you'd want to do it, but we do it).
Based on the history of cl0p ransomware, cl0p ransomware (probably) isn't lying. cl0p also historically exfiltrates data, they have not (to the best of our knowledge) actually "locked" machines on a network.
¯\_(ツ)_/¯
Information via AlvieriD
😁59👍11🤓11🤝5❤3🎉2🔥1👏1😢1
It's fun memeing nerds for hacking websites.
It's funnier because we couldn't hack a website if our lives depended on it because we've spent our entire lives screaming into the void of Windows internals
It's funnier because we couldn't hack a website if our lives depended on it because we've spent our entire lives screaming into the void of Windows internals
🤣103🤓11❤🔥9💯6😁4❤2👍2😢1
Just learned Costco uses IBM AS/400 (released in 1988)
They're basically bulletproof. Name 1 ransomware variant, or information stealer, designed for systems from 1988 (you can't, it doesn't exist)
Chat, we're Costco guys 🤝
They're basically bulletproof. Name 1 ransomware variant, or information stealer, designed for systems from 1988 (you can't, it doesn't exist)
Chat, we're Costco guys 🤝
❤153🤣42🔥10👍2😢1💯1🤝1😎1
vx-underground
Just learned Costco uses IBM AS/400 (released in 1988) They're basically bulletproof. Name 1 ransomware variant, or information stealer, designed for systems from 1988 (you can't, it doesn't exist) Chat, we're Costco guys 🤝
Threat Actors trying to figure out what kind of piece of shit they're targeting (it's using PowerPC architecture, 256kb of RAM, and 12mb of harddrive storage)
🤣219😁18👍7🔥6😱6❤4🤓2😢1