International Cyber Digest
3.4K subscribers
178 photos
11 videos
2 files
22 links
Your weekly go-to cybersecurity newsletter, curated and commented on by our senior analysts.
Download Telegram
‼️We did some OSINT on the leaked Kash Patel email addresses (spiderkash and patelkpp) and found some interesting things. A thread...

We found Kash identified himself as FEMALE on the Mindbody app. 💅

We can see he accessed his Gmail just today, two hours ago...

Kash has been buying fashion in Hong Kong... And likes to drive Toyota.

Kash has been using the username 'spiderkash' not only for his email addresses but also for several accounts.

Kash likes gifs and uses Snapchat..

Spiderkash uses eBay.

Kash has a lot of leaked passwords...
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
1🤣255
'SPIDERKASH'
😁26💩12🤣6
I refuse to believe this is him, it must be someone else 🙈
1🤣44😭35🤪7🔥31
🚨‼️ EXCLUSIVE: Zoom was breached by threat actor Mr. Raccoon.

A South Korean employee installed an infostealer via a fake Zoom-themed website, delivered through a spoofed security email.

Mr. Raccoon told us: "Their security was terrible, but Okta saved them."

We asked Zoom for comment. They told us: "will get back to you on a comment shortly."

It's been almost 24 hours. Still no comment.

Update:

A Zoom spokesperson just told us:

"We conducted an investigation and have not identified any evidence of access to Zoom’s system or data beyond a response to a phishing attempt, which granted limited access to a single employee’s third-party dashboard. We have not identified any evidence of further access to Zoom’s system or data."
🤔83👍2
‼️ GangExposed RU claims to have names, connections and photos of the Iranian Handala threat actor who breached Kash Patel's Gmail.

This information is worth $10,000,000.

All they're asking in return is for the FBI to arrest members of the Conti ransomware group.
😁11🤯7💩4🤣32
🚨 MASSIVE CYBERATTACK: The EU Commission, ENISA, and the DG for Digital Services have been compromised by threat actor ShinyHunters.

Leaked data includes:
▪️ Emails & attachments
▪️ Full SSO user directory
▪️ DKIM signing keys
▪️ AWS config snapshots
▪️ NextCloud/Athena data
▪️ Internal admin URLs

It's a mess!

We suspect the threat actor compromised the EU's AWS environment. We reached out to the attackers for comment, but they refused to share any details about the breach.
2😱103
❗️Security researchers used a low-cost consumer satellite dish to intercept satellite signals and found massive amounts of unencrypted traffic.

Revealing:
📡 Military and government comms including GPS data
📡 Credit card transactions
📡 Phone calls and texts from remote cell towers
📡 In-flight Wi-Fi activity

Presentation: https://www.youtube.com/watch?v=fM5w7bFNvWI

Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites:

https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpaper.pdf

P.s. could anyone boost our channel so we level up? Thank you: https://t.iss.one/IntCyberDigest?boost
🤯3🔥2
‼️ Telegram allegedly has a CRITICAL zero-day vulnerability.

To exploit it, a threat actor has to send a corrupted sticker to their victim.

Telegram directly addressed the claim, stating the vulnerability does not exist.

We've asked the researcher for comment — stay tuned.
🤣35🤔42💩1😭1
‼️ S&P Global, responsible for the S&P 500, was compromised by TeamPCP during recent supply chain attacks (Trivy / LiteLLM).

We’ve known spglobal[.]com was on their list for some time now and didn’t get any reply from their press contact.
😱10🤣21
🚨‼️ BREAKING: Databricks allegedly compromised in a TeamPCP supply chain attack.

Databricks is the leading cloud-based data analytics platform: used by organizations worldwide to manage massive datasets.

We notified them last week. They scaled up to investigate. We haven't heard back since.
7