An individual online reported unusual activity when trying to charge their sex toy.
tl;dr vibrator downloads Lumma stealer?
https://tria.ge/240215-xvx86seb91
tl;dr vibrator downloads Lumma stealer?
https://tria.ge/240215-xvx86seb91
π€£230π€―18β€8π€5π3π«‘3β€βπ₯2π₯2π₯°2π±1π€©1
It is Sunday. Today is a day for rest.
See ya tomorrow
See ya tomorrow
π62π€24β€15π14β€βπ₯4π€£4π4π€―1
Today an unknown individual uploaded what appears to be sensitive Chinese government documents... to GitHub. They're labeled "IS00N".
π±67π₯18π11π€4π€£2π1
vx-underground
Today an unknown individual uploaded what appears to be sensitive Chinese government documents... to GitHub. They're labeled "IS00N".
Researchers have already begun digging in and sharing their key findings and opinions.
That's a Monday type of thing though. It is Sunday.
We'll keep you all updated, tomorrow. Have a nice night.:)
That's a Monday type of thing though. It is Sunday.
We'll keep you all updated, tomorrow. Have a nice night.:)
β€47π€£19π«‘5π₯°3π2β€βπ₯1π1
tl;dr archived stuff, see link below
Earlier today a GitHub titled "I-S00N" leaked supposedly sensitive Chinese government data - specifically related to offensive cyber security.
The initial discovery, and documentation of the documents, derive from AzakaSekai_. We have archived his research and notes on the material.
It should be noted that they *probably have not covered the material in totality and more information can be expected to be released in the following days from either Azaka, or other Cyber Threat Intelligence experts familiar with Chinese state-sponsored activity.
Furthermore, the materials are written in Mandarin. We have made no attempt to translate the material to English and we do not speak Mandarin, hence we cannot provide any opinion or speculation on the material. We will leave that painstaking task to individuals who speak Mandarin, or people who feel like trying to translate the documents accurately.
What an exciting start to the week:)
You can view the archived materials here: https://vx-underground.org/APTs/2024/2024.02.18%20-%20Summary%20of%20I-S00N%20leaks
Earlier today a GitHub titled "I-S00N" leaked supposedly sensitive Chinese government data - specifically related to offensive cyber security.
The initial discovery, and documentation of the documents, derive from AzakaSekai_. We have archived his research and notes on the material.
It should be noted that they *probably have not covered the material in totality and more information can be expected to be released in the following days from either Azaka, or other Cyber Threat Intelligence experts familiar with Chinese state-sponsored activity.
Furthermore, the materials are written in Mandarin. We have made no attempt to translate the material to English and we do not speak Mandarin, hence we cannot provide any opinion or speculation on the material. We will leave that painstaking task to individuals who speak Mandarin, or people who feel like trying to translate the documents accurately.
What an exciting start to the week:)
You can view the archived materials here: https://vx-underground.org/APTs/2024/2024.02.18%20-%20Summary%20of%20I-S00N%20leaks
Vx Underground
The largest collection of malware source code, samples, and papers on the internet.
β€82π15π₯6π«‘5π4
Someone in China is having a very bad day
π―102π€£67β€11π7π«‘7π€5π€―4π3π₯°1π1π1
This media is not supported in your browser
VIEW IN TELEGRAM
π€£122β€βπ₯14β€5π3π₯2π±2π€©1
vx-underground
Photo
Okay, we'll stop memeing the Chinese APT leaks. We just had a lot to get off our chest, the absurdity of the situation is too great.
Have a nice day.
Have a nice day.
π80π€£22π«‘9β€6π’6π2π1π₯1
Every single known Lockbit ransomware group website is either offline or displaying a seized by EUROPOL page.
It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.
It appears law enforcement has seized and/or taken down, at minimum, 22 Tor sites, in what is labeled 'Operation Cronos'.
π€£85β€27π€―23π«‘16π±8π6π€4β€βπ₯3π₯3π3π2
Lockbit ransomware group has issued a message to individuals on Tox.
"Π€ΠΠ ΡΠ΅Π±Π°Π»ΠΈ ΡΠ΅ΡΠ²Π΅ΡΠ° ΡΠ΅ΡΠ΅Π· PHP, ΡΠ΅Π·Π΅ΡΠ²Π½ΡΠ΅ ΡΠ΅ΡΠ²Π΅ΡΠ° Π±Π΅Π· PHP Π½Π΅ ΡΡΠΎΠ½ΡΡΡ"
"The FBI fucked up servers using PHP, backup servers without PHP are not touched"
"Π€ΠΠ ΡΠ΅Π±Π°Π»ΠΈ ΡΠ΅ΡΠ²Π΅ΡΠ° ΡΠ΅ΡΠ΅Π· PHP, ΡΠ΅Π·Π΅ΡΠ²Π½ΡΠ΅ ΡΠ΅ΡΠ²Π΅ΡΠ° Π±Π΅Π· PHP Π½Π΅ ΡΡΠΎΠ½ΡΡΡ"
"The FBI fucked up servers using PHP, backup servers without PHP are not touched"
π€£147π€24π«‘10β€5π5π€―1
Media is too big
VIEW IN TELEGRAM
"We may be in touch with you very soon" - National Crime Agency of the UK, the FBI, Europol, Operation Cronos Law Enforcement Task Force
Them getting in touch:
Them getting in touch:
π€£195π₯11π5π5π’5π―5β€3π«‘3π±2π€1
Lockbit ransomware group administration claims that law enforcement agencies compromised them by exploiting CVE-2023-3824
More information: https://nvd.nist.gov/vuln/detail/CVE-2023-3824
More information: https://nvd.nist.gov/vuln/detail/CVE-2023-3824
π€£120π€―36π«‘13π8β€3π3π€2π2π1π1
Today was a big day for the United States government and United Kingdom government. The Federal Bureau of Investigation and U.K. National Crime Agencyβs (NCA) Cyber Division unveiled a massive, multi-year long investigation which has led to a catastrophic blow to Lockbit ransomware group and affiliates.
The Lockbit ransomware group Tor domain name displays a list of posts announcing activity performed by law enforcement agencies. It is written in Lockbit format, illustrating they have full control over Lockbit ransomware groups infrastructure.
Law enforcement has done the following
1. Law enforcement agencies will be unveiling sensitive information on Lockbit cryptocurrency and money operations February 23th, 2024
2. Law enforcement, with SecureWorks, will be revealing information on Lockbit tradecraft February 22nd, 2024
3. Law enforcement will be unveiling Lockbit affiliate infrastructure February 21st, 2024
4. Law enforcement, with TrendMicro, will be releasing a detailed analysis on Lockbit future-iterations February 22nd, 2024
5. Law enforcement will be unveiling information on Lockbit's StealBit data exfiltration tool February 21st, 2024
6. Law enforcement will be unveiling sanctions on Lockbit ransomware group at 15:30UTC today
7. Law enforcement, in conjunction with Japanese partners, has released a Lockbit decryptor tool
8. An individual in Poland has been arrested
9. An individual in Ukraine has been arrested
10. Law enforcement plans on unveiling the identity of the Lockbit ransomware group administration February 23rd, 2024
11. The United States government unveiled the indictement of two individuals associated with Lockbit ransomware group: Artur Sungatov and Ivan Kondratyev
12. The United Kingdom NCA has unveiled sensitive information on the Lockbit backend: the administration panel, the blog backend, and the blog source functionality. This includes the images of the source code.
The Lockbit ransomware group Tor domain name displays a list of posts announcing activity performed by law enforcement agencies. It is written in Lockbit format, illustrating they have full control over Lockbit ransomware groups infrastructure.
Law enforcement has done the following
1. Law enforcement agencies will be unveiling sensitive information on Lockbit cryptocurrency and money operations February 23th, 2024
2. Law enforcement, with SecureWorks, will be revealing information on Lockbit tradecraft February 22nd, 2024
3. Law enforcement will be unveiling Lockbit affiliate infrastructure February 21st, 2024
4. Law enforcement, with TrendMicro, will be releasing a detailed analysis on Lockbit future-iterations February 22nd, 2024
5. Law enforcement will be unveiling information on Lockbit's StealBit data exfiltration tool February 21st, 2024
6. Law enforcement will be unveiling sanctions on Lockbit ransomware group at 15:30UTC today
7. Law enforcement, in conjunction with Japanese partners, has released a Lockbit decryptor tool
8. An individual in Poland has been arrested
9. An individual in Ukraine has been arrested
10. Law enforcement plans on unveiling the identity of the Lockbit ransomware group administration February 23rd, 2024
11. The United States government unveiled the indictement of two individuals associated with Lockbit ransomware group: Artur Sungatov and Ivan Kondratyev
12. The United Kingdom NCA has unveiled sensitive information on the Lockbit backend: the administration panel, the blog backend, and the blog source functionality. This includes the images of the source code.
π₯127π’38β€13π13π€£7π€―6π6π€©6π€5π3π1