Media is too big
VIEW IN TELEGRAM
The latest release from Operation Endgame has been released.
In this video it is evident that Law enforcement agencies across the globe banded together to pay for roughly 30 seconds of Skrillex sound bites
In this video it is evident that Law enforcement agencies across the globe banded together to pay for roughly 30 seconds of Skrillex sound bites
π€£98β€11π₯5π5π4π3π’1
Crazy to think we've got Fed anime and Fed dubstep before we got Elder Scrolls VI or Grand Theft Auto VI
π€£119π₯8β€4π3π1π1π’1
Previously on Dragon Ball Z: Law enforcement agents seized the BreachForum backend and placed a 'this site has been seized' sticker on the BreachForum landing page. However, shortly after the takedown, BreachForum quickly returned online.
Fast forward to today: BreachForum administrative staff issued a statement on their forum to Breach members and law enforcement agencies. The messages are attached to this post.
Breach administrative staff also shared e-mail's between them and their host provider
In summary Breach administrative staff assert law enforcement failed to successfully executive a seizure and inadvertently caused damage to a business who is not affiliated with them. Breach administrators also some how acquired the e-mail correspondence between law enforcement agencies and their host provider.
Fast forward to today: BreachForum administrative staff issued a statement on their forum to Breach members and law enforcement agencies. The messages are attached to this post.
Breach administrative staff also shared e-mail's between them and their host provider
In summary Breach administrative staff assert law enforcement failed to successfully executive a seizure and inadvertently caused damage to a business who is not affiliated with them. Breach administrators also some how acquired the e-mail correspondence between law enforcement agencies and their host provider.
π€£128π€―8β€2π₯2π’1
vx-underground
Previously on Dragon Ball Z: Law enforcement agents seized the BreachForum backend and placed a 'this site has been seized' sticker on the BreachForum landing page. However, shortly after the takedown, BreachForum quickly returned online. Fast forward toβ¦
"successfully executive"
Imagine if we could make a single post without sounding like a bunch of idiots
Imagine if we could make a single post without sounding like a bunch of idiots
β€βπ₯61π€£28β€5π4π2π₯2π―2π₯°1π’1π1
Today the National Police of Ukraine, in conjunction with the Cyber Department of the Security Service of Ukraine, announced a takedown of multiple 'hacker services'.
The takedown is in partnership with the United States, France, the Netherlands, the United Kingdom, Northern Ireland, Denmark, and Germany in what is now being labeled as "Operation Endgame".
The raids disclosed today are related to 'Pikabot', 'IcedId', and 'AlexCrypt'. These malicious tools and malware campaigns are explicitly noted by the National Police of Ukraine as being in the arsenal of Russian-based Threat Groups 'BlackBasta', 'REvil', and 'Conti'.
Raids were conducted in unspecified regions of Ukraine. However, it is noted suspected developers, suspected administrators, and suspected operation organizers were raided. Furthermore, servers were 'blocked' (?), mobile devices were seized, and computer equipment was seized.
More information: https://cyberpolice.gov.ua/news/zablokovano-xakerski-servisy-svitovyx-kiberzlochynnyx-organizaczij-slidchi-naczpolicziyi-ukrayiny-doluchylysya-do-mizhnarodnoyi-speczoperacziyi-endgame-2143/
The takedown is in partnership with the United States, France, the Netherlands, the United Kingdom, Northern Ireland, Denmark, and Germany in what is now being labeled as "Operation Endgame".
The raids disclosed today are related to 'Pikabot', 'IcedId', and 'AlexCrypt'. These malicious tools and malware campaigns are explicitly noted by the National Police of Ukraine as being in the arsenal of Russian-based Threat Groups 'BlackBasta', 'REvil', and 'Conti'.
Raids were conducted in unspecified regions of Ukraine. However, it is noted suspected developers, suspected administrators, and suspected operation organizers were raided. Furthermore, servers were 'blocked' (?), mobile devices were seized, and computer equipment was seized.
More information: https://cyberpolice.gov.ua/news/zablokovano-xakerski-servisy-svitovyx-kiberzlochynnyx-organizaczij-slidchi-naczpolicziyi-ukrayiny-doluchylysya-do-mizhnarodnoyi-speczoperacziyi-endgame-2143/
π€£63π20β€7π’5π1π€1π«‘1
We are aware that one of the images released by the National Police of Ukraine, during a raid from Operation Endgame, shows an arrest of a naked person.
No information is given on who this person is or why they're naked.
tl;dr prolly raided while showering or going potty
No information is given on who this person is or why they're naked.
tl;dr prolly raided while showering or going potty
π€£108π«‘27π7π’2
This media is not supported in your browser
VIEW IN TELEGRAM
Security researcher GossiTheDog shared a TikTok video from Microsoft employees showing Microsoft Recall.
Rest assured that malware will not be able to access it and your privacy is safe (joking, it's super unsafe)
Rest assured that malware will not be able to access it and your privacy is safe (joking, it's super unsafe)
π€£129π11β€4π±3π€2π1π’1
vx-underground
Security researcher GossiTheDog shared a TikTok video from Microsoft employees showing Microsoft Recall. Rest assured that malware will not be able to access it and your privacy is safe (joking, it's super unsafe)
The good news: prompted UAC, administrative privileges required to access this folder
The bad news: still easily accessible
The bad news: still easily accessible
π€£135π7π6π₯5π1π’1
May 26th Hudson Rock began investigating the alleged TicketMaster breach and the subseuent Santander Bank breach. They spoke with an unidentified Threat Actor(s) claiming responsibility for the breach. Hudson Rock was able to confirm some of their statements.
They discovered Snowflake, a large cloud storage provider, was impacted by Lumma Stealer.
The unidentified Threat Actor states they were able to get access to those companies by Infostealer malware, which allowed them to log into ServiceNow and bypass OKTA.
The unidentified Threat Actor(s) stated they're trying to extort Snowflake for $20,000,000 but Snowflake has ignored them. The Threat Actor(s) also claim to have exfiltrated sensitive data from over 400 companies which use Snowflake.
More information: https://www.hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection
They discovered Snowflake, a large cloud storage provider, was impacted by Lumma Stealer.
The unidentified Threat Actor states they were able to get access to those companies by Infostealer malware, which allowed them to log into ServiceNow and bypass OKTA.
The unidentified Threat Actor(s) stated they're trying to extort Snowflake for $20,000,000 but Snowflake has ignored them. The Threat Actor(s) also claim to have exfiltrated sensitive data from over 400 companies which use Snowflake.
More information: https://www.hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection
Hudson Rock
Hudson Rock - Infostealer Intelligence Solutions
Powered by Hudson Rock's continuously augmented cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.
π₯46π3π±3β€2
Snowflake has put out a statement denying being compromised
Full statement: https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access
Full statement: https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access
Snowflake
Snowflake Community
Join our community of data professionals to learn, connect, share and innovate together
π€28π4π4π’2
Media is too big
VIEW IN TELEGRAM
Law enforcement has released a new 'episode' of Operation Endgame. The video is odd.
π€93π€£27π€4π’3β€2π2π2π1
Previously on Dragon Ball Z, the individuals who claim responsibility for the TicketMaster breach stated they got access via a Managed Service Provider β which was later determined to be Snowflake. They claimed access was gotten via an infostealer.
Today Live Nation Entertainment a/k/a TicketMaster reported to the SEC that they had indeed been compromised (SEC link attached at the bottom of post)
Hudson Rock confirmed that employee credentials from Snowflake were stolen via a Lumma Stealer campaign. However, Snowflake put out a statement today stating they have not been compromised and that they believe the individual companies were compromised as a result of poor security practices. White Intel corroborated the findings from Hudson Rock by disclosing more information on the Lumma Stealer campaign.
Will Snowflake reverse their statement and say they're compromised? Will TicketMaster data be leaked online? Will Lumma Stealer keep hitting large companies? Will more data from Snowflake be leaked online? Find out on the next episode of Dragon Ball Z
Official SEC report: https://www.sec.gov/Archives/edgar/data/1335258/000133525824000081/lyv-20240520.htm
Today Live Nation Entertainment a/k/a TicketMaster reported to the SEC that they had indeed been compromised (SEC link attached at the bottom of post)
Hudson Rock confirmed that employee credentials from Snowflake were stolen via a Lumma Stealer campaign. However, Snowflake put out a statement today stating they have not been compromised and that they believe the individual companies were compromised as a result of poor security practices. White Intel corroborated the findings from Hudson Rock by disclosing more information on the Lumma Stealer campaign.
Will Snowflake reverse their statement and say they're compromised? Will TicketMaster data be leaked online? Will Lumma Stealer keep hitting large companies? Will more data from Snowflake be leaked online? Find out on the next episode of Dragon Ball Z
Official SEC report: https://www.sec.gov/Archives/edgar/data/1335258/000133525824000081/lyv-20240520.htm
π€£68β€11π4π2π«‘2π’1
We believe in security through obscurity.
That's why we use a custom built OS that relies on CLGUI (Command Line Graphical User Interface, pronounced KLA GOO EE). It uses images instead of text for the CLI.
Instead of DIR or LS we use a picture of Chicken. GREP is a Kitty
That's why we use a custom built OS that relies on CLGUI (Command Line Graphical User Interface, pronounced KLA GOO EE). It uses images instead of text for the CLI.
Instead of DIR or LS we use a picture of Chicken. GREP is a Kitty
π€£120π10π«‘7β€βπ₯6π€―6π2π₯2π€2β€1π’1π€1
We've broken 300,000 followers on Xitter
Thank you for the love and support.
Cheers to 400,000
Love youβ₯οΈ
Thank you for the love and support.
Cheers to 400,000
Love youβ₯οΈ
β€116β€βπ₯18π€11π6π₯°5π3π2π€£2π₯1
Good morning,
Several people have asked about an account named 'vxugsupp'. We are not vxugsupp. We do not know who that is. The only staff members from vx-underground on Telegram are @smellyvx (hi, it's me, smelly) and @BradleyVX
Have a nice day. Enjoy the rest of your weekend.
Several people have asked about an account named 'vxugsupp'. We are not vxugsupp. We do not know who that is. The only staff members from vx-underground on Telegram are @smellyvx (hi, it's me, smelly) and @BradleyVX
Have a nice day. Enjoy the rest of your weekend.
π63π25π«‘11β€8π’3