🔪 Slice For Life - Part 2 🔪
3.06K subscribers
624 photos
14 videos
433 links
Download Telegram
⚠️ A defense evasion tool called ExEngine is being sold as a service, marketed as an AV/EDR killer that disables mainstream consumer security software including Windows Defender, Malwarebytes, Bitdefender, and Avast. The tool combines AV termination with a Ring-3 rootkit, UAC bypass, and decoy payload delivery to support stealthy initial access operations.

‣ Threat Actor: ryewx1
‣ Category: Defense Evasion Tool / Killer
‣ Offering: ExEngine AV/EDR Killer
‣ Industry: Malware Tooling

The seller claims ExEngine actively terminates security software rather than only obfuscating payloads, granting attackers a longer window of undetected operation. The tool supports Windows 10 and 11 builds and is sold per-build at $150 to $250.

Advertised capabilities:

▪️ AV/EDR termination with primary and fallback techniques
▪️ UAC bypass with automatic privilege escalation
▪️ Ring-3 rootkit functionality to hide files, processes, registry keys, and network connections
▪️ Discord webhook logging for victim machine info and execution status
▪️ Secondary decoy payload (game/document/installer) to keep targets unaware
▪️ Persistence across reboots and logouts
▪️ Anti-VM and anti-debug detection with fake error message exit
▪️ Universal Windows 10/11 support, all payload types

Risk to defenders:

▪️ Active termination of consumer AV products including Windows Defender means traditional endpoint protections cannot be relied on once ExEngine executes successfully
▪️ Decoy payload pattern is designed to delay user-driven incident reporting, lengthening attacker dwell time
▪️ Ring-3 rootkit hiding of files, processes, and network connections complicates incident response triage on compromised hosts
▪️ Discord webhook telemetry indicates the operator is targeting consumer and SMB victims at scale rather than running individual targeted campaigns
▪️ Sold per-build at low cost ($150 to $250), making it accessible to low-skill operators who can pair it with commodity stealers, RATs, or loaders
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
🔥1
‼️🇲🇽 A threat actor is selling what is advertised as the full internal personnel database of the Guanajuato Elite Police (Fuerzas de Seguridad Pública del Estado, FSPE), Mexico, including identifying information for covert operators and high-ranking command.

‣ Threat Actor: Alz_157s
‣ Category: Government / Law Enforcement Personnel Data Sale
‣ Victim: Fuerzas de Seguridad Pública del Estado (FSPE) Guanajuato
‣ Industry: Government / State Police

The listing is significant because Guanajuato is one of the most violent states in Mexico, with FSPE personnel actively engaged against CJNG and the Santa Rosa de Lima Cartel. Exposure of officer identities, home addresses, and assignments creates direct physical risk to officers and their families, not only data privacy harm.

Risk to defenders:

▪️ Personnel data of active law enforcement, including covert operators, has historically been used to facilitate targeted killings in Mexico
▪️ Buyers of this category of data are not typical financial fraud actors and are likely to include cartel-linked purchasers
▪️ State and federal Mexican authorities, as well as US partners coordinating on cartel operations, should be alerted
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇸🇦 Jeddah Transport Company (jedtc.com.sa), a Saudi Arabian transportation company, has allegedly been breached, with a database of 126,629 user records leaked.

‣ Threat Actor: lulzintel
‣ Category: Data Leak
‣ Victim: Jeddah Transport Company
‣ Industry: Transportation

What's in it:

▪️ 126,629 compromised user records
▪️ Passenger data: ID, customer ID, full name, date of birth, nationality ID, ID number, passenger type, timestamps, Hijri date of birth
▪️ User account data: ID, name, first name, last name, email, phone, email verification status
▪️ Hashed passwords
▪️ Two-factor authentication secrets
▪️ Two-factor recovery codes
▪️ Two-factor confirmation timestamps
▪️ Remember tokens
▪️ Current team ID
▪️ Profile photo paths
▪️ Account creation and update timestamps
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
1
This media is not supported in your browser
VIEW IN TELEGRAM
💥 ShadowBroker: A real-time, multi-domain OSINT dashboard that fuses 60+ live intelligence feeds into a single dark-ops map interface.

https://github.com/BigBodyCobain/Shadowbroker

Aircraft, ships, satellites, conflict zones, CCTV networks, GPS jamming, internet-connected devices, police scanners, mesh radio nodes, and breaking geopolitical events, all updating in real time on one screen.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
2🔥1
‼️🇫🇷 FacoParis, a French educational institution, has allegedly been breached, with a 12 GB database and complete source code leaked.

‣ Threat Actor: Spirigatito
‣ Category: Data Leak
‣ Victim: FacoParis
‣ Industry: Education

The actor is offering the full 12 GB dataset for download, which includes student and teacher personal information, identity documents, course materials, account credentials, and the complete source code of the FacoParis platform.

What's in it:

▪️ 12 GB of total data
▪️ Student information including 11,447 documents: national ID cards, passports, IBANs, diplomas, applications + database
▪️ 1,243 photos of students and teachers
▪️ 3,212 course documents (valued at $7,000)
▪️ All FacoParis accounts and connection logs
▪️ Complete FacoParis source code totaling 27,346 files
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
You may see a couple of old forum posts on the threat feed between now and Sunday.

I'm testing a historical feed setup that is going to the current threat feed, before moving it to a different frontend.

I should know more next week on when it will be available and how many old posts my goal will be daily/monthly based on costs. The API will likely get the endpoint first before the platform.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
🔥2
Media is too big
VIEW IN TELEGRAM
The young hacker behind the historic PowerSchool breach, Matthew Lane, speaks out for the first time just days before beginning a four-year federal prison sentence, as experts warn of a new generation of tech-savvy teenagers falling into cybercrime.

I previously uploaded part 1. This is both part 1 and part 2.

Video Credit: youtube.com/@ABCNews
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
1😭1
‼️ Kodex Law Enforcement Panel accounts are allegedly being sold, providing access to submit Emergency Data Requests (EDRs) to 320+ major companies.

‣ Threat Actor: edr
‣ Category: Access Sale
‣ Victim: Kodex (Law Enforcement Platform)
‣ Industry: Law Enforcement / Data Request Platform

The actor is selling old Kodex accounts that can be used to send Emergency Data Requests to major companies including Discord, Coinbase, and Roblox. The seller claims the accounts are not proxied and that they own the logins directly. Funds in escrow are required before the country of origin is revealed. Trusted escrow/middleman services are accepted.

What's in it:

▪️ Old Kodex law enforcement panel accounts
▪️ Access to 320+ ready-to-use companies for data requests
▪️ Subpoena documents included
▪️ Ability to send EDRs to platforms like Discord, Coinbase, and Roblox
▪️ Price: $4,000
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
3
Found a possible decryptor for VECT Ransomware.

https://github.com/DarkWebInformer/vect-ransomware-decryptor

I don't have a sample file to use to test it against, maybe someone does that actually needs this. Run it in an isolated environment. I shared the files on GitHub, the zip, and the VirusTotal that came back clean. I also gave credit to where I found it.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
9
‼️🇵🇦 Radimagen Panama, a Panamanian medical imaging provider, has allegedly been breached, with a database containing patient and medical data leaked for free.

‣ Threat Actor: ohmydays (Waxx Org.)
‣ Category: Data Leak
‣ Victim: Radimagen Panama (radimagen.com)
‣ Industry: Healthcare / Medical Imaging

The actor claims the database was pulled from an unsecured server with "zero protection" and is releasing it for free to the community. The leak exposes sensitive medical and personal information of patients, doctors, and staff.

What's in it:

▪️ 38,840 patient records with full PII (name, national ID, sex, phone, date of birth)
▪️ 68,814 medical appointments linking patients to specific studies and schedules
▪️ 42,106 user accounts with emails, phones, and role/access levels
▪️ 3,118 doctor records with associated information
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
🔪 Slice For Life - Part 2 🔪 pinned «Found a possible decryptor for VECT Ransomware. https://github.com/DarkWebInformer/vect-ransomware-decryptor I don't have a sample file to use to test it against, maybe someone does that actually needs this. Run it in an isolated environment. I shared the…»
‼️ New Ransomware Group and IP Leak: CMD Organization

Clearnet: cmdofficial[.]com
IP: 209[.]99[.]186[.]211

Onion: http://cmdnkiqjije2tllr3biee2sjgj3i4robg2cbtilbnytdhh2wy3syrlyd[.]onion
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
😁21
‼️🇵🇦 Clinica Hospital Panamericano (ch-panamericano.com), a Panamanian hospital, has allegedly been breached, with a database containing patient and medical data leaked for free.

‣ Threat Actor: ohmydays (Waxx Org.)
‣ Category: Data Leak
‣ Victim: Clinica Hospital Panamericano
‣ Industry: Healthcare / Hospital

The actor claims the database was pulled from an unsecured system, marking the second Panamanian medical leak released by the same threat actor.

What's in it:

▪️ 16,884 patient records with full PII (name, national ID, sex, date of birth)
▪️ 25,893 medical appointments linking patients to specific studies and schedules
▪️ 570 doctor records with national ID, user ID, full names, and additional information
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇪🇨 Banco de Machala, an Ecuadorian bank, has allegedly been breached, with over 100,000 biometric customer records leaked for free.

‣ Threat Actor: GondorPe
‣ Category: Data Leak
‣ Victim: Banco de Machala
‣ Industry: Banking / Finance

The actor claims the bank's biometric authentication system was compromised, granting full access to the customer database and image repository, which was reportedly stored without proper protection.

What's in it:

▪️ 100,000+ biometric records of customers
▪️ Biometric photographs (full face) of all customers as of May 1, 2026
▪️ Photographs of identity cards
▪️ Full names
▪️ ID numbers
▪️ Face photos linked to each ID number
▪️ Files distributed in JPG format
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ A threat actor is allegedly selling YouTube Society Award Play Button codes for $160. The nature of how these codes were obtained is unclear, but the listing suggests unauthorized acquisition and resale of official YouTube creator award redemption codes.
________________________________________

Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
😈1