cl0p ransomware group administrative staff, if you're reading this message: please fix your blog. It is difficult to view
Административный персонал группы вымогателей cl0p, если вы читаете это сообщение, у нас есть просьба: пожалуйста, исправьте свой блог. Трудно просматривать
Административный персонал группы вымогателей cl0p, если вы читаете это сообщение, у нас есть просьба: пожалуйста, исправьте свой блог. Трудно просматривать
🤣77🫡7😁6❤2👍2🔥2🎉1
Earlier this morning we spoke with Lockbit ransomware group administrative staff. We asked why there has been a significant decrease in victim postings and blog activity.
They informed us they're currently on holiday and enjoying the nice summer weather.
¯\_(ツ)_/¯
They informed us they're currently on holiday and enjoying the nice summer weather.
¯\_(ツ)_/¯
😁97🤣61👍14❤6🥰5🫡4👏2❤🔥1🎉1
Diogo Santos Coelho, the ex-administrator of the infamous RaidForums, is fighting United States extradition where he is facing 52 years in prison.
His lawyer argues extradition to the United States is a violation of his human rights.
More info: https://www.mirror.co.uk/news/uk-news/man-accused-setting-up-hacker-30314538
His lawyer argues extradition to the United States is a violation of his human rights.
More info: https://www.mirror.co.uk/news/uk-news/man-accused-setting-up-hacker-30314538
The Mirror
School dropout who quit before GCSEs fighting US extradition over '£400m computer hack'
Diogo Santos Coelho, 23, faces up to 52 years in jail if found guilty amid claims he set up one of the world’s largest hacker forums after quitting school in London at 15
🫡77😢10😱7🤣7👍1🎉1
vx-underground
cl0p ransomware group has listed 231 new victims on their blog. These are companies that have not paid. These companies ransomed are the result of the MoveIT exploit. Out of the 231 ransomed organizations, 21 are schools located in the United States. Stats…
Oops. We need to make a slight correction to this post.
231 companies have been impacted by cl0p post-MoveIT exploit*.
These 231 companies are either posted on the cl0p site OR have publicly disclosed a breach via cl0p*
Not all 231 are confirmed to be as a result of MoveIT*
231 companies have been impacted by cl0p post-MoveIT exploit*.
These 231 companies are either posted on the cl0p site OR have publicly disclosed a breach via cl0p*
Not all 231 are confirmed to be as a result of MoveIT*
👍18❤5😢1
We've updated the vx-underground malware collection. Virusshare00474 is now available for download.
- 38,786 unique malicious binaries
- All named using Kaspersky naming convention
- 13.42GB (compressed)
Have a nice day.
https://www.vx-underground.org
- 38,786 unique malicious binaries
- All named using Kaspersky naming convention
- 13.42GB (compressed)
Have a nice day.
https://www.vx-underground.org
🔥29❤7👍6💯2❤🔥1😢1🫡1
Inspired by our friend SPTHvx, let's review a collection of malware author interviews from the 80s, 90s, and 2000s.
In these interviews, the interviewer asked "what do you think the future of malware looks like?".
Let's open a time capsule on a Saturday night =D
In these interviews, the interviewer asked "what do you think the future of malware looks like?".
Let's open a time capsule on a Saturday night =D
🤣30🔥10❤4😁2