Security researcher Gi7w0rm accidentally got access to the International Space Stations urine recycling system.
He was able to identify when astronauts used the restroom (based on urine percentage increasing) and when it was processing urine (urine percentage decreasing).
He was able to identify when astronauts used the restroom (based on urine percentage increasing) and when it was processing urine (urine percentage decreasing).
๐คฃ164๐9๐ค8๐7โค4๐ซก4๐คช4๐3๐คฏ1
Note: Per the insights from a space nerd, SWGlassPit, this is publicly available telemetry originally released for a now defunct project known as ISS live.
tl;dr ISS lets you monitor pee-pee and poo-poo? We had no idea =D
Real-time monitoring is here: https://iss-mimic.github.io/Mimic/
tl;dr ISS lets you monitor pee-pee and poo-poo? We had no idea =D
Real-time monitoring is here: https://iss-mimic.github.io/Mimic/
๐36๐คฏ11๐6๐ซก5๐คช3
We have pioneered a new method for extending WiFi technologies (we stole it actually). Our methodology uses aerodynamic engineering, or whatever fancy word works here. Please see the attached image which demonstrates our technology. We believe this was revolutionize WiFi.
๐ฅ100๐คฃ70๐15๐ฑ7๐ค6๐ฏ6โค5๐5๐2
The past 72 hours we have added 221,319 new malware samples to the VXDB. We only have 15,778,681 samples remaining. ๐ซก
Reminder that the VXDB is free for anyone to use. Oh, and it's open source.
https://virus.exchange
Have a nice day.
Reminder that the VXDB is free for anyone to use. Oh, and it's open source.
https://virus.exchange
Have a nice day.
โค47๐ซก22๐1
When Scattered Spider compromised MGM they tried to modify code for the slot machines to make them spit out money ๐๐
These nerds are going full Ocean's Eleven
These nerds are going full Ocean's Eleven
๐คฃ72๐ฅ10โค5๐4๐ฏ2๐ค1
Do wE kNoW iF CaEsArS wAs HaCkeD?!
Yes, they were compromised around the exact same time as MGM and access to Caesar's was compromised using the exact same technique that was used against MGM.
Read the U.S. Securities and Exchange Commission report, nerds.
Yes, they were compromised around the exact same time as MGM and access to Caesar's was compromised using the exact same technique that was used against MGM.
Read the U.S. Securities and Exchange Commission report, nerds.
๐27๐คฃ21โค5๐คฏ4
Hello,
We are aware ALPHV ransomware group criticized us for spreading misinformation. They incorrectly attributed us to the Financial Times article about ALPHV affiliates attempting to tamper with slot machines
We will speak with ALPHV and resolve the issue.
Thanks,
We are aware ALPHV ransomware group criticized us for spreading misinformation. They incorrectly attributed us to the Financial Times article about ALPHV affiliates attempting to tamper with slot machines
We will speak with ALPHV and resolve the issue.
Thanks,
๐40๐ซก23๐คช13โค1๐ข1
Thank you to the ALPHV ransomware group administrative staff for correcting their blog post and correcting the misattribution to us.
We wholeheartedly appreciate.
We wholeheartedly appreciate.
๐50โค10๐ซก9๐2๐1
This media is not supported in your browser
VIEW IN TELEGRAM
U+4VeZwaR37JIofFHKafYTXVXQhP278yfarcWWRwZlI=
๐ค74๐คช17๐ฅ12๐ข3๐ซก3๐2๐ฑ2๐คฏ1
Okay, we deleted the previous tweet because now we're giving away 4 one year subscriptions to MULLVAD. Hahaha.
It on Twitter:)
https://twitter.com/vxunderground/status/1702720582293311896
It on Twitter:)
https://twitter.com/vxunderground/status/1702720582293311896
X (formerly Twitter)
vx-underground on X
We're doing another giveaway
We're giving away 4 one year subscriptions to MULLVAD VPN for 5 devices. They will be delivered in the form of giftcards. No PII is required from any potential winner.
Winners will be selected September 17th.
Comment belowโฆ
We're giving away 4 one year subscriptions to MULLVAD VPN for 5 devices. They will be delivered in the form of giftcards. No PII is required from any potential winner.
Winners will be selected September 17th.
Comment belowโฆ
โค32๐7๐ฅ5๐คฃ4๐ซก1
While everyone is focusing on the catastrophe of the MGM breach, it should be noted that it is business as usual for other ransomware groups.
Note: Publicly listed victims on ransomware websites indicate the victim did not pay and/or negotiations are still on-going.
- Cactus ransomware group was the most active this month (so far), with 30 new victims publicly displayed. Their victims are primarily agricultural and industrial organizations.
- ALPHV ransomware group claims 19 new victims in September. Besides MGM, they have claimed law firms, architecture and design companies, real estate companies, physicians offices, investment companies, and media analysis companies.
- Lockbit ransomware group claims 19 new victims as well. Lockbit ransomware group most notably targeted a non-profit hospital, a Behavioral health center for the mentally ill, 2 school distracts located within the United States, and law firm which represents American Veterans who need legal assistance.
- CryptBB, a new and emerging group, claimed 8 victims, most notably a school district in the United States.
- NoEscape claims to have compromised US-Canada water organization, the International Joint Commission, and threatens to leak sensitive government data.
- BianLain attacks Save the Children International, a 104 year old non-profit which aided children who were victims of WW2 nazi concentration camps (among many other incredible deeds).
- RansomedVC claims 30 new victims this month, primarily leveraging web exploitation and intimidation tactics.
Other active ransomware group activity this month: RagnarLocker, Threeam, CiphBit, Trigona, Knight, Akira, Monti, Stormous, Blacksuit, Play, RansomHouse, IncRansom, Lorenz, BlackByte, Qilin, RaGroup, Everest, Mallox, Medusa, Rhysida, 8base, Abyss.
In the month of September, 2023, there have been over 200 newly documented ransomware attacks. Again, this does not include victims who have paid.
The most notorious groups still remain on top: ALPHV and Lockbit. Both have existed (in some manner) since at least 2019.
Note: Publicly listed victims on ransomware websites indicate the victim did not pay and/or negotiations are still on-going.
- Cactus ransomware group was the most active this month (so far), with 30 new victims publicly displayed. Their victims are primarily agricultural and industrial organizations.
- ALPHV ransomware group claims 19 new victims in September. Besides MGM, they have claimed law firms, architecture and design companies, real estate companies, physicians offices, investment companies, and media analysis companies.
- Lockbit ransomware group claims 19 new victims as well. Lockbit ransomware group most notably targeted a non-profit hospital, a Behavioral health center for the mentally ill, 2 school distracts located within the United States, and law firm which represents American Veterans who need legal assistance.
- CryptBB, a new and emerging group, claimed 8 victims, most notably a school district in the United States.
- NoEscape claims to have compromised US-Canada water organization, the International Joint Commission, and threatens to leak sensitive government data.
- BianLain attacks Save the Children International, a 104 year old non-profit which aided children who were victims of WW2 nazi concentration camps (among many other incredible deeds).
- RansomedVC claims 30 new victims this month, primarily leveraging web exploitation and intimidation tactics.
Other active ransomware group activity this month: RagnarLocker, Threeam, CiphBit, Trigona, Knight, Akira, Monti, Stormous, Blacksuit, Play, RansomHouse, IncRansom, Lorenz, BlackByte, Qilin, RaGroup, Everest, Mallox, Medusa, Rhysida, 8base, Abyss.
In the month of September, 2023, there have been over 200 newly documented ransomware attacks. Again, this does not include victims who have paid.
The most notorious groups still remain on top: ALPHV and Lockbit. Both have existed (in some manner) since at least 2019.
๐22๐ซก10๐ข9โค6๐ฅ5๐คฃ5๐4๐คฏ3๐ฏ3๐ค1
For Black Mass Volume II we spent an extra shiny penny, from our own pockets, to hire an artist who is an illustrator for Magic: The Gathering, Mythgard Tcg, Hit PointPress, Adi Shankar/Netflix, Legendary Games, and more.
Thanks to Wero Gallo Arias for the amazing work.
Thanks to Wero Gallo Arias for the amazing work.
๐ฅ100โค20๐6๐ซก5๐2๐ฑ2โคโ๐ฅ1๐คฃ1
We have passed 23,000 subscribers on Telegram.
Thank you for the love and support. โค๏ธ
We look forward for continually serving you all with malware source code, samples, papers and our dumb memes.
Thanks,
Thank you for the love and support. โค๏ธ
We look forward for continually serving you all with malware source code, samples, papers and our dumb memes.
Thanks,
โคโ๐ฅ97โค30๐7๐ฏ6๐ฅ5๐ซก4๐3๐คช3๐ฑ1
Today Lockbit ransomware group issued a poll to all of their affiliates
Lockbit is considering implementing new rules for Lockbit affiliates due to their frustration with ransomware negotiators. Currently, Lockbit ransomware group has no rules in place for how much (or how little) affiliates can ransom a company for. They are considering "regulating" ransom demands
They state newer affiliates are giving large discounts to victim companies out of desperation for money, whereas more experienced affiliates do not cave to negotiator's proposed payment from the victims
National Hazard Agency, a subdivision of Lockbit ransomware group, has stated they will no longer accept payments below 3% of the companies annual revenue. They will immediately retaliate against any negotiator who approaches them with an offer of less than 3% of the companies revenue. The retaliation will be complete destruction of company data
Image 1. Original Lockbit poll
Image 2. Translated poll
Image 3. Message from National Hazard Agency
Lockbit is considering implementing new rules for Lockbit affiliates due to their frustration with ransomware negotiators. Currently, Lockbit ransomware group has no rules in place for how much (or how little) affiliates can ransom a company for. They are considering "regulating" ransom demands
They state newer affiliates are giving large discounts to victim companies out of desperation for money, whereas more experienced affiliates do not cave to negotiator's proposed payment from the victims
National Hazard Agency, a subdivision of Lockbit ransomware group, has stated they will no longer accept payments below 3% of the companies annual revenue. They will immediately retaliate against any negotiator who approaches them with an offer of less than 3% of the companies revenue. The retaliation will be complete destruction of company data
Image 1. Original Lockbit poll
Image 2. Translated poll
Image 3. Message from National Hazard Agency
๐ฅ42๐คฃ14๐ซก8โค1๐1๐1๐1
Thank you to the person who sent us a lovely poem... from Greece's... Hellenic Army?
Image 1. Lovely poem
Image 2. Email headers
Image 1. Lovely poem
Image 2. Email headers
โค42๐3๐ซก3๐ฅฐ1