We listened to over 500 recordings. Highlights include:
- Employee calls in sick on their first day on the job
- Someone got the job! (Congrats Ms. Sneed)
- Old people who are extremely confused and refer to cell phones as 'towers'.
- People who are not sure if they're even talking to T-Mobile (???)
- A woman telling the store her Dad's house burned down (and laughs about it?)
- A guy who did not get the job and asks why very, very, very aggressively
- Employee calls in sick on their first day on the job
- Someone got the job! (Congrats Ms. Sneed)
- Old people who are extremely confused and refer to cell phones as 'towers'.
- People who are not sure if they're even talking to T-Mobile (???)
- A woman telling the store her Dad's house burned down (and laughs about it?)
- A guy who did not get the job and asks why very, very, very aggressively
π122π€£29π±16π6π₯6β€4π«‘2π’1
We're almost done with migration.
Thank god. Seriously. It took 2 christmas miracles to get this thing where it is now
Thank god. Seriously. It took 2 christmas miracles to get this thing where it is now
π84π15π₯°6β€βπ₯5π€―1
vx-underground is a dangerous website. When visiting the website it is advised you wear a full hazmat suit. If that is not an option, a construction hard hat will suffice.
Thanks,
Thanks,
π100π«‘31π€£14π8β€5π±5π―2π€©1π1π€ͺ1
Hello,
We've had a few people reach out to us regarding to Black Mass Volume I & II. Yes, the PDFs are intentionally left publicly available on the website. The e-book is free, the physical copies are available on Amazon.
Nobody leaked them on Discord.
Have a nice weekend:)
We've had a few people reach out to us regarding to Black Mass Volume I & II. Yes, the PDFs are intentionally left publicly available on the website. The e-book is free, the physical copies are available on Amazon.
Nobody leaked them on Discord.
Have a nice weekend:)
β€βπ₯60π€£41π9π5π€ͺ4π2π2π«‘2π±1
Black Mass Volume I can be read here: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2022-11-13%20-%20Black%20Mass%20Halloween%202022.pdf
Black Mass Volume II can be read here: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
Black Mass Volume II can be read here: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
β€70π9π«‘8β€βπ₯4π₯°1π1π±1
Today Basssterlord, a member of National Hazard Agency (a subgroup of Lockbit ransomware group) deleted his Twitter profile.
He requested that we note that it was not due to harassment or law enforcement.
He said they're very busy and now is not a good time to meme onlineππ
He was spending too much time memeing and shit posting πππ
He requested that we note that it was not due to harassment or law enforcement.
He said they're very busy and now is not a good time to meme onlineππ
He was spending too much time memeing and shit posting πππ
π€£119π«‘18π7π±2
Because nerds keep asking us about alleged Sony ransomware incident
tl;dr Threat Actors did not deploy ransomware, no corporate data was stolen, services not impacted. Data was exfiltrated from Jenkins, SVN, SonarQube, and Creator Cloud Development. They're extorting Sony
tl;dr Threat Actors did not deploy ransomware, no corporate data was stolen, services not impacted. Data was exfiltrated from Jenkins, SVN, SonarQube, and Creator Cloud Development. They're extorting Sony
β€29π€£25π8π€4π«‘2
cl0p ransomware group has ransomed SickKids, one of the largest pediatric healthcare facilities in the world.
They've exfiltrated 13 years of data related to fertility, pregnancy, and healthcare information on children (including newborns).
https://techcrunch.com/2023/09/25/decade-of-newborn-child-registry-data-stolen-in-moveit-mass-hack/
They've exfiltrated 13 years of data related to fertility, pregnancy, and healthcare information on children (including newborns).
https://techcrunch.com/2023/09/25/decade-of-newborn-child-registry-data-stolen-in-moveit-mass-hack/
TechCrunch
Decade of newborn child registry data stolen in MOVEit mass-hack
Ontarioβs government-funded birth registry has confirmed a data breach affecting some 3.4 million people who sought pregnancy care, including the personal health data of close to two million newborns and children across the Canadian province.
π’108π€10π₯6π4β€2π2
Interesting side note: In 2022 this facility was ransomed by Lockbit ransomware group. Subsequently Lockbit ransomware group administrative staff apologized (for the first time) and gave the decryption key for free (for the first time).
Let's hope cl0p does the same.
Let's hope cl0p does the same.
π71π₯°8π€8π6
vx-underground
cl0p ransomware group has ransomed SickKids, one of the largest pediatric healthcare facilities in the world. They've exfiltrated 13 years of data related to fertility, pregnancy, and healthcare information on children (including newborns). https://techβ¦
Hello, apologies - we believe this post lacks clarity.
They did not ransom* SickKids, as in deploy ransomware, we meant they're extorting SickKids because they exfiltrated sensitive data.
To be the best of our knowledge no ransomware payload was deployed.
They did not ransom* SickKids, as in deploy ransomware, we meant they're extorting SickKids because they exfiltrated sensitive data.
To be the best of our knowledge no ransomware payload was deployed.
π«‘53π5β€4
Today McDonalds Point-of-Sale system setup and executables were leaked online. An unidentified Threat Actor claims to have stolen the executables, installation scripts, etc. by pivoting off of McDonalds Free Wifi
π₯59π€£52π4π€4β€2
Conduent has been compromised for the past 3 months and nobody has noticed yet.
A Threat Actor today expressed frustration with the company after he phished several employees via text messaging.
He expressed his frustration in the Breached telegram chatroom, as well as our e-mail address, by sending us a lengthy e-mail with dozens of pictures and hundreds of documents as proof.
tl;dr phished some employees, pivoted into HR, read company e-mails, read chatrooms, scraped everything he could get access to from the users
A Threat Actor today expressed frustration with the company after he phished several employees via text messaging.
He expressed his frustration in the Breached telegram chatroom, as well as our e-mail address, by sending us a lengthy e-mail with dozens of pictures and hundreds of documents as proof.
tl;dr phished some employees, pivoted into HR, read company e-mails, read chatrooms, scraped everything he could get access to from the users
π€£91π14β€5π±4π«‘4π₯3