vx-underground
tl;dr - By default it uses the Perplexity search engine - Installing the browser requires a Perplexity account - Not available on Linux (yet) - The browser "uses AI to securely handle your data"(?) - Generic features of all modern web browsers - Probablyβ¦
In my opinion, this will probably secure your password, ya. It is 1Password. However, I'm inclined to believe this is an attempt at harvesting more data for AI research.
They no longer need to scrape when they're inside your machine.
They no longer need to scrape when they're inside your machine.
π―73π±9π5β€1π’1
vx-underground
HOLY FUCK. Department of Justice nabbed one of the Scattered Spider guys. They got him on 120 counts of computer intrusions. He's facing over 95 years in prison. I've NEVER seen a cyber crime charge this high.
www.justice.gov
United Kingdom National Charged in Connection with Multiple Cyber
A complaint filed in the District of New Jersey was unsealed today charging Thalha Jubair, a United Kingdom national, with conspiracies to commit computer fraud, wire fraud, and money laundering, in relation to at least 120 computer network intrusions andβ¦
π₯°19π’5β€2π2π1
vx-underground
I received this image quite some time ago. I've been sitting on it. Staring at it. Contemplating the duality of life. Can anyone guess what this image is?
This is (allegedly) Transport For London. I received this image over 1 year ago.
π±26π€£17π8π₯5π’1
Dawg, one of the Scattered Spider guys ransomed a bunch of companies, made $36,000,000, then used the money for Uber Eats and Steam π
They had him from Uber Eats bro π
They had him from Uber Eats bro π
π€£121π11π7π«‘5π’2
DAWG. They social engineered the United States judicial system (???), reset someone's password by pretending to be helpdesk, and LOOKED THEMSELVES UP
π€£84π7π€6β€2π’1π€©1
jubair.complaint.pdf
214.7 KB
Official court document on United States v Jubair (Scattered Spider, Earth2Star)
π₯°18π₯7β€2π’1
vx-underground
DAWG. They social engineered the United States judicial system (???), reset someone's password by pretending to be helpdesk, and LOOKED THEMSELVES UP
Imagine being "INDIVIDUAL-1". The FBI just kicks in your door asking who "Austin" is π
π€£50π’5β€2
vx-underground
Chat, I'm not a crypto nerd. In this Scattered Spider court document, they state Mr. Jubair a/k/a Earth2Star received approx. 920.16BTC from performing ransomware attacks. How difficult is it to safely launder 920.16BTC? (approx. $108,062,646 as of thisβ¦
WHO THE FUCK DID THEY RANSOM FOR 964 BTC
π€£68π€―19π±8π2π’1π€1
> Scattered Spider ransoms company for 964BTC
> wtf_thats_alot.jpeg
> Document says "Cost of BTC at time was $36M"
> $36M / 964BTC = $37.5K
> BTC value was $37.5K in November, 2023
> Google "Ransomware, November, 2023"
> omfg.exe
> wtf_thats_alot.jpeg
> Document says "Cost of BTC at time was $36M"
> $36M / 964BTC = $37.5K
> BTC value was $37.5K in November, 2023
> Google "Ransomware, November, 2023"
> omfg.exe
π€―89π€£22π11β€3π’1
There's people on Xitter saying "The COM" is an ANTIFA, LGBTQIA, Furry, Transexual anti-American gang funded by George Soros
This has occured because FBI Director Kash Patel mentioned 764 in a Senate hearing. Ameriburgers who don't do computers looked up 764, found "The COM" on Wikipedia, and now think "the COM" is some sort of Democrat (American Liberal) funded organization
Dawg wtf LOL
This has occured because FBI Director Kash Patel mentioned 764 in a Senate hearing. Ameriburgers who don't do computers looked up 764, found "The COM" on Wikipedia, and now think "the COM" is some sort of Democrat (American Liberal) funded organization
Dawg wtf LOL
π€£86π9π₯4β€2π±1π’1
The craziest thing about the entire Scattered Spider trilogy is how simple they operated and how effective it was
They didn't utilize 0day exploits. They didn't utilize novel and "undetectable" malware. They didn't exploit N-days or try to find vulnerable external facing machines.
All they did was call the help desk. That's it. That's literally it.
Scattered Spider performed basic reconnaissance from social media (LinkedIn), investor websites, and dug up any information they could about the company.
Then they called the help desk.
That's how they compromised banks, critical infrastructure, casinos, car manufacturers, petroleum companies, luxury brands, government entities, air lines, and record labels.
Once they got access they used basic open source tooling from GitHub. It was never anything super fancy.
All of these companies invested heavily into Threat Intelligence, SOC analysts, Endpoint Detection Response software, DFIR experts, and anything else you can think of and it was defeated by doing basic research on the company and calling the help desk
We're so fucked
They didn't utilize 0day exploits. They didn't utilize novel and "undetectable" malware. They didn't exploit N-days or try to find vulnerable external facing machines.
All they did was call the help desk. That's it. That's literally it.
Scattered Spider performed basic reconnaissance from social media (LinkedIn), investor websites, and dug up any information they could about the company.
Then they called the help desk.
That's how they compromised banks, critical infrastructure, casinos, car manufacturers, petroleum companies, luxury brands, government entities, air lines, and record labels.
Once they got access they used basic open source tooling from GitHub. It was never anything super fancy.
All of these companies invested heavily into Threat Intelligence, SOC analysts, Endpoint Detection Response software, DFIR experts, and anything else you can think of and it was defeated by doing basic research on the company and calling the help desk
We're so fucked
π€£103β€16π―10π€7π4π’2π₯1π₯°1
vx-underground
The craziest thing about the entire Scattered Spider trilogy is how simple they operated and how effective it was They didn't utilize 0day exploits. They didn't utilize novel and "undetectable" malware. They didn't exploit N-days or try to find vulnerableβ¦
Im telling you right now bro, if a girl joined in on their Scattered Spider spree, it would have been x100 worse.
Imagine some girl calls in. She tells the dork at the help desk that she's confused, doesn't understand computers, and says shit like "hehe you sound cute" or "wow you're so smart".
Bro would fold in a nanosecond. All security protocols right out the fuckin window.
That would probably be the first compliment that mfer on helpdesk has had in his life. They'd give that chick access to the domain controller if she wanted
Anyway, that's my nightmare fuel for you.
Imagine some girl calls in. She tells the dork at the help desk that she's confused, doesn't understand computers, and says shit like "hehe you sound cute" or "wow you're so smart".
Bro would fold in a nanosecond. All security protocols right out the fuckin window.
That would probably be the first compliment that mfer on helpdesk has had in his life. They'd give that chick access to the domain controller if she wanted
Anyway, that's my nightmare fuel for you.
π€£148π―30π₯7π2π’2β€1π₯°1π«‘1
I guess I'll be doing a talk at Dakota State University via Discord.
Their cybersecurity club leader person (?) approached me and persuaded me to do a talk. They have expert negotiation skills. It was a long back and forth.
See attached image for the intense negotiation and bartering.
Their cybersecurity club leader person (?) approached me and persuaded me to do a talk. They have expert negotiation skills. It was a long back and forth.
See attached image for the intense negotiation and bartering.
π119π₯21π₯°19π€£12β€11π’1