the tl;dr of the drift protocol shenanigans
> be drift protocol
> decentralized trading thingy
> built on solana or something
> april 1st
> april fools
> jk $280,000,000 (approx.) stolen
> rewind
> fall, 2025
> drift people at conference
> crypto nerds approach them
> crypto nerds say theyre at some fancy place
> want to integrate with drift
> crypto nerds sneeky
> crypto nerds only talk to specific people
> wtf how they know who is who?
> crypto nerds hang out in person
> meet at multiple conferences
> crypto nerds smart af, know crypto fr
> these_guys_are_chill.jpeg
> december, january comes around
> setup private group chat
> long meetings about strategy and stuff
> contracts and on-boarding stuff
> fancy_meetings.mp4
> crypto nerds put up $1m in cash for investment
> these_guys_are_legit.mp3
> hang out more in person
> start collaborating with coding projects
> april 1st
> $280,000,000 missing
> cool bros missing
> wtf?
> all chat logs gone
> all software sharing stuff gone
> wtf?
> 1-800-help-us-mandiant
> digital forensic and incident response time
> mandiant looks inside
> 1 drift person compromised from code sharing stuff
> 2nd drift person compromised from some test thingy
> wtf who is this
> look inside
> UNC4736
> unironically north korean spies
> sent abroad to do in-person social engineering
> crypto forensic nerds tie it to radiant capitol hack
> mandiant still investigating right now
tl;dr north korean nerds leave north korea, act like total bros, hang out at conferences, have tons of money, bamboozle people in long-term social engineering and espionage stuff to steal hundreds of millions of dollars
> be drift protocol
> decentralized trading thingy
> built on solana or something
> april 1st
> april fools
> jk $280,000,000 (approx.) stolen
> rewind
> fall, 2025
> drift people at conference
> crypto nerds approach them
> crypto nerds say theyre at some fancy place
> want to integrate with drift
> crypto nerds sneeky
> crypto nerds only talk to specific people
> wtf how they know who is who?
> crypto nerds hang out in person
> meet at multiple conferences
> crypto nerds smart af, know crypto fr
> these_guys_are_chill.jpeg
> december, january comes around
> setup private group chat
> long meetings about strategy and stuff
> contracts and on-boarding stuff
> fancy_meetings.mp4
> crypto nerds put up $1m in cash for investment
> these_guys_are_legit.mp3
> hang out more in person
> start collaborating with coding projects
> april 1st
> $280,000,000 missing
> cool bros missing
> wtf?
> all chat logs gone
> all software sharing stuff gone
> wtf?
> 1-800-help-us-mandiant
> digital forensic and incident response time
> mandiant looks inside
> 1 drift person compromised from code sharing stuff
> 2nd drift person compromised from some test thingy
> wtf who is this
> look inside
> UNC4736
> unironically north korean spies
> sent abroad to do in-person social engineering
> crypto forensic nerds tie it to radiant capitol hack
> mandiant still investigating right now
tl;dr north korean nerds leave north korea, act like total bros, hang out at conferences, have tons of money, bamboozle people in long-term social engineering and espionage stuff to steal hundreds of millions of dollars
π€£103π₯°25π€―16β€10π₯4π€4β€βπ₯1π1π€©1
Frustrated nerd drops zero day exploit after Microsoft vulnerability bug bounty people annoy him, or something, I don't know.
Stinky nerds confirm its legit
https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html
Stinky nerds confirm its legit
https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html
Blogspot
Public disclosure
I was not bluffing Microsoft and I'm doing it again. https://github.com/Nightmare-Eclipse/BlueHammer Unlike previous times, I'm not explaini...
π₯°70π€£15β€13π€7π₯4
There is some sort of dark irony that I've seen multiple completely legitimate cybersecurity researchers be banned from GitHub.
These are researchers who are verified, clean, years upon years (sometimes decades) of experience. They're well known people.
Their code and reasoning for their ban is usually unexplained or deemed "malicious".
Then some angry nerd drops a Microsoft zero day exploit on GitHub, a platform owned by Microsoft, yet it remains up.
These are researchers who are verified, clean, years upon years (sometimes decades) of experience. They're well known people.
Their code and reasoning for their ban is usually unexplained or deemed "malicious".
Then some angry nerd drops a Microsoft zero day exploit on GitHub, a platform owned by Microsoft, yet it remains up.
π€£141π₯13π₯°8β€7π2π€―2π2π’1π€1
I'm tired of people stereotyping us computer nerds. It is PREJUDICE.
Here are some stereotypes non-nerds push on us. They're all FALSE.
According to non-nerds, us nerds do the following:
- Excessive caffeine or nicotine intake
- Unusual or unhealthy sleep schedule, specifically around 3am and 5am
- Apparently have tons of tabs open, or something, in terminal or web browser
- Desk messy, covered in cables
- Hardware nerds apparently do "experiments" just to see if something works
- Notes on paper or whiteboard look like serial killer manifesto
- Web cam taped, mic disabled, because of "paranoia"
- Strong distrust in tech companies, especially social media
- Nerd so intense forget to eat or shower
- Spend 8 hours debugging instead of reading something which would take 20 minutes because ???
- Apparently we "don't know an answer" but know how to find it?
- Some nerds become irrationally angry about GUIs?
- Weird obsession with mechanical keyboards
I'm so tired of these stereotypes. Literally none of these are true.
Here are some stereotypes non-nerds push on us. They're all FALSE.
According to non-nerds, us nerds do the following:
- Excessive caffeine or nicotine intake
- Unusual or unhealthy sleep schedule, specifically around 3am and 5am
- Apparently have tons of tabs open, or something, in terminal or web browser
- Desk messy, covered in cables
- Hardware nerds apparently do "experiments" just to see if something works
- Notes on paper or whiteboard look like serial killer manifesto
- Web cam taped, mic disabled, because of "paranoia"
- Strong distrust in tech companies, especially social media
- Nerd so intense forget to eat or shower
- Spend 8 hours debugging instead of reading something which would take 20 minutes because ???
- Apparently we "don't know an answer" but know how to find it?
- Some nerds become irrationally angry about GUIs?
- Weird obsession with mechanical keyboards
I'm so tired of these stereotypes. Literally none of these are true.
π€£153β€29π₯°10π―8π6π₯3π2
ILSpy nerds big mad at me today for discussing the ILSpy-dot-org domain delivering malware.
I failed to scroll to the bottom of the domain to see the "not affiliated with ILspy". This has resulted in several people making passive aggressive remarks to me online.
This mistake has resulted in ILspy nerds suggesting I am a news outlet and an influencer, or something, and stating I intentionally, or unintentionally, spread misinformation.
But what does this mean? Not much. ILspy-dot-org is the second indexed link on Google and the "not affiliated" part is at the very bottom. I use ILspy all the time, I genuinely thought this was there website.
tl;dr I have a small brain and ilspy nerds dislike me
I failed to scroll to the bottom of the domain to see the "not affiliated with ILspy". This has resulted in several people making passive aggressive remarks to me online.
This mistake has resulted in ILspy nerds suggesting I am a news outlet and an influencer, or something, and stating I intentionally, or unintentionally, spread misinformation.
But what does this mean? Not much. ILspy-dot-org is the second indexed link on Google and the "not affiliated" part is at the very bottom. I use ILspy all the time, I genuinely thought this was there website.
tl;dr I have a small brain and ilspy nerds dislike me
β€61π€£34π₯°10π5π’4π―2π₯1
vx-underground
ILSpy nerds big mad at me today for discussing the ILSpy-dot-org domain delivering malware. I failed to scroll to the bottom of the domain to see the "not affiliated with ILspy". This has resulted in several people making passive aggressive remarks to meβ¦
also, on the forreal though, it was an honest mistake, you could have just told me or something, i would have happily corrected it like i am now, you dont gotta be a dick about it, assholes
sheesh
sheesh
β€71π―26π€£16π₯°4π3π2π€2π€1
Media is too big
VIEW IN TELEGRAM
Last time on Dragon Ball Z:
The United States government threatened to destroy Iranian critical infrastructure, notably bridges and electrical grids.
Today the Iranian government responded by publishing (an incredibly dramatic) video threatening United States tech bros
The United States government threatened to destroy Iranian critical infrastructure, notably bridges and electrical grids.
Today the Iranian government responded by publishing (an incredibly dramatic) video threatening United States tech bros
π₯119π20β€βπ₯9β€6π€6π₯°2π€2π€©2π€£2π1
vx-underground
Believe it or not, this was peak AI summarization. This is basically AGI
Average United States citizen age 30 - 39 (hes literally me)
π91π₯°19π€―19β€8π―4π’2
In 2025 science was conducted. After careful review, we determined it takes 3 Β½ thingies of mayonnaise to fill up a Dell Optiplex.
New science must be performed. Mayonnaise is too expensive, we need to know how many thingies of Ranch dressing can fill a Dell.
Previous science:
New science must be performed. Mayonnaise is too expensive, we need to know how many thingies of Ranch dressing can fill a Dell.
Previous science:
π102π«‘35π€―18β€12π±8π₯°4π3π’3π₯2
Big news for the unemployed today whereas an anonymous source tells media outlets about CIA tool "Ghost Murmur". GHOST MURMUR was allegedly used to track down the United States airmen who the Iranian government shot down.
"Ghost Murmur is a classified CIA tool developed by Lockheed Martin's Skunk Works. It uses long-range quantum magnetometry to detect the faint electromagnetic signature of a human heartbeat from up to 40 miles away, then pairs that data with AI to isolate it from background noise."
Do you have any idea how faint a heartbeat is? Detecting it from 40 MILES away? Using .. AI?
Nice propaganda, CIA
"Ghost Murmur is a classified CIA tool developed by Lockheed Martin's Skunk Works. It uses long-range quantum magnetometry to detect the faint electromagnetic signature of a human heartbeat from up to 40 miles away, then pairs that data with AI to isolate it from background noise."
Do you have any idea how faint a heartbeat is? Detecting it from 40 MILES away? Using .. AI?
Nice propaganda, CIA
π€£195β€17π₯°12π€6π₯2π2π―1
The sheer volume of malware reports is suffocating. If a noob sat down and read the reports everyday, within a month they'd go from noob to big brain galaxy malware nerd
It would also require immense focus because it'd be a lot of reading
It would also require immense focus because it'd be a lot of reading
β€87π₯8π₯°2
Microsoft suspended the developer account for WireGuard (and also VeraCrypt).
Why? Literally nobody knows. Presumably it's because Microsoft hates everyone and wants us all to suffer.
Why? Literally nobody knows. Presumably it's because Microsoft hates everyone and wants us all to suffer.
π₯°77π€―66π±15π€£12π₯7β€5π€4π’4π2π1
Iran wants to be paid in cryptocurrency for ships that pass through the Strait of Hormuz
https://www.ft.com/content/02aefac4-ea62-48db-9326-c0da373b11b8
https://www.ft.com/content/02aefac4-ea62-48db-9326-c0da373b11b8
π₯84π€£61π18β€7π«‘6π4π₯°2π’2π€©2π―2β€βπ₯1
Chinese government super computer (allegedly) compromised and (allegedly) 10PB exfiltrated.
The source is CNN.
Something about this story is very strange to me. I've been doing cybersecurity stuff for a long, long time. I'm usually on top of most cybersecurity incidents, whether I discuss it publicly or not, yet I have not heard of this story and I have not seen the moniker "FlamingChina" before.
Furthermore, none of my colleagues have mentioned this compromise to me.
I'm very curious who these cybersecurity experts are who they cite in the article.
I'm also very curious on the 10 PETABYTES of data exfiltrated because they is an unfathomable number.
10PB is 10,000 TB. Even in cold storage that's roughly $43,000/month. If it's "hot storage" you're looking at something like, $150,000/month, that doesn't even include the fees for moving the data which would be ASTRONOMICAL.
Very very strange
The source is CNN.
Something about this story is very strange to me. I've been doing cybersecurity stuff for a long, long time. I'm usually on top of most cybersecurity incidents, whether I discuss it publicly or not, yet I have not heard of this story and I have not seen the moniker "FlamingChina" before.
Furthermore, none of my colleagues have mentioned this compromise to me.
I'm very curious who these cybersecurity experts are who they cite in the article.
I'm also very curious on the 10 PETABYTES of data exfiltrated because they is an unfathomable number.
10PB is 10,000 TB. Even in cold storage that's roughly $43,000/month. If it's "hot storage" you're looking at something like, $150,000/month, that doesn't even include the fees for moving the data which would be ASTRONOMICAL.
Very very strange
π83π€£33β€13π€10π―4π₯°3π€―2π₯1