Sebastian

4K posts

Sebastian banner
Sebastian

Sebastian

@SebaG20xx

'El Guevara' 23 | Estudiante Sansano de Informática | Python | Ciberseguridad | DestroyPhis | @EstadoDescarga

Viña del Mar, Chile Beigetreten Ekim 2017
701 Folgt1.4K Follower
Sebastian retweetet
Old Internet
Old Internet@OldInternetFeel·
Old Internet tweet media
ZXX
39
804
6.8K
115.6K
Sebastian
Sebastian@SebaG20xx·
Es increíble la cantidad de estafas en los grupos de repuestos de auto, en menos de 10 seg te aparecen 5 WhatsApp haciéndose pasar por desarmadurias
Español
1
0
0
98
Sebastian
Sebastian@SebaG20xx·
Los de rutify subieron su código fuente en enero, lo alcance a descargar, ahora que lo reviso, la anci mintió descaradamente con lo de "usaron una base de datos ya filtrada"
Español
0
0
3
306
Sebastian retweetet
TV Idents
TV Idents@IdentEveryHour·
Chilevision - 2009 - Chile
Español
6
67
404
12.6K
Sebastian
Sebastian@SebaG20xx·
Sobre la ANCI, les reporté una vulnerabilidad en noviembre, en marzo seguía expuesta, si no es por los profes de la u que se movieron para contactar a alguien de la entidad afectada, el exploit seguiría ahí
Español
2
1
4
241
Sebastian retweetet
Diego
Diego@1000kilobytes·
🥲from the OS X human interface guidelines
Diego tweet mediaDiego tweet mediaDiego tweet media
English
30
157
2.6K
79.8K
Hoyos Peatonales
Hoyos Peatonales@Hoyospeatonales·
Otro caído en el centro de Viña del Mar. Bip Computer Store.
Hoyos Peatonales tweet media
Español
1
3
4
463
Sebastian
Sebastian@SebaG20xx·
xD
VECERT Analyzer@VECERTRadar

🚨 CYBER THREAT ALERT: "RUTIFY" EXPOSURE CAMPAIGN TARGETING INSTITUTIONS IN CHILE 🇨🇱⚔️ A coordinated offensive has been detected, orchestrated by the threat actor "Rutify," who has released a video demonstrating multiple security breaches and infrastructure compromises across various public and private entities in Chile. The actor employs a "technical protest" narrative to highlight the vulnerability of the country's systems. Rutify operates not merely as a hacktivist group, but as a Data-as-a-Service (DaaS) provider leveraging information exfiltrated from the Chilean State. Background: The Master Breach (SERVEL): The actor confirmed that, in February 2026, they gained access to an internal database belonging to the Electoral Service (SERVEL), successfully exfiltrating records for 17 million voters. Data Enrichment: Their activities are not limited to basic data; they have integrated information from: Healthcare Systems: Access to the national hospital network and Ministry of Health (Minsal) systems, yielding medical records and personal data. Public Institutions: Employment data from the SAG (Agricultural and Livestock Service) and the Municipality of Las Condes. Financial/Pension Sector: Previously included data from AFC, AFP, and Isapres (private health insurers), although they claim to have recently removed this information in an attempt to evade Law 21.719. University Databases: Academic and contact information for students. 📑 IDENTIFIED VICTIMS (VIDEO ANALYSIS) Based on the visual evidence provided, the following entities have suffered data exfiltration or compromise of their web portals: Electoral Service of Chile (SERVEL): Exposure of electoral domicile change request receipts, including PII (Name, RUN, Email, Phone Number). Municipality of Las Condes: Compromise of internal management systems and personnel rosters. Superintendence of Health: Access to beneficiary databases, administrative requests, and accreditation reports (IBM Notes/Domino). Chilean Customs: Compromise of the transport document portal (Maritime, Land, Air). Institute of Social Security (IPS): Defacement/Hijacking of sections of the procedures and benefits portal. University of Concepción (UdeC): Takeover (Seizure) of the institution's Union No. 3 website. 🔥 ACTOR'S STRATEGY AND MESSAGE Modus Operandi: The actor combines website defacement (taking control of sites) with the publication of plaintext data dumps via online services. Distribution: The video and links to the leaked data are being promoted through their Telegram channel. 🛠️ TECHNICAL INFRASTRUCTURE AND MONETIZATION The group operates in a professionalized manner through the use of APIs: Business Model: They offer an API that allows for automated queries based on an individual's RUN (National ID number) or name. Data Structure (JSON): Their API delivers complete profiles that include: RUN, name, gender, exact address (street, number, commune, region), email, date of birth, and nationality. RECOMMENDATIONS FOR THE STATE OF CHILE Health API Audit: It is critical to investigate how the group maintains persistent access to national hospital systems in order to perform real-time searches. Identity Protection: Given that 100% of the voter base (17 million individuals) is now in the hands of this actor, institutions must assume that the RUN and address of any Chilean citizen are, *de ​​facto*, public data. Traffic Monitoring: Block requests originating from or directed toward api.rutificador(.)live. IOCs: 173.234.15(.)187 52.14.32(.)237 Monitor: analyzer.vecert.io #Cybersecurity #HackeoChile #DataBreach #Rutify #InfoSec #Hacking #VECERT

QST
0
0
1
126
McDonald's Chile
McDonald's Chile@McDonalds_Cl·
@hdAndres23 Hola 👋🏻 Entendemos que extrañes la mayo 🥺. Por ley ya no podemos entregar aderezos en sachets individuales, y ahora tenemos ketchup y mostaza en pocillos. La mayonesa no se ofrece porque no se puede mantener sin refrigeración y va más allá de un "refrigérenla" 👀
Español
18
1
76
7.9K
Sebastian
Sebastian@SebaG20xx·
Con el rector de la Universidad, Juan Yuz
Sebastian tweet media
Español
1
0
3
128