IntelOps
913 posts

IntelOps
@IntelOpsV3
The internet holds vast secrets for those who know how to look A darkweb forum for security researchers


New collection coming soon at breached[.]st 🔥

(EXCLUSIVE) New investigation: Who runs Cl0p ransomware? Months of reporting, cross-referencing forum records, dossiers, and confidential sources identifies the group's operators, developers, access brokers, and infrastructure. rmoskovy.github.io/posts/who-runs… #Ransomware #Cl0p #ThreatIntel #osint #clop #security #research







Session Desktop (@session_app) has a critical Electron misconfiguration that turns any XSS or code injection bug into remote account compromise. A single vulnerability in message/content handling = complete account takeover. rmoskovy.github.io/posts/session-… #Session #cybersecurity #threatintel


The old BreachForums userbase has been fully imported at https://breached[.]st. All ranks have been updated, with GOD now Immortal, while VIP and MVP remain the same. Threads will be done Soon






❗️Meet Hellcat ransomware group operator 'Pryx' — responsible for high-profile hacks like Jaguar Land Rover, Telefonica, Schneider Electric and many more. He started doing cybercrime as a kid. He got 4 people killed and 27 injured after starting a fire by hacking into the SCADA network of Telecom Egypt. An OSINT researcher just revealed who he is and how he tracked him down.




Hello, TOX protocol lovers and the most wanted ransomware operators using TOX for comms! With only your public Tox ID, I can see who you’re talking to, reveal your real IP behind proxies, and even track your activities. #Onion_Path_Poisoning research coming soon! @DoingFedTime





