vect

48 posts

vect

vect

@vectrw

가입일 Ocak 2026
16 팔로잉60 팔로워
vect 리트윗함
KITKAT
KITKAT@KITKAT·
Regarding recent press coverage
KITKAT tweet media
English
10.6K
25.8K
274.1K
49.1M
vect
vect@vectrw·
I love my stolen kitkats
English
0
1
4
254
vect
vect@vectrw·
Huge updates are coming to vect soon, stay tuned
English
0
1
2
243
Rami McCarthy
Rami McCarthy@ramimacisabird·
🐈‍⬛Meet nsa[.]cat Kudelski's IR writeup is flying under the radar, and it's the first with TeamPCP post-exploit IOCs you can hunt TrufflesHog scans led back to an attacker VPS hosting not just this file share, but target lists & MinIO storage This is one to read 🧵
Rami McCarthy tweet media
English
4
24
167
12.4K
Vhs Lady
Vhs Lady@VhsLady·
@IntCyberDigest Stop glamorising these fkwits. wtf is wrong will all of you? these little shits just destroyed a whole bunch of businesses, & cost hard working people a fortune. Mindless brats. Not to mention the destruction of trust and the fking economic repercussions.
English
5
1
15
1.6K
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ We're in contact with the actor behind the Trivy and LiteLLM hack. They told us they are currently extorting several multi-billion-dollar companies from which they've exfiltrated data. They've obtained 300 GB of compressed credentials and are working their way through them as we speak. The LiteLLM compromise alone led to half a million stolen credentials, according to the threat actor. Their message to the world: "TeamPCP is here to stay. Long live the supply chain." They've sent us their new logo (see image) and also teamed up with several threat actors, including Xploiters and Vect.
International Cyber Digest tweet media
English
51
262
1.4K
162.2K
vect 리트윗함
DarkFeed
DarkFeed@ido_cohen2·
🛑 CRITICAL UPDATE: The cyber underground is mobilizing. Vect Ransomware + BreachForums + TeamPCP have formed a dangerous new alliance. They are scaling up for mass ransomware operations. Here's the Threat: 1️⃣ 300K+ Affiliates: Turn the forum community into a malware workforce. 2️⃣ Supply Chain Attacks: TeamPCP provides the entry via Trivy & LiteLLM. 3️⃣ DevOps & AI Focus: Compromising the tools that secure & power enterprise infrastructure. Threat Intelligence used to be about yesterday's news. Today, it’s about anticipating tomorrow’s mass-scale attack. Don't be the next headline. 🛡️Full breakdown & details: Darkfeed.io #CyberSecurity #ThreadIntel #Ransomware #Darknet #DevOps #AI
DarkFeed tweet media
English
4
20
47
6.2K
Dark Web Informer
Dark Web Informer@DarkWebInformer·
RAMP Forum = TierOne Forum?
Dark Web Informer tweet mediaDark Web Informer tweet media
Dansk
6
2
29
5.3K
vect
vect@vectrw·
nothing is going to save you from what we are about to do
English
0
0
0
155
vect
vect@vectrw·
@INSPEKTTOR we have more than 300 unreleased victims, but whatever you say big boy
English
0
0
0
25
INSPEKTTOR🕋👆
INSPEKTTOR🕋👆@INSPEKTTOR·
dudde you dont even have 50 victims u are a joke in other words thats what it takes me a single person to achieve in the spawn of 3 months anhywas
vect@vectrw

A major partnership with Breached.st is on the way, as a well deserved congratulations to Hassan for his recent victory.

English
2
0
0
88
vect
vect@vectrw·
@elonmusk starlink won't be available soon anywhere
English
0
0
0
19
vect
vect@vectrw·
vect@vectrw

@CCITIC_ORG took no action in this matter. All credit belongs to Hassan and his team for successfully executing the takedown and exposing the associated IP addresses. That intelligence company is attempting to exploit the situation for their own benefit.

QME
0
0
1
168
Dominic Alvieri
Dominic Alvieri@AlvieriD·
BreachForums servers identified as ShinyHunters attempt data dump ShinyHunters dumped 2 corporate databases and allegedly attempting to drop more stolen victim data on the BreachForums CDN which has been identified and currently down /breachforums[.]as — 164.90.223[.]186 BF h/t @Ced_haurus Good timing @CCITIC_ORG
Dominic Alvieri tweet mediaDominic Alvieri tweet media
English
5
36
221
44.8K
vect
vect@vectrw·
@CCITIC_ORG took no action in this matter. All credit belongs to Hassan and his team for successfully executing the takedown and exposing the associated IP addresses. That intelligence company is attempting to exploit the situation for their own benefit.
Dark Web Informer@DarkWebInformer

.@CCITIC_ORG (Cyber Counter-Intelligence Threat Investigation Consortium) has identified the AS BreachForums servers. They have a message for the forum: "Sleep better tonight, your leaked data is on vacation." fr.linkedin.com/posts/ccitic_d…

English
2
0
4
560
vect
vect@vectrw·
A major partnership with Breached.st is on the way, as a well deserved congratulations to Hassan for his recent victory.
vect@vectrw

@CCITIC_ORG took no action in this matter. All credit belongs to Hassan and his team for successfully executing the takedown and exposing the associated IP addresses. That intelligence company is attempting to exploit the situation for their own benefit.

English
0
0
0
333
vect
vect@vectrw·
YOU ARE ACCESSING A U.S. GOVERNMENT (USG) INFORMATION SYSTEM (IS) THAT * * IS PROVIDED FOR USG-AUTHORIZED USE ONLY. BY USING THIS IS (WHICH * * INCLUDES ANY DEVICE ATTACHED TO THIS IS), YOU CONSENT TO THE * * FOLLOWING CONDITIONS: * * -THE USG ROUTINELY INTERCEPTS AND MONITOR...
English
0
0
0
203
vect
vect@vectrw·
@solostalking We never use ai for any of our tools. We have been working on our lockers for 3 months before release perfecting everything from scratch. Sadly most of the groups tend to use ai like The Gentelman, XP95 etc.
English
1
0
0
54
Raaz
Raaz@solostalking·
@vectrw How about yours??
English
1
0
0
81
DarkFeed
DarkFeed@ido_cohen2·
🚨 New Ransomware Group: XP95 🚨 Nostalgic design, modern threat. This new group’s leak site is a dead ringer for a classic OS interface, featuring old-school folders and a teal desktop. ⚠️ First Target: A Healthcare organization in Spain 🇪🇸 Full intelligence profile, analysis, and monitoring are available now on our platform: 🔗 Darkfeed.io #CyberSecurity #ThreatIntel #Ransomware #XP95 #Spain
DarkFeed tweet media
English
2
6
22
2.4K