NotiCyber

10 posts

NotiCyber banner
NotiCyber

NotiCyber

@AndNoticiaCyber

📡 Noticias de ciberseguridad y filtraciones de datos | Alertas tempranas y análisis de brechas | InfoSec en tiempo real

Mundial Katılım Nisan 2026
31 Takip Edilen199 Takipçiler
Sabitlenmiş Tweet
NotiCyber
NotiCyber@AndNoticiaCyber·
🚨 ECUADOR EN ALERTA CIBERATAQUES🚨 El grupo de ciberatacantes "Akatsuki" anuncia una nueva ola de ataques dirigidos a sectores públicos y privados en Ecuador. Activo expuesto de Ministerio de telecomunicaciones - MINTEL telegra.ph/ECUADOR---MINT…
NotiCyber tweet mediaNotiCyber tweet mediaNotiCyber tweet media
Español
0
3
9
241
NotiCyber
NotiCyber@AndNoticiaCyber·
🚨 FILTRACIÓN MASIVA 🚨 | Gobierno Electrónico, Mintel documentos confidenciales 🚨 Usuario identificado como "GondorPe" afirma haber filtrado información sensible. Datos expuestos incluirían: documentos confidenciales internos telegra.ph/FILTRACI%C3%93…
NotiCyber tweet mediaNotiCyber tweet mediaNotiCyber tweet media
Español
2
5
13
1.3K
NotiCyber retweetledi
Ecuavisa Noticias
Ecuavisa Noticias@EcuavisaInforma·
🪪 Una plataforma de ciberseguridad reportó que una base de datos con información detallada de vehículos y propietarios de Ecuador se ha filtrado. 🤳🏻 Esto coincide con el reporte de mensajes falsos que exigen el pago urgente de supuestas multas. 💻 ecuavisa.com/ecuador/plataf…
Ecuavisa Noticias tweet media
Español
47
607
702
67.5K
NotiCyber retweetledi
Mr. Link
Mr. Link@MrLinkEc·
Sobre el tema de Filtraciones en #Ecuador la verdad ninguna autoridad la tomará en serio filtraciones de datos, peor la que estaba desde el 3 de Abril de la ANT, ni el EcuCert alerto sobre esto, lo único que queda es que los usuarios sean cautos y tengan sentido común con los Mails y Sms suplantando a la ANT que comenzaran a llegar a lo largo del 2026. #NoseDejenHackear 😎
Mr. Link tweet mediaMr. Link tweet mediaMr. Link tweet media
Español
7
124
188
14.2K
NotiCyber
NotiCyber@AndNoticiaCyber·
🚨Usuario GondorPe libera data de la CapePastaza - Cooperativa de ahorro y crédito en Ecuador 🇪🇨.🚨 Aproximadamente 4k de archivos escaneados link de telegram: t.me/gondorpechanel
NotiCyber tweet media
Español
0
4
9
933
NotiCyber retweetledi
Usuarios Digitales
Usuarios Digitales@usuariosdigital·
#AlertaDigitalEC Se alerta de filtración de 17 millones de registros de una base de 4gb al 2026 de @ANT_ECUADOR, vía @rocurun La base contiene datos del propietario como nombre, email y domicilio y del vehículo como número de placa, chasis y pagos de matrícula e impuestos
Usuarios Digitales tweet media
VECERT Analyzer@VECERTRadar

🚨 NATIONAL ALERT: Massive Data Leak from the National Transit Agency (ANT) Ecuador 🇪🇨🚗 Analyzer has detected an unprecedented data breach affecting Ecuador's entire vehicle fleet. Threat actor "GordonFreeman" has put up for sale a database claiming to contain detailed information on every vehicle and motorcycle registered in the country between 2018 and 2026. 🏛️ Affected Entity: National Transit Agency (ANT) Ecuador. 🎭 Threat Actor: GordonFreeman. 👥 Data Volume: 17,000,000 records (17 Million). 📂 Size and Format: 4 GB in CSV format. 🗓️ Timeframe: 2018 – 2026 🛠️ Compromised Information (PII and Technical Data) The leak is comprehensive and directly links owners to their assets: 🆔 Owner Identity: Full names, National ID or RUC (Tax ID) numbers, and email addresses. 🚘 Vehicle Data: License plate number, engine number, chassis number, engine displacement, make, model, and vehicle year. 📍 Location and Contact: Detailed home addresses, landline numbers, mobile phone numbers (specifically mentioning fields for the Movistar carrier), and canton of residence. 💰 Administrative Data: Assessed value, tax exemption status, registration year, date of last payment, and vehicle weight/payload capacity. Monitor: analyzer.vecert.io #Cybersecurity #ANTEcuador #DataBreach #EcuadorHacked #InfoSec #CyberAlert #RoadSafety #Urgent

Español
26
275
374
49.5K
NotiCyber retweetledi
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
🎙️EXCLUSIVE: Dark Storm Team Interview We spoke directly with the group behind recent high-profile cyber operations. This is not endorsement. This is visibility into how they think. ⸻ Q: How would you define Dark Storm Team today, hacktivists, cybercriminals, or something else? A: We see ourselves as a group of like-minded individuals. Today, many label all hackers as cybercriminals, but we consider ourselves hacktivists driven by ideological motivations. ⸻ Q: What differentiates you from groups like KillNet or Anonymous-affiliated actors? A: It’s better to judge us by effectiveness. Operations targeting major platforms already demonstrate our level. ⸻ Q: Can you walk us through a recent operation? A: We won’t disclose operational details to avoid strengthening defenses. In general, we rely on a mix of social engineering, intelligence gathering, and specialized tooling. ⸻ Q: How do you ensure your claims are credible? A: Verification is challenging due to limited reporting, but independent cybersecurity experts have validated some of our activities. ⸻ Q: What are your primary attack methods? A: A combination, including DDoS, exploitation, and credential access. ⸻ Q: Tools, public, private, or custom? A: All of the above. We use open-source tools, external resources, and our own developments. ⸻ Q: How is your team structured? A: There is leadership, but members can change. Alignment in mindset is key. ⸻ Q: What role do ideology or geopolitics play? A: A major role. Our operations are heavily influenced by political and ideological perspectives. ⸻ Q: Are defenders getting better? A: It varies. Strong security requires investment, not every organization prioritizes it. ⸻ Q: Most challenging targets? A: Time constraints, defensive countermeasures, and resource limitations. ⸻ Q: How do you manage OPSEC? A: We focus on minimizing digital footprints and maintaining strict operational discipline. ⸻ Q: How do you respond to skepticism? A: Skepticism is natural. Attribution and impact are often difficult to prove publicly. ⸻ Q: Do you collaborate with others? A: Yes. We work with other groups, including newer alliances like “Armenian Code.” ⸻ Q: Biggest misconception about your group? A: That our operations are ineffective. ⸻ Q: If organizations want to avoid being targeted, what should they do? A: (Response reflects their viewpoint), targeting decisions are influenced by multiple factors, including perceived alignment and impact. ⸻ Audience Q: Do you choose targets based on vulnerability or symbolic value? A: We prioritize targets based on potential impact, then identify the path to reach them. ⸻ Audience Q: How do DDoS attacks impact large tech companies? A: The objective is to bypass defenses or identify weaker parts of infrastructure. ⸻ Final Note (DDW): This interview reflects the group’s claims and perspective. Attribution in cyber operations remains complex, and not all claims can be independently verified. ⸻
Dark Web Intelligence tweet media
English
0
4
40
112.1K
NotiCyber retweetledi
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
🚨 BREAKING ShinyHunters claims to have accessed internal systems linked to Anthropic’s Mythos model — sharing screenshots of: User management panels AI experiment dashboards Model performance & cost analytics ⚠️ At this stage, authenticity is unverified — but if confirmed, this would be a major escalation: AI models designed to find vulnerabilities… becoming targets themselves. This isn’t just a breach story. It’s a preview of the next cyber battleground: AI infrastructure. More to come. #CyberSecurity #AI #DataBreach #ShinyHunters #Infosec #DDW
Dark Web Intelligence tweet mediaDark Web Intelligence tweet mediaDark Web Intelligence tweet mediaDark Web Intelligence tweet media
English
57
195
880
129.1K
NotiCyber
NotiCyber@AndNoticiaCyber·
🚨FILTRACIÓN DE DATOS | CAPCE Pastaza Usuario en la darkweb identificado como "GondorPe" afirma haber filtrado información sensible. 📁Datos expuestos incluirían: • Cédulas de identidad (fotos escaneadas) • Nombres completos 📌 CAPCE Pastaza aún no se pronuncia oficialmente.
NotiCyber tweet mediaNotiCyber tweet media
Español
2
9
11
5.6K