Set Vásquez ✝️
27.5K posts

Set Vásquez ✝️
@JorgeSetVaz
Un poco músico, un poco ingeniero, un poco matemático pero full defensor de los Derechos Humanos Siuuuuuuuuuuuuu




🚨 CYBER INTELLIGENCE ALERT: WEB EXPLOIT INJECTION AND NEOLINK DECONFIGURATION — GUATEMALA 🇬🇹 [STATUS: UNDER SUPERVISION] The threat actor, fully identified under the alias NemorisHacking, has perpetrated a web exploit injection attack. The actor indicates that they compromised and visually defaced transactional instances of the NeoLink/NeoNet payment gateway infrastructure in Guatemala (.gt). The incident directly affects active transactional links, exposing critical weaknesses in the sanitization of website entry points. According to the evidence collected, the attack replaced the legitimate card payment form with a custom panel titled "The Mirror of Your Shadow," with explicit text attributing the compromise to the attacker. 🏢 Affected Entity: Infrastructure associated with NeoLink/NeoNet Guatemala (Payment Gateway) 👤 Threat Actor: NemorisHacking ⚔️ Attack Vector: Web Exploit Injection / Active Link Defacement ⚠️ CRITICAL RISK ANALYSIS AND EXPOSED FIELDS The presence of code injections on payment processing platforms represents an imminent risk of large-scale financial fraud: 💳 Phishing and Formjacking Risk: The attacker demonstrates the ability to inject HTML elements into high-trust domains (pay.neolink.com.gt). This facilitates the cloning of critical fields such as "Card Number", "MM/YY", and "CVV" for the silent exfiltration of banking data (Magecart style) before redirecting the user. 🛑 Payment Chain Disruption: By altering the legitimate transaction interface, secure fund collection for affiliated merchants that rely on that link ID is completely disabled. 🛡️ MITIGATION AND PREVENTIVE TECHNICAL RECOMMENDATIONS 🚫 Link Isolation and Deactivation: NeoLink platform administrators are urged to immediately revoke and disable the token/ID of the compromised link to stop the deployment of malicious code. 💻 Code Injection Audit (Web App Audit): Thoroughly review server-side variable validation mechanisms in payment link generation routes to block the injection of HTML/JS payloads. 📊 MONITORING AND EVALUATION Intelligence System: analyzer.vecert.io Quickly assess your website's security with: monitor.vecert.io #CyberSecurity #Guatemala #NeoNet #NeoLink #WebExploit #Defacement #NemorisHacking #FinancialThreats #ThreatIntelligence #CyberAlert #VECERT #Infosec


United Airlines passenger tries to open door at 36,000 feet and assault a fellow passenger this evening. UA1551 (Boeing 737 Max) from Newark to Guatemala, diverted to Washington Dulles because of the unruly passenger. Audio via @theATCapp



Jajajaja jajajaja hijos de la verga 🤢

💥🇧🇴 | ¡BRUTAL MOMENTO! Periodista Boliviana, Jimena Antelo, DESPEDAZÓ a dirigente de los ponchos rojos, David Mamani, quien no supo responder sus preguntas sobre democracia, geografía, política, y demografía, lo evidenció como una total bestia. ¡Así es cuando un periodista hace su trabajo!







