xiaopao

703 posts

xiaopao

xiaopao

@Kangxiaopao

Focus on ransomware,like cat

China Katılım Temmuz 2019
135 Takip Edilen635 Takipçiler
xiaopao retweetledi
PJ
PJ@PJ04857920·
@stealthmole_int Behind the #DragonRaaS (and the "Stormous" copy-cat's) are two Yemeni Individuals. They "redesigned" the old Logo and also came up with a "#StormCry" Ransomware back in March
PJ tweet mediaPJ tweet media
English
0
1
1
588
xiaopao retweetledi
Brett Callow
Brett Callow@BrettCallow·
#Qilin has added a QR code to its leak site which points to "WikiLeaksV2" - a clearnet site on which Qilin also list a selection of their victims in addition to soliciting donations. #ransomware
Brett Callow tweet mediaBrett Callow tweet media
English
0
1
3
1.6K
xiaopao retweetledi
Germán Fernández
Germán Fernández@1ZRR4H·
📌 #Akira ransomware exfiltration server. 77.247.126.158: still active and exposed by BlackBerry in the blog “Akira Ransomware Targets the LATAM Airline Industry” → blogs.blackberry.com/en/2024/07/aki…. Another possible candidate could be 190.211.252.82, unconfirmed but with very similar characteristics 🧐
Germán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet media
English
1
43
133
20.7K
xiaopao
xiaopao@Kangxiaopao·
#Ransomware Wuibei ransom ioc: mai:ingrengshun@qdo.com info: 0a___Hello_ReadMe___.TXT notice.txt BTC Wallets: 1Abim6rh3uRkDmxriYY91EaqYXvDdtfcpN 1NYXFKZ2Cgc1765NyDxkLAqdBzyw3VYKQj md5: ca13c0b6043ae7171330c513135b8ce5 a57ce5e81cd9eb3456c8d021101cbbc0 360.cn/n/12481.html
xiaopao tweet mediaxiaopao tweet media
English
0
4
2
705
xiaopao retweetledi
Zscaler ThreatLabz
Zscaler ThreatLabz@Threatlabz·
💰ThreatLabz has discovered a new #ransomware group named Money Message performing double extortion attacks. Sample hash: bbdac308d2b15a4724de7919bf8e9ffa713dea60ae3a482417c44c60012a654b Data leak site: blogvl7tjyjvsfthobttze52w36wwiz34hrfcmorgvdzb6hikucb7aqd[.]onion
Zscaler ThreatLabz tweet media
English
2
33
66
20.2K
xiaopao retweetledi
vx-underground
vx-underground@vxunderground·
Cl0p ransomware group has breached critical infrastructure in England responsible for the public water supply and waste management for London, Luton, Thames Valley, Surrey, and more. They state they will not ransom it. cl0p's official statement: share.vx-underground.org/cl0p-thameswat…
vx-underground tweet mediavx-underground tweet media
English
6
161
445
0
xiaopao retweetledi
Brett Callow
Brett Callow@BrettCallow·
LockBit supposedly prohibits its affiliates from carrying out encryption-based attacks on nuclear power plants and other critical infrastructure, but permits them to compromise the networks to steal data. 1/3
Brett Callow tweet media
English
2
6
16
0
xiaopao retweetledi
DarkFeed
DarkFeed@ido_cohen2·
🌐 The new website (Version 3.0) of Lockbit #Ransomware team allows anyone to extend the timer by 24 hours, destroy all data from the website, or download all data right away to maximize the ransom money for each victim 💸 Next level hacking group 🥷 #Lockbit
DarkFeed tweet media
English
0
16
44
0
xiaopao retweetledi
vx-underground
vx-underground@vxunderground·
LAPSUS$ extortion group has released source code to Bing, Bing Maps, and Microsoft Cortana. They state that each release is incomplete (not the entire source code).
English
9
153
633
0
xiaopao retweetledi
Jorge Gomes
Jorge Gomes@JGomes_EU·
For those looking into the #ContiLeaks, I've prepared a network relationship map, that shows the relationships between users, based on the leaked chat logs. bit.ly/JGEU_CLNETMAP
English
9
71
214
0