richie_rich 💔

29.3K posts

richie_rich 💔 banner
richie_rich 💔

richie_rich 💔

@fcb_richie

flicki-flacka HAS to save my life. Face of Joan Garcia FC.

Gol Nord, Kampf Nou 📍 Katılım Mayıs 2018
1.1K Takip Edilen822 Takipçiler
Sabitlenmiş Tweet
richie_rich 💔
richie_rich 💔@fcb_richie·
Joan Garcia - World Class Saves. 🧤
English
7
55
364
17.8K
richie_rich 💔
richie_rich 💔@fcb_richie·
Atleti are so much more composed on stages like this. We cannot compete, it's just a mentality problem
English
0
0
0
34
Rocketeer
Rocketeer@RocketeerDriver·
PvE lobbies on the new map.
Rocketeer tweet media
English
50
92
2.7K
108.2K
NO CONTEXT HUMANS
NO CONTEXT HUMANS@HumansNoContext·
He’s speaking in Times New Roman
English
70
1.2K
20.4K
1.1M
richie_rich 💔
richie_rich 💔@fcb_richie·
Absolutely nothing from Fermin the entire half
English
0
0
0
192
richie_rich 💔
richie_rich 💔@fcb_richie·
Loooooooool Lamine deadass aura farming at the clear flag 😭😭
English
0
0
0
61
richie_rich 💔
richie_rich 💔@fcb_richie·
Im sorry Fermin that you got your face smashed in but you gotta score rhat no matter what.
English
0
0
3
281
richie_rich 💔
richie_rich 💔@fcb_richie·
Cumdog needs to go off asap hes gonna cost us the game
English
0
0
0
139
richie_rich 💔
richie_rich 💔@fcb_richie·
@Dexerto Give me the leaks what time are they dropping so i can set an alarm
English
0
0
0
125
Dexerto
Dexerto@Dexerto·
Hacking group 'ShinyHunters' say they will publish Rockstar data they stole in an attack online as their “demands have not been met”, per BBC News
Dexerto tweet mediaDexerto tweet media
English
55
60
1.2K
75.7K
ben
ben@videotech·
Hacking group ShinyHunters has told the BBC it plans to release the leaked Rockstar Games data taken from its Snowflake instance, stating that its “demands were not met”. bbc.co.uk/news/articles/…
ben tweet media
English
52
71
1K
148.7K
richie_rich 💔
richie_rich 💔@fcb_richie·
@d0cTB Can you please provide the European time. I downloaded at around 18:00 cest in a virtual machine, does it affect the host system?
English
1
0
0
1.4K
Doc TB
Doc TB@d0cTB·
Here is the small statement I sent to everyone... 😓 Hi, Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised). The breach was found and has since been fixed. Sorry for the inconvenience. I did my best to fix that mess as soon as possible :-/ Sam.
vx-underground@vxunderground

Yeah, so pretty much this cpuid.com malware is a pain in the ass. I'd have to spend a good bit of time trying to bonk it with a stick and reconstruct some of it. Whoever developed this malware actually cares about evasion and made some intelligent decisions when developing this malware payload. This appears to only impact HWMonitor 64bit. It appears (based on user reports) cpuid became malicious around 7PM EST, April 10th, 2026. However, it is possible it was much earlier than this, this is just when people began noticing and discussing it online. From an extremely high-level overview, it appears the ultimate goal of this malware is data theft, specifically browser credentials. However, I could be wrong in that assessment, but I'm fairly confident in it. I'm guessing this is the end goal because when I emulated it I can see it messing with Google Chrome's IElevation COM interface (trying to dump and decrypt saved passwords). However, between this it does a bunch of other stuff too. 1. They (an unknown Threat Actor) compromised cpuid.com to deliver malware from HWMonitor. It impacts the actual installer as well as the portable installer. It downloads stuff from supp0v3-dot-com, the same domain used from a previous malware campaign targeting FileZilla in the beginning of March, 2026 initially reported by MalwareBytes. 2. HWMonitor comes packaged with a malicious CRYPTBASE.dll. CRYPTBASE.dll is a legitimate Windows library, but they made a fake one to blend in (malware masquerading). This DLL is responsible for connecting to their C2 and downloading the other malware stages. 3. It tries to detect emulation and prevent reverse engineering by checking for the presence of specific registry keys on the machine. However, they failed doing this and didn't account for everything. Notably, they only check for VirtualBox (whomp, whomp). 4. It downloads a .cs file from a remote C2 and then compiles it manually on the machine by invoking .NET stuff. This is an interesting strategy. It does all of this via Powershell (LOLBIN nonsense). 5. The .cs file it compiles is a .NET binary with NTDLL exports. The main HWMonitor binary performs process injection using this compiled .NET binary. This is an interesting strategy. 6. Almost everything it does is performed in-memory. I would have to do through this and manually bonk all of this stuff with a stick and determine precisely how it operates. However, I don't think that is necessary because at this point we know this is malware and we know it's trying to steal browser credentials. +2 points for IElevation COM Interface credential dumping +1 point for inline Powershell CLI DLL compilation +1 point for .NET assembly NTDLL export proxying -1 point for botched anti-emulation +2 points for website compromise and supply chain attack +1 point for memory persistence -3 points for recycling the same C2 from March, 2026 campaign Overall I give this malware a B-. This is pretty good malware.

English
21
50
277
40.9K
richie_rich 💔
richie_rich 💔@fcb_richie·
Why we don't have everyone back defending when atleti are on the attack is beyond me. You can stomach 1-0 with a red card but 2-0 becomes an entire mountain.
English
0
0
4
86
richie_rich 💔
richie_rich 💔@fcb_richie·
Generational Yamal second half incoming I can feel it in my balls.
GIF
English
0
0
0
49
richie_rich 💔
richie_rich 💔@fcb_richie·
Yamal deadass the only player in world football thats moves my fatass off the seat.
English
1
0
3
90