Guz

7.1K posts

Guz banner
Guz

Guz

@ibuGs_

iOS Developer 💻 beer, sleep, code & repeat. !⃝ 𝗧𝗵𝗶𝘀 𝗮𝗰𝗰𝗼𝘂𝗻𝘁 𝗵𝗮𝘀 𝗯𝗲𝗲𝗻 𝗱𝗶𝘀𝗽𝘂𝘁𝗲𝗱 𝗯𝘆 no one.

6rbpyxzchyxb8fgk Katılım Şubat 2014
80 Takip Edilen368 Takipçiler
Sabitlenmiş Tweet
Guz
Guz@ibuGs_·
🙂
ART
0
1
5
0
Guz
Guz@ibuGs_·
esta cuenta @usuariosdigital aporta más a la comunidad que esta otra @EcuCERT_EC
VECERT Analyzer@VECERTRadar

🚨 CRITICAL CYBERINTELLIGENCE ALERT: MASSIVE NATIONAL IDENTITY BREACH – DIGERCIC ECUADOR 🇪🇨👤📂🔓 [STATUS: EXTREME THREAT] A catastrophic compromise has been detected within the infrastructure of Ecuador's General Directorate of Civil Registry, Identification, and Cedulation (DIGERCIC). Threat actor "GordonFreeman," operating under the collective L4TAMFUCKERS, claims to have completely breached the national system, exfiltrating the identity data of virtually the entire population holding national ID cards. 🏢 Affected Entity: DIGERCIC (Ecuador's Civil Registry). 👤 Threat Actors: GordonFreeman, Izanagi, and YoSoyGroot (L4TAMFUCKERS). 📂 Compromised Assets: SQL database and a massive repository of identification images. 📊 Leak Volume: 14.8 million data records (10.8 GB in SQL). 10.6 million high-definition images of national ID cards (165 GB). 📅 Publication Date: May 4, 2026. 📊 Breach Scope (PII and Facial Biometrics) The magnitude of this attack implies that the attackers possess the capability to reconstruct the legal identity of the majority of Ecuadorian citizens: Alphanumeric Data: Full names, national ID numbers, dates of birth, marital status, digitized fingerprints, and signatures. Visual Evidence: The 10.6 million HD images correspond to facial photographs captured for the issuance of identity documents, thereby enabling biometric impersonation attacks. Infrastructure: The use of SQL dumps suggests deep-level access to the Civil Registry's master tables. 🛡️ Immediate Response Recommendations 🔒 Isolation of Critical Servers: DIGERCIC must declare a state of cybersecurity emergency and audit all data exfiltration points within its internal networks. 🔑 Financial System Alert: Banks and credit unions in Ecuador must enhance their identity verification protocols, exercising caution regarding validations based solely on photos of national ID cards. Monitor: analyzer.vecert.io #CyberSecurity #Ecuador #DIGERCIC #DataBreach #L4TAMFUCKERS #RegistroCivil #Identity #PII #VECERT #InfoSec 🇪🇨🛡️⚠️🚨👤

Español
0
0
1
72
Guz
Guz@ibuGs_·
fallaste azzorti 😓
Guz tweet media
Dark Web Informer@DarkWebInformer

‼️🇬🇹🇪🇨 Azzorti, a Latin American direct-sales beauty and fashion brand operating across Guatemala and Ecuador, has allegedly been breached, with the entire database from intranet.azzorti.com and intranet.azzorti.gt offered for sale. ⠀ ‣ Threat Actor: NyxarGroup (in collaboration with Petro_Escobar & ArcRaidersPlayer) ‣ Category: Data Sale ‣ Victim: Azzorti ‣ Industry: Retail / Direct Sales / Cosmetics ⠀ The actor is selling access to two intranet sites belonging to Azzorti, claiming the dataset includes business operations data alongside customer/consultant PII. The leak is offered for $400. ⠀ What's in it: ⠀ ▪️ Internal documents ▪️ Power BI reports ▪️ Supplier information ▪️ Product catalogs ▪️ Sales records ▪️ Business charts ▪️ Quotes ▪️ 2 databases with the following structure: ▪️Codigo (code), Identificacion (ID), Consec ▪️Zona (zone) ▪️Nombres / Apellidos (first/last names) ▪️Direccion (address) ▪️Telefonos (phone numbers) ▪️Distrito / Provincia (district/province) ▪️Camp Ingr, Digito, Cupo ▪️Pedidos (orders) ▪️Digito Anterior ▪️Direccion Referencia (reference address)

Italiano
0
0
0
19
Alfredo Velazco
Alfredo Velazco@alfredovelazco·
Han pasado 3 días desde el ataque de phishing suplantando a la @ANT_ECUADOR y el dominio .EC donde aterriza aún sigue activo... gastamos en Ley, Estrategia, Consejo y autoridades de #ciberseguridad pero no bajan ni un dominio, quieren que hagamos su trabajo? cc @EcuCERT_EC
Alfredo Velazco tweet mediaAlfredo Velazco tweet media
Usuarios Digitales@usuariosdigital

@ANT_ECUADOR @rocurun @Pau88g @skueffner @ghserrano #AlertaDigitalEC Se alerta de filtración de 17 millones de registros de una base al 2026 de @ANT_ECUADOR; la institución indica que los campos de muestra no corresponden a su base pero que información de automotores los tienen varias instituciones x.com/ANT_ECUADOR/st…

Español
4
9
18
1.2K
Guz
Guz@ibuGs_·
@santidavid @EcuCERT_EC las redes sociales sirven para eso, para reportar cosas. Si te etiquetan con una url falsa que se asemeje a cualquier institución, tan difícil es hacer la revisión en tiempo real? Hasta que respondan el correo habrán algunas personas afectadas.
Español
1
0
0
12
santidavid🚲
santidavid🚲@santidavid·
@ibuGs_ @EcuCERT_EC Yo pienso que es correcto que El canal de reporte sea El correo electronico para trazabilidad
Español
1
0
0
32
Guz
Guz@ibuGs_·
Que decadente esta cuenta @EcuCERT_EC , dice que solo aceptan reportes vía correo electrónico. Lo peor de todo es que entras a esa cuenta y nada relacionado con los incidentes de Ecuador, cero planes de acción, contingencia ni resultados. Ya estamos en el 2026 no en 1650.
santidavid🚲@santidavid

La ANT ha incumplido su obligacion legal de notificar Este evento a la superintendencia de datos y a @EcuCERT_EC de Arcotel segun articulo 43 de la ley. Ademas incumplido su obligacion legal de avisar de esta vulneracion a Los titulares de datos segun articulo 46 id. Habra multas

Español
1
0
0
67
Guz retweetledi
Signal
Signal@signalapp·
We are very happy that today Apple issued a patch and a security advisory. This comes following @404mediaco reporting that the FBI accessed Signal message notification content via iOS despite the app being deleted. Apple’s advisory confirmed that the bugs that allowed this to happen have been fixed in the latest iOS release. You can read more here: support.apple.com/en-us/127002 Note that no action is needed for this fix to protect Signal users on iOS. Once you install the patch, all inadvertently-preserved notifications will be deleted and no forthcoming notifications will be preserved for deleted applications. We’re grateful to Apple for the quick action here, and for understanding and acting on the stakes of this kind of issue. It takes an ecosystem to preserve the fundamental human right to private communication.
English
106
1K
6.3K
805.4K
CoaliciónCovsfe
CoaliciónCovsfe@coalicionCOVSFE·
🚨ATENCIÓN‼️ Un monaguillo de 24 años fue detenido en #Ambato por haber abusado de 5 niños. Daba clases de catecismo y así captaba a sus víctimas. También subía material sexual a plataformas y captaba a víctimas a través de juegos en linea. Tomen nota @Confepec @FiscaliaEcuador
Español
9
221
194
25.7K
Outsiders
Outsiders@LosOutsidersEC·
Informamos, nos están intentando hackear -otra vez-. Nuestra postura oficial como medio: chúpenla. Saludos cordiales.
Outsiders tweet media
Español
27
263
890
10.3K
Guz retweetledi
Meredith Whittaker
Meredith Whittaker@mer__edith·
Notifications for deleted messages shouldn't remain in any OS notification database, and we've asked Apple to address this. In the meantime, you can prevent any preview text from your Signal messages from appearing in your notifications. Signal Settings > Notifications > Show “No Name or Content” 404media.co/fbi-extracts-s…
English
77
441
2K
246.8K
Guz retweetledi
Techlore
Techlore@TechloreInc·
This is a very high threat model concern, though the fix is straightforward: Signal → Settings → Notifications → Show → set to "No Name or Content" You'll still get a notification ping, but iOS just won't cache anything useful.
English
4
16
285
15.1K
Guz
Guz@ibuGs_·
Irán cesa el fuego | Pero sigue bombardeando israel
Guz tweet mediaGuz tweet media
Español
0
0
0
32
Henar Vega
Henar Vega@henarvega·
🚨🚨 NECESITO TU AYUDA 🚨🚨 Busco perfiles del mundo tecnológico y digital 💻 para mi investigación de tesis. Es un cuestionario ANÓNIMO que te llevará unos 15minutos xa estudiar el impacto de la IAGen en la #saludmental ¿ME AYUDAS? ⤵️ forms.gle/WefaCggBeCkrSj…
Henar Vega tweet media
Español
7
25
15
9.2K
Guz retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️ LinkedIn Hidden Code Secretly Searches Your Browser for Installed Extensions Source: cybersecuritynews.com/linkedin-code-… Every time you open LinkedIn in a Chrome-based browser, hidden JavaScript silently scans your computer for installed software without your knowledge, without your consent, and without a single word in LinkedIn's privacy policy. A revealing investigation conducted by the European advocacy group Fairlinked e.V., under the campaign name "BrowserGate," has uncovered what researchers describe as one of the largest corporate espionage and data breach scandals in digital history. Microsoft's LinkedIn, the world's largest professional networking platform with over one billion users, is running covert code that probes visitors' browsers for thousands of installed extensions, compiles the results, encrypts them, and transmits everything back to LinkedIn's servers and to third-party companies. #cybersecuritynews
Cyber Security News tweet media
English
26
142
348
17.9K