john
835 posts





𝕏 - ✅ open source algorithm Youtube ❌ Facebook ❌ Instagram ❌ TikTok ❌ Reddit ❌ Threads ❌ Why do other social networks not make their algorithms open-source?


🚨 🇪🇨 CYBER THREAT ALERT: POTENTIAL SERVER COMPROMISE – SOMOS BDA (BANCO DEL AUSTRO) ⚠️ DETECTION OF SUSPICIOUS FILE UPLOADS AND POTENTIAL BACKDOOR [STATUS: EMERGING THREAT / UNCONFIRMED] Activity has been detected from the group BROTHEROOD CAPUNG (BCI) targeting the domain somosbda.ec, a platform associated with employees and collaborators of Banco del Austro in Ecuador. Evidence suggests that the attackers have successfully breached the server's upload directory. 🎯 Affected Institution: Somos BDA / Banco del Austro. 👤 Threat Actors: BROTHEROOD CAPUNG (BCI). 📅 Detection Date: May 14, 2026. 📊 ACTIVITY ANALYSIS (UNCONFIRMED) The incident presents indicators of a compromise involving the upload of unauthorized files: 🧩 Shell/Backdoor Upload: A URL has been identified pointing to a file with an apparently executable extension located within the /uploads/ directory. Although definitive technical confirmation is pending, the phrase "Shel nya ampas" used by the actor suggests the successful deployment of a Web Shell or Backdoor to maintain persistence. 🔓 Credential Risk: The affected page is a login portal ("Log In - Somos BDA"). A backdoor in this location could be used to intercept credentials belonging to bank employees and collaborators (Internal Phishing or Formjacking). 🛡️ MITIGATION AND RECOMMENDATIONS 🛑 Directory Isolation: It is recommended to immediately restrict access to—and script execution within—the /uploads/ directory on the affected server. ⚠️ File Audit: Conduct a thorough inspection of recently uploaded files to identify and remove any Web Shells or malicious code. ⚡ MONITORING 🌐 Monitoring System: analyzer.vecert.io #CyberSecurity #BancoDelAustro #SomosBDA #Backdoor #WebShell #Ecuador #CyberAlert #VECERT #BCI #DataBreach









‼️🇪🇨 CACPE Pastaza allegedly breached exposing 18 million Ecuadorian civil registry records via an unprotected API A threat actor claims that the identity validation API of CACPE Pastaza, an Ecuadorian cooperative, was pwned through an unprotected proxy endpoint that queries the national civil registry, exposing over 18 million records updated as of today. The post is being released for free and includes a working cURL exploitation example showing how anyone can pull complete personal records by submitting a national ID number. Post details: ▸ Actor(s): GondorPe ▸ Sector: Finance / Government (civil registry via cooperative API) ▸ Type: Data Leak / API Exposure ▸ Price: Free ▸ Records: 18,000,000+ ▸ Country: Ecuador ▸ Date: 06/05/2026 Compromised data: ▪ Full names (apellidos, nombres) ▪ National ID number (NUI / cédula) ▪ Date of birth ▪ Place of birth ▪ Home address (domicilio, calle, número) ▪ Marital status ▪ Gender ▪ Nationality ▪ Father's and mother's names ▪ Profession ▪ Date of ID issuance ▪ Citizenship status


El @RegistroCivilec aseguró que no se ha detectado vulneración de datos en su infraestructura actual tras reportes sobre una presunta filtración de información ciudadana. La entidad informó que mantiene protocolos activos de ciberseguridad y que la investigación continúa.









