xf0

19 posts

xf0 banner
xf0

xf0

@xf0_st

You found xf0. Most people don't. - Threat Research

/dev/null Katılım Mayıs 2025
21 Takip Edilen9 Takipçiler
Sabitlenmiş Tweet
xf0
xf0@xf0_st·
contact: xf0@keemail.me
English
0
0
0
77
xf0
xf0@xf0_st·
@vxunderground You're forgetting that "nerd" joined ISIS.
English
0
0
0
13
vx-underground
vx-underground@vxunderground·
Note: there is a 0% chance they're drone striked. I've only seen a nerd drone striked once. These are just angry normies who don't understand computers and are raging online.
English
25
7
700
36K
vx-underground
vx-underground@vxunderground·
ShinyHunters has successfully hit the big leagues. ShinyHunters successfully disrupting exams, schooling, grading, government funded research projects, dissertation work, graduations, financial aid, financial loss, potentially immigration complications, and more, has elevated this from "a silly shenanigan" to "major national security incident" and being labeled as an attack on United States critical infrastructure. If I had to guess, the FBI, NSA, CIA, DIA, CISA, ICE, and DOE are all involved due to the disruption of this. This isn't the largest extortion campaign I've seen, but this is definitely in the top ten. This is what the kids call a "Certified Hood Classic".
English
68
318
4.4K
237.1K
BleepingComputer
BleepingComputer@BleepinComputer·
🚨 BREAKING: ShinyHunters defaced Canvas login portals for hundreds of colleges and universities today, replacing them with extortion demands tied to the recent Instructure breach. Sources tell BleepingComputer that the hackers exploited another unpatched vulnerability in Instructure’s systems, allowing them to hijack approximately 330 Canvas portals and display ransom messages to students and staff. What happened: 🔴 Canvas login portals were replaced with ShinyHunters extortion messages 🔴 The messages warned schools to negotiate before May 12 or student data would be leaked 🔴 The defacements also appeared inside the Canvas mobile app The portals were visible for about 30 minutes before being taken offline as Instructure responded to the incident. This follows last week’s breach where ShinyHunters claimed to have stolen 280 million student and staff records tied to thousands of schools using Canvas.
BleepingComputer tweet media
English
11
111
434
71.9K
xf0
xf0@xf0_st·
Want to see what an operators attack box looks like? Below is a documentation of a real hackers tools, exploits, stagers and delivery payloads.😀🏴‍☠️
English
2
1
1
77
xf0
xf0@xf0_st·
RIP @pcpcats, hopefully they make a comeback so we can document more of their infrastructure ;)
English
0
1
2
88
xf0
xf0@xf0_st·
Another malware found, this time written in VBScript using Batch as a delivery mechanism. Thread coming soon.
English
0
1
3
97
xf0
xf0@xf0_st·
> Persistence Beaconing. The script enters and infinite loop phoning home back to the C2s host every 5 minutes to signal if the implant is still active. Is this a threat actor testing his malware, or is it a real threat? Let me know :D
English
0
0
4
73
xf0
xf0@xf0_st·
> LotL Downloads. Uses "certutil" & "bitsadmin" to download files from the C2 server to avoid detection. > Persistence. There are 3 methods being used; registry keys, startup folder and a task scheduler. > Data Exfil. All system collected data is sent to 108.165.[123.10 (2/n)
English
1
0
4
83
xf0
xf0@xf0_st·
A Powershell script is being deployed infecting over 500 devices. This script acts as a dropper that disguises itself as a "pentest simulation". In this thread I will break down the functions of the powershell script and ask you guys what you think they are trying to achieve.
English
1
2
5
136
xf0
xf0@xf0_st·
This is an example of a sophiscated vibe-coded Monero miner being deployed on a day-to-day basis.
English
0
0
3
49
xf0
xf0@xf0_st·
> hides processes using 'mount --bind' to hide from /proc > clears bash history and touches timestamps to match legitimate system files > modifies .bashrc to load an aliased config > deletes itself after installation > then finally sends a POST request to a webhook (3/n)
English
1
0
3
53
xf0
xf0@xf0_st·
Previously, during the React2Shell vulnerability we observed a miner being deployed called "sex.[sh". A new open directory index has been opened containing a similar script but appears to be vibe-coded by a Chinese actor. (1/n)
English
1
2
4
103
xf0
xf0@xf0_st·
@CarTalkYumeship @DarkWebInformer That is because the owner is aligned with the federal government. Due to this, he has immunity by handing over any logs to the authorities if requested.
English
0
0
0
12
xf0
xf0@xf0_st·
@discord_support So you terminate my account with no warning 1 day after I purchase Nitro, then you say I have been suspended for violent content and fraud? Please get in contact with me to help me fix this. At least show me evidence.
English
2
0
1
29
xf0 retweetledi
master hacker
master hacker@masterhaxx0r·
master hacker tweet media
ZXX
1
22
392
6.5K