xiaopao (@kangxiaopao) 's Twitter Profile
xiaopao

@kangxiaopao

Focus on ransomware,like cat

ID: 1148077012986187777

linkhttp://lesuobingdu.360.cn calendar_today08-07-2019 03:51:04

706 Tweet

644 Takipçi

137 Takip Edilen

vx-underground (@vxunderground) 's Twitter Profile Photo

The Conti ransomware leaks have unveiled Conti's primary Bitcoin address. From April 21st, 2017 - February 28th, 2022 Conti has received 65,498.197 BTC That is 2,707,466,220.29 USD.

The Conti ransomware leaks have unveiled Conti's primary Bitcoin address.

From April 21st, 2017 - February 28th, 2022 Conti has received 65,498.197 BTC

That is 2,707,466,220.29 USD.
Jorge Gomes (@jgomes_eu) 's Twitter Profile Photo

#ContiLeaks A first data analysis gives some insight into the leak and group itself. - 60690 messages leaked - 2535 unique users

#ContiLeaks A first data analysis gives some insight into the leak and group itself. 
- 60690 messages leaked
- 2535 unique users
Jorge Gomes (@jgomes_eu) 's Twitter Profile Photo

For those looking into the #ContiLeaks, I've prepared a network relationship map, that shows the relationships between users, based on the leaked chat logs. bit.ly/JGEU_CLNETMAP

f0wL (@f0wlsec) 's Twitter Profile Photo

New blog post detailing the unpacking of #Pandora #Ransomware and similarities with Rook Ransomware. dissectingmalwa.re/blog/pandora/

New blog post detailing the unpacking of #Pandora #Ransomware and similarities with Rook Ransomware. dissectingmalwa.re/blog/pandora/
vx-underground (@vxunderground) 's Twitter Profile Photo

LAPSUS$ extortion group has released source code to Bing, Bing Maps, and Microsoft Cortana. They state that each release is incomplete (not the entire source code).

Amigo-A (@amigo_a_) 's Twitter Profile Photo

Last article in March #Vovabol #Ransomware, probably fake encryptor. id-ransomware.blogspot.com/2022/03/vovabo… Uses UA and LV mail accounts, but asks for a ransom on Qiwi wallet. Thank MalwareHunterTeam

Last article in March #Vovabol #Ransomware, probably fake encryptor.
id-ransomware.blogspot.com/2022/03/vovabo…
Uses UA and LV mail accounts, but asks for a ransom on Qiwi wallet. 
Thank <a href="/malwrhunterteam/">MalwareHunterTeam</a>
Brett Callow (@brettcallow) 's Twitter Profile Photo

LockBit supposedly prohibits its affiliates from carrying out encryption-based attacks on nuclear power plants and other critical infrastructure, but permits them to compromise the networks to steal data. 1/3

LockBit supposedly prohibits its affiliates from carrying out encryption-based attacks on nuclear power plants and other critical infrastructure, but permits them to compromise the networks to steal data. 1/3
DarkFeed (@ido_cohen2) 's Twitter Profile Photo

🌐 The new website (Version 3.0) of Lockbit #Ransomware team allows anyone to extend the timer by 24 hours, destroy all data from the website, or download all data right away to maximize the ransom money for each victim 💸 Next level hacking group 🥷 #Lockbit

🌐 The new website (Version 3.0) of Lockbit #Ransomware team allows anyone to extend the timer by 24 hours, destroy all data from the website, or download all data right away to maximize the ransom money for each victim 💸 

Next level hacking group 🥷

#Lockbit
vx-underground (@vxunderground) 's Twitter Profile Photo

Cl0p ransomware group has breached critical infrastructure in England responsible for the public water supply and waste management for London, Luton, Thames Valley, Surrey, and more. They state they will not ransom it. cl0p's official statement: share.vx-underground.org/cl0p-thameswat…

Cl0p ransomware group has breached critical infrastructure in England responsible for the public water supply and waste management for London, Luton, Thames Valley, Surrey, and more.

They state they will not ransom it.

cl0p's official statement: share.vx-underground.org/cl0p-thameswat…
Zscaler ThreatLabz (@threatlabz) 's Twitter Profile Photo

💰ThreatLabz has discovered a new #ransomware group named Money Message performing double extortion attacks. Sample hash: bbdac308d2b15a4724de7919bf8e9ffa713dea60ae3a482417c44c60012a654b Data leak site: blogvl7tjyjvsfthobttze52w36wwiz34hrfcmorgvdzb6hikucb7aqd[.]onion

💰ThreatLabz has discovered a new #ransomware group named Money Message performing double extortion attacks. 

Sample hash: bbdac308d2b15a4724de7919bf8e9ffa713dea60ae3a482417c44c60012a654b

Data leak site: blogvl7tjyjvsfthobttze52w36wwiz34hrfcmorgvdzb6hikucb7aqd[.]onion
xiaopao (@kangxiaopao) 's Twitter Profile Photo

#Ransomware Wuibei ransom ioc: mai:[email protected] info: 0a___Hello_ReadMe___.TXT notice.txt BTC Wallets: 1Abim6rh3uRkDmxriYY91EaqYXvDdtfcpN 1NYXFKZ2Cgc1765NyDxkLAqdBzyw3VYKQj md5: ca13c0b6043ae7171330c513135b8ce5 a57ce5e81cd9eb3456c8d021101cbbc0 360.cn/n/12481.html

#Ransomware   
Wuibei ransom 
ioc:
mai:ingrengshun@qdo.com
info:
0a___Hello_ReadMe___.TXT
notice.txt
BTC Wallets:
1Abim6rh3uRkDmxriYY91EaqYXvDdtfcpN
1NYXFKZ2Cgc1765NyDxkLAqdBzyw3VYKQj
md5:
ca13c0b6043ae7171330c513135b8ce5
a57ce5e81cd9eb3456c8d021101cbbc0
360.cn/n/12481.html
Brett Callow (@brettcallow) 's Twitter Profile Photo

#Qilin has added a QR code to its leak site which points to "WikiLeaksV2" - a clearnet site on which Qilin also list a selection of their victims in addition to soliciting donations. #ransomware

#Qilin has added a QR code to its leak site which points to "WikiLeaksV2" - a clearnet site on which Qilin also list a selection of their victims in addition to soliciting donations. #ransomware
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

📌 #Akira ransomware exfiltration server. 77.247.126.158: still active and exposed by BlackBerry in the blog “Akira Ransomware Targets the LATAM Airline Industry” → blogs.blackberry.com/en/2024/07/aki…. Another possible candidate could be 190.211.252.82, unconfirmed but with very similar

📌 #Akira ransomware exfiltration server.

77.247.126.158: still active and exposed by BlackBerry in the blog “Akira Ransomware Targets the LATAM Airline Industry” → blogs.blackberry.com/en/2024/07/aki….

Another possible candidate could be 190.211.252.82, unconfirmed but with very similar
PJ (@pj04857920) 's Twitter Profile Photo

Fusion Intelligence Center @ StealthMole Behind the #DragonRaaS (and the "Stormous" copy-cat's) are two Yemeni Individuals. They "redesigned" the old Logo and also came up with a "#StormCry" Ransomware back in March

<a href="/stealthmole_int/">Fusion Intelligence Center @ StealthMole</a> Behind the #DragonRaaS (and the "Stormous" copy-cat's) are two Yemeni Individuals. They "redesigned" the old Logo and also came up with a "#StormCry" Ransomware back in March