Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 6
101 résultats taggé leak  ✕
Iran-linked hackers threaten to release Trump aides' emails https://www.reuters.com/legal/government/iran-linked-hackers-threaten-release-trump-aides-emails-2025-06-30/
02/07/2025 10:58:10
QRCode
archive.org
thumbnail
  • Hackers say they might try to sell emails from Trump aides
  • Group leaked documents from Republican president's campaign last year
  • US has said group known as Robert works for Iran's Revolutionary Guards

WASHINGTON, June 30 (Reuters) - Iran-linked hackers have threatened to disclose more emails stolen from U.S. President Donald Trump's circle, after distributing a prior batch to the media ahead of the 2024 U.S. election.
In online chats with Reuters on Sunday and Monday, the hackers, who go by the pseudonym Robert, said they had roughly 100 gigabytes of emails from the accounts of White House Chief of Staff Susie Wiles, Trump lawyer Lindsey Halligan, Trump adviser Roger Stone and porn star-turned-Trump antagonist Stormy Daniels.

reuters EN 2025 Iran US Trump leak threaten emails
Inside the LockBit's Admin Panel Leak: Affiliates, Victims and Millions in Crypto https://www.trellix.com/blogs/research/inside-the-lockbits-admin-panel-leak-affiliates-victims-and-millions-in-crypto/
14/06/2025 22:41:18
QRCode
archive.org

On May 7, 2025, the LockBit admin panel was hacked by an anonymous actor who replaced their TOR website with the text ‘Don’t do crime CRIME IS BAD xoxo from Prague’ and shared a SQL dump of their admin panel database in an archived file ‘paneldb_dump.zip’:

There is not much information available regarding the individual identified as 'xoxo from Prague' whose objective seems to be the apprehension of malicious ransomware threat actors. It is uncommon for a major ransomware organization's website to be defaced; more so for its administrative panel to be compromised. This leaked SQL database dump is significant as it offers insight into the operational methods of LockBit affiliates and the negotiation tactics they employ to secure ransom payments from their victims.

Trellix Advanced Research Center’s investigations into the leaked SQL database confirmed with high confidence that the database originates from LockBit's affiliates admin panel. This panel allows the generation of ransomware builds for victims, utilizing LockBit Black 4.0 and LockBit Green 4.0, compatible with Linux, Windows and ESXi systems, and provides access to victim negotiation chats.

The leaked SQL database dump encompasses data from December 18, 2024 to April 29, 2025, including details pertaining to LockBit adverts (aka ransomware affiliates), victim organizations, chat logs, cryptocurrency wallets and ransomware build configurations.

trellix EN 2025 LockBit Leak Affiliates Crypto research
Massive leak exposes Russian nuclear facilities https://cybernews.com/security/russian-missile-program-exposed-in-procurement-database/
29/05/2025 13:29:54
QRCode
archive.org

Detailed blueprints of Russia’s modernized nuclear weapon sites, including missile silos, were found leaking in public procurement database.
Russia is modernizing its nuclear weapon sites, including underground missile silos and support infrastructure. Data, including building plans, diagrams, equipment, and other schematics, is accessible to anyone in the public procurement database.

Journalists from Danwatch and Der Spiegel scraped and analyzed over two million documents from the public procurement database, which exposed Russian nuclear facilities, including their layout, in great detail. The investigation unveils that European companies participate in modernizing them.

According to the exclusive Der Spiegel report, Russian procurement documents expose some of the world’s most secret construction sites.

“It even contains floor plans and infrastructure details for nuclear weapons silos,” the report reads.

German building materials and construction system giant Knauf and numerous other European companies were found to be indirectly supplying the modernization through small local companies and subsidiaries.

Knauf condemned the Russian invasion of Ukraine and announced its intention to withdraw from its Russian business in 2024. Knauf told Der Spiegel that it only trades with independent dealers and cannot control who ultimately uses its materials in Russia.

Danwatch jointly reports that “hundreds of detailed blueprints” of Russian nuclear facilities, exposed in procurement databases, make them vulnerable to attacks.

“An enormous Russian security breach has exposed the innermost parts of Russia’s nuclear modernization,” the article reads.

“It’s completely unprecedented.”

The journalists used proxy servers in Russia, Kazakhstan, and Belarus to circumvent network restrictions and access the documents. The rich multimedia in the report details the inner structure of bunkers and missile silos.

cybernews.com EN 2025 Massive leak Russia nuclear facilities procurement database data-leak
On Lockbit's plaintext passwords https://dak.lol/lockbit-plaintext/
08/05/2025 09:06:07
QRCode
archive.org
thumbnail

Today it was discovered that an unknown actor had managed to exploit a vulnerability in Lockbit’s PHPMyAdmin instance (on their console onion site). Apparently they were running PHP 8.1.2 which is vulnerable to an RCE CVE-2024-4577. Which uhh… lol? It probably would have been prudent to do a post-paid penetration test on their own infrastructure at some point.

Further compounding the unfortunate situation, the actor was able to dump their database. This contained, as stated by Bleeping Computer, a number of tables such as bitcoin addresses, data about their build system such as bespoke builds for affiliates, A ‘chats’ table containing negotiation messages, which we’ll go through in a later post. And finally, of interest today, the usernames and passwords of LockBit agents using the console.

Of special importance, making our work markedly easier, these passwords were not hashed. Which sure is a choice, as an organization that performs ransomware attacks.

The vast majority of the passwords in this table as reasonably secure; it’s not solely hilariously weak credentials, but there still are a number that display poor security hygiene.

The weak passwords
Before going into my standard analysis, I’ll list off all of the weak passwords in question, and then we’ll go through the statistics of the whole set. The fun to highlight passwords:

  • Weekendlover69
  • CumGran0Salis
  • Lockbit123
  • Lockbitproud321
  • Lavidaloca18
dak.lol EN 2025 Lockbit leak passwords complexity PHPMyAdmin analysis
Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/inside-black-basta-uncovering-the-secrets-of-a-ransomware-powerhouse/
09/04/2025 20:28:20
QRCode
archive.org
thumbnail

In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta.

trustwave EN 2025 BlackBasta leak analysis
Ransomware : sur la piste trouble de l’un des leaders de Black Basta https://www.lemagit.fr/actualites/366619470/Ransomware-sur-la-piste-trouble-de-lun-des-leaders-de-Black-Basta
27/02/2025 10:03:48
QRCode
archive.org
thumbnail

Les échanges internes au groupe Black Basta divulgués la semaine dernière offrent une nouvelle opportunité d’enquêter sur l’un de ses leaders : tramp. Il pourrait avoir été arrêté en Arménie en juin 2024, avant d’être relâché.

lemagit FR 2025 BlackBasta Tramp leak Ransomware
Orange Group confirms breach after hacker leaks company documents https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/
26/02/2025 13:56:16
QRCode
archive.org
thumbnail

A hacker claims to have stolen thousands of internal documents with user records and employee data after breaching the systems of Orange Group, a leading French telecommunications operator and digital service provider.
#Breach #Computer #Data #Email #Extortion #InfoSec #Jira #Leak #Orange #Ransom #S.A. #Security

Extortion Leak Security InfoSec Orange Breach Ransom Data Computer Email S.A Jira
Cisco Says Ransomware Group’s Leak Related to Old Hack https://www.securityweek.com/cisco-says-ransomware-groups-leak-related-to-old-hack/
16/02/2025 14:00:25
QRCode
archive.org

A fresh post on the Kraken ransomware group’s leak website refers to data stolen in a 2022 cyberattack, Cisco says.

The data, a list of credentials apparently exfiltrated from Cisco’s systems, appeared over the weekend on a new data leak site operated by the Kraken ransomware group.

“Cisco is aware of certain reports regarding a security incident. The incident referenced in the reports occurred back in May 2022, and we fully addressed it at that time,” a Cisco spokesperson said, responding to a SecurityWeek inquiry.

securityweek EN Cisco Ransomware Leak Old
Live Chat Blog #2: Cisco Webex Connect - Access to millions of chats histories https://www.ophionsecurity.com/post/cisco-webex-connect-vulnerability-unauthenticated-access-to-all-chats
03/02/2025 11:46:44
QRCode
archive.org
thumbnail

In July 2024, we identified a vulnerability that resulted in access to millions of live customer support messages for organizations using Cisco Webex Connect.

ophionsecurity EN 2025 Cisco Webex Connect vulnerability chat history leak
French submarine crew accidentally leak sensitive information through Strava app | Euronews https://www.euronews.com/2025/01/15/french-submarine-crew-accidentally-leak-sensitive-information-through-strava-app
19/01/2025 09:10:56
QRCode
archive.org
thumbnail

France's Navy personnel revealed classified information about submarine patrols through the Strava fitness app, found an investigation by Le Monde.

euronews EN 2025 strava leak sensitive information military France submarine
Une centrale nucléaire mise sur les drones pour assurer sa sécurité https://www.blick.ch/fr/suisse/le-president-de-la-commune-publie-accidentellement-des-photos-sur-whatsapp-la-centrale-nucleaire-de-goesgen-mise-desormais-sur-les-drones-pour-assurer-sa-securite-id20413890.html
15/12/2024 10:31:20
QRCode
archive.org

La centrale nucléaire de Gösgen, dans le canton de Soleure, mise sur la technologie des drones pour sa sécurité et l'inspection. Aujourd'hui, la publication involontaire d'images suscite le débat.

blick FR CH Suisse leak WhatsApp nucléaire drones
Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock https://www.404media.co/leaked-documents-show-what-phones-secretive-tech-graykey-can-unlock-2/
19/11/2024 20:57:47
QRCode
archive.org
thumbnail

The documents provide never-been-seen insight into the current cat-and-mouse game between forensics companies and phone manufacturers Apple and Google.

404media EN 2024 Graykey leak analysis Apple Google ios Android forensics
stardom dreams, stalking devices and the secret conglomerate selling both https://maia.crimew.gay/posts/gps-track-deez-nuts/
19/08/2024 08:41:02
QRCode
archive.org
thumbnail

people frequently reach out to me with companies to look into. usually it takes me about 10 minutes before i move on for one reason or another—it's not interesting for a story or has good security, for example. i didnt expect anything different when an acquaintance told me about Tracki, a self-proclaimed "world leader in GPS tracking" that they suspected could be used nefariously.

at first glance, Tracki appeared to be a serious company, maybe even one that cared about security. we could never have guessed what was about to unfold before us.

half a year into our investigation, we'd found it all: a hidden conglomerate posing as five independent companies, masked from governments and customers alike through the use of dozens of false identities, US letterbox companies, and an undeclared owner. a 90s phone sex scheme that, through targeting by one of hollywood's most notorious fixers, spiraled into a collection of almost a hundred domains advertising everything from online dating to sore throat remedies. a slew of device-assisted murder cases, on top of potential data breaches affecting almost 12 million users, ranging from federal government officials to literal infants. and most importantly, a little-known Snoop Dogg song. how in the world did we get here?

starting our descent

maia.crimew.gay EN 2024 Tracki shady business investigation stalkerware security analysis sqli leak exploit nyancrimew maia-arson-crimew switzerland hacktivism developer
Trump campaign confirms it was hacked after POLITICO received internal documents from "Robert" https://www.politico.com/news/2024/08/10/trump-campaign-hack-00173503?ref=news.risky.biz
12/08/2024 07:07:12
QRCode
archive.org

The campaign suggested Iran was to blame. POLITICO has not independently verified the identity of the hacker or their motivation.

politico EN 2024 Trump campaign leak data-leak "Robert" presidential-campaign US
Microsoft employee accidentally publishes PlayReady code https://borncity.com/win/2024/06/26/microsoft-employee-accidentally-publishes-playready-code/
26/06/2024 15:06:57
QRCode
archive.org

[German]A Microsoft software developer has accidentally shared internal PlayReady source code with the public (a developer forum). The data leak of 4 GByte is sufficient to compile the required DLL from the source code. This could be a real boon for people who want to reverse engineering or crack PlayReady. What is PlayReady? PlayReady is...

borncity.com EN 2024 Microsoft employee PlayReady leak
The New York Times source code leaked by a 4chan user https://stackdiary.com/the-new-york-times-source-code-leaked-by-a-4chan-user/
11/06/2024 20:54:58
QRCode
archive.org
thumbnail

A user on the online forum 4chan has leaked a massive 270GB of data belonging to The New York Times. This leak includes the source code for the

stackdiary EN 2024 NewYorkTimes Source-Code leak 4chan
Crooks threaten to leak 2.9B records of personal info https://www.theregister.com/2024/06/03/usdod_data_dump/
04/06/2024 07:19:11
QRCode
archive.org
thumbnail

Billions of records detailing people's personal information may soon be dumped online after being allegedly obtained from a Florida firm that handles background checks and other requests for folks' private info.

A criminal gang that goes by the handle USDoD put the database up for sale for $3.5 million on an underworld forum in April, and rather incredibly claimed the trove included 2.9 billion records on all US, Canadian, and British citizens. It's believed one or more miscreants using the handle SXUL was responsible for the alleged exfiltration, who passed it onto USDoD, which is acting as a broker.

theregister EN 2024 USDoD database US Florida leak
Google Leak Reveals Thousands of Privacy Incidents https://www.404media.co/google-leak-reveals-thousands-of-privacy-incidents/?ref=daily-stories-newsletter
03/06/2024 21:33:14
QRCode
archive.org
thumbnail

An internal Google database obtained by 404 Media shows Google recording childrens' voices, saving license plates from Street View, and many other self-reported incidents, large and small.

404media EN 2024 Google Leak Privacy database
An Anonymous Source Shared Thousands of Leaked Google Search API Documents with Me; Everyone in SEO Should See Them https://sparktoro.com/blog/an-anonymous-source-shared-thousands-of-leaked-google-search-api-documents-with-me-everyone-in-seo-should-see-them/
30/05/2024 13:50:20
QRCode
archive.org
thumbnail

On Sunday, May 5th, I received an email from a person claiming to have access to a massive leak of API documentation from inside Google’s Search division.

sparktoro EN 2024 Google Leak Search API
PCTattletale leaks victims' screen recordings to entire Internet https://www.ericdaigle.ca/pctattletale-leaking-screen-captures/
28/05/2024 08:15:57
QRCode
archive.org

PCTattletale is a simple stalkerware app. Rather than the sophisticated monitoring of many similarly insecure competitors it simply asks for permission to record the targeted device (Android and Windows are supported) on infection. Afterward the observer can log in to an online portal and activate recording, at which point a screen capture is taken on the device and played on the target's browser.

ericdaigle EN 2024 PCTattletale analysis stalkerware screen recordings leak
page 1 / 6
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio