First up: X, formerly known as Twitter (but let’s be honest, still Twitter).
Rumour has it they’ve had a little “security incident.” A cyber gang allegedly slid into VX-Underground’s DMs with screenshots of an Okta account belonging to an X employee. The internet promptly split into two camps:
- Camp A: “Holy hell, they popped Twitter again!”
- Camp B: “That’s just Photoshop with a Red Bull problem.”
Was it a breach? Was it an AI-generated fever dream? Nobody knows. But one thing’s certain: if it was real, Elon is probably already drafting a tweet blaming the woke mind virus. Time will tell.
Then we have the BBC ransomware almost-caper. This one reads like a rejected Black Mirror script. The Medusa ransomware gang tried to recruit a BBC insider, except instead of targeting someone with actual admin access, they messaged… a cybersecurity reporter. Yes, a guy who literally writes articles about ransomware. Smooth, lads.
The reporter, being a journalist (and therefore contractually obligated to stay curious), played along. Medusa dangled 0.5 BTC as a down payment and promised him 15–25% of whatever ransom they squeezed out of Auntie Beeb. “You’ll never have to work again,” they bragged.
Cute pitch. Only slight snag: laundering millions in crypto isn’t exactly as easy as cashing in your Tesco Clubcard points. And their follow-up move? Spamming the poor reporter with MFA requests in an attempt to “test something.” I mean… come on. You can’t make this stuff up. In the end, the Beeb yanked the journo’s access, Medusa went back to the drawing board, and the reporter walked away with one hell of a story.
Meanwhile, in Manchester: VAAS (Violence-as-a-Service) reared its very ugly head. Yes, you read that right, violence is now available as a subscription model. Forget “Ransomware-as-a-Service.” We’re in the age of Uber with brass knuckles.
Case in point: thugs broke into the home of an elderly woman in her 80s, beat her up, and trashed her house, all because they were looking for someone else entirely. Horrific. And all because someone, somewhere, paid for a beatdown via the dark web’s new gig economy.
Now here’s the kicker: the actual target in this case was allegedly involved in producing CSAM and zoophilia content (yes, the worst of the worst). So, was the attack “justice” or just straight-up reckless brutality? Doesn’t matter. The granny should never have been caught in the crossfire. If VAAS really wants to market itself as the cyber underworld’s new ethical enforcement service, maybe step one should be: “don’t assault pensioners.” Just saying.
So, to recap the chaos:
- Twitter might have been breached… or maybe someone just had too much fun with MidJourney.
- A ransomware gang tried to bribe a journalist, proving that even criminals can’t be bothered to do proper LinkedIn recon.
- And VAAS reminded us that the dark web’s version of Deliveroo is just as messy and morally bankrupt as you’d expect.
Honestly, the underground economy keeps finding new ways to make late-stage capitalism look boring.
Smarter Protection Starts with Awareness
Data Breach Scan, Check Any Domain for Free https://breachaware.com/scan
https://breachaware.com/research/hackers-pay-for-tattoos-cloudflare-mocked-and-ransomware-cartel-dreams
A total of 26 breach events were found and analysed resulting in 21,504,511 exposed accounts containing a total of 27 different data types of personal datum. The breaches found publicly and freely available included ULP Alien TxT File - Episode 22, Skyeng, LinkedIn [sample data], QQ Mail and Allianz Life.
Leaked LLM Chats, PomPompurin Sentenced, and LAPSUS$ Bows Out.
https://breachaware.com/research/leaked-llm-chats-pompompurin-sentenced-and-lapsuss-bows-out
A total of 22 breach events were found and analysed resulting in 10,974,592 exposed accounts containing a total of 31 different data types of personal datum. The breaches found publicly and freely available included ULP Alien TxT File - Episode 23, Slate and Tell, WoW Health, My Conan and Humanists Community in Silicon Valley (HCSV).
ShinyHunters’ Fake Retirement, Baphomet Returns, and New Mega-Flaws.
https://breachaware.com/research/shinyhunters-fake-retirement-baphomet-returns-and-new-mega-flaws
A total of 35 breach events were found and analysed resulting in 14,577,201 exposed accounts containing a total of 36 different data types of personal datum. The breaches found publicly and freely available included ULP Alien TxT File - Episode 24, ULP 0032, Stealer Log 0541, Yellowpages Directory and College Dekho.
Violence-as-a-Service Emerges, ShinyHunters Escalate, and New Mega-Flaws.
https://breachaware.com/research/violence-as-a-service-emerges-shinyhunters-escalate-and-new-mega-flaws
A total of 9 breach events were found and analysed resulting in 5,897,816 exposed accounts containing a total of 21 different data types of personal datum. The breaches found publicly and freely available included Bouygues Telecom, American Income Life, Wagner Technical Services, Coinbase (sample data) [2] and Chinese Adult Forum.
Rumour has it they’ve had a little “security incident.” A cyber gang allegedly slid into VX-Underground’s DMs with screenshots of an Okta account belonging to an X employee. The internet promptly split into two camps:
- Camp A: “Holy hell, they popped Twitter again!”
- Camp B: “That’s just Photoshop with a Red Bull problem.”
Was it a breach? Was it an AI-generated fever dream? Nobody knows. But one thing’s certain: if it was real, Elon is probably already drafting a tweet blaming the woke mind virus. Time will tell.
Then we have the BBC ransomware almost-caper. This one reads like a rejected Black Mirror script. The Medusa ransomware gang tried to recruit a BBC insider, except instead of targeting someone with actual admin access, they messaged… a cybersecurity reporter. Yes, a guy who literally writes articles about ransomware. Smooth, lads.
The reporter, being a journalist (and therefore contractually obligated to stay curious), played along. Medusa dangled 0.5 BTC as a down payment and promised him 15–25% of whatever ransom they squeezed out of Auntie Beeb. “You’ll never have to work again,” they bragged.
Cute pitch. Only slight snag: laundering millions in crypto isn’t exactly as easy as cashing in your Tesco Clubcard points. And their follow-up move? Spamming the poor reporter with MFA requests in an attempt to “test something.” I mean… come on. You can’t make this stuff up. In the end, the Beeb yanked the journo’s access, Medusa went back to the drawing board, and the reporter walked away with one hell of a story.
Meanwhile, in Manchester: VAAS (Violence-as-a-Service) reared its very ugly head. Yes, you read that right, violence is now available as a subscription model. Forget “Ransomware-as-a-Service.” We’re in the age of Uber with brass knuckles.
Case in point: thugs broke into the home of an elderly woman in her 80s, beat her up, and trashed her house, all because they were looking for someone else entirely. Horrific. And all because someone, somewhere, paid for a beatdown via the dark web’s new gig economy.
Now here’s the kicker: the actual target in this case was allegedly involved in producing CSAM and zoophilia content (yes, the worst of the worst). So, was the attack “justice” or just straight-up reckless brutality? Doesn’t matter. The granny should never have been caught in the crossfire. If VAAS really wants to market itself as the cyber underworld’s new ethical enforcement service, maybe step one should be: “don’t assault pensioners.” Just saying.
So, to recap the chaos:
- Twitter might have been breached… or maybe someone just had too much fun with MidJourney.
- A ransomware gang tried to bribe a journalist, proving that even criminals can’t be bothered to do proper LinkedIn recon.
- And VAAS reminded us that the dark web’s version of Deliveroo is just as messy and morally bankrupt as you’d expect.
Honestly, the underground economy keeps finding new ways to make late-stage capitalism look boring.
Smarter Protection Starts with Awareness
Data Breach Scan, Check Any Domain for Free https://breachaware.com/scan
This months cyber spotlight, vulnerability chat & privacy headlines.
Hackers Pay for Tattoos, Cloudflare Mocked, and Ransomware Cartel Dreams.https://breachaware.com/research/hackers-pay-for-tattoos-cloudflare-mocked-and-ransomware-cartel-dreams
A total of 26 breach events were found and analysed resulting in 21,504,511 exposed accounts containing a total of 27 different data types of personal datum. The breaches found publicly and freely available included ULP Alien TxT File - Episode 22, Skyeng, LinkedIn [sample data], QQ Mail and Allianz Life.
Leaked LLM Chats, PomPompurin Sentenced, and LAPSUS$ Bows Out.
https://breachaware.com/research/leaked-llm-chats-pompompurin-sentenced-and-lapsuss-bows-out
A total of 22 breach events were found and analysed resulting in 10,974,592 exposed accounts containing a total of 31 different data types of personal datum. The breaches found publicly and freely available included ULP Alien TxT File - Episode 23, Slate and Tell, WoW Health, My Conan and Humanists Community in Silicon Valley (HCSV).
ShinyHunters’ Fake Retirement, Baphomet Returns, and New Mega-Flaws.
https://breachaware.com/research/shinyhunters-fake-retirement-baphomet-returns-and-new-mega-flaws
A total of 35 breach events were found and analysed resulting in 14,577,201 exposed accounts containing a total of 36 different data types of personal datum. The breaches found publicly and freely available included ULP Alien TxT File - Episode 24, ULP 0032, Stealer Log 0541, Yellowpages Directory and College Dekho.
Violence-as-a-Service Emerges, ShinyHunters Escalate, and New Mega-Flaws.
https://breachaware.com/research/violence-as-a-service-emerges-shinyhunters-escalate-and-new-mega-flaws
A total of 9 breach events were found and analysed resulting in 5,897,816 exposed accounts containing a total of 21 different data types of personal datum. The breaches found publicly and freely available included Bouygues Telecom, American Income Life, Wagner Technical Services, Coinbase (sample data) [2] and Chinese Adult Forum.