Xitter doesn't pay 'content creators' well. Next time you accuse someone of baiting for engagement (or monetary reward) — look at this chart we've attached.
During our Christmas gifting session Xitter paid us $162.25. This gifting spree had an engagement rate exceeding 6%, over 5,000,000 views in total, our profile stats jumped 400%.
Our largest paycheck ever was from memeing Crowdstike during their level 9000 shitstorm driver implosion. It was $367.39.
You would need x10 our following and/or engagement to make $3,000/month. In other words, you'd need roughly 3,000,000 followers with an engagement rate of 5% — 150,000 likes and/or comments PER POST with a majority being subscribed to Xitter Blue.
This is relevant to us because one of the bunnies is actually a malware researcher
Читать полностью…vx-underground Black Mass Research Group presents: Minegrief.
tl;dr a computer worm that targets minecraft
https://github.com/blackmassgroup/minegrief
> write malware proof of concept for Black Mass III
> work on project for a few weeks
> Last Modified: September 18th, 2024
Ransomware payloads often skip over executable files to save on time and performance.
Replace every file extension on your computer with .exe, .dll, or .sys to prevent ransomware attacks.
"They'll never catch me if I'm in Israel, with this funny hat and fake moustache" — Rostislav Panev, developer and core member of Lockbit ransomware group
Читать полностью…Per BleepinComputer, a ransomware affiliate from Netwalker ransomware group has been sentenced. He has received 20 years in prison.
It appears the defacto standard in the United States judicial system for ransomware operators (based on arrests of REvil affiliates, Netwalker affiliates, etc) is roughly 20 years in prison. Previous arrests also have shown assets seized (cryptocurrency), and restitution.
Although, the restitution part would be difficult because prison pay in the United States (varying) is approx. $1.41/hour (some as low as $0.03/hr) and some ransomware affiliates owe millions in restitution to victims. This means, ideally, a high paid prisoner would have to work 709,000 hours (29,550 days, 80 years) to pay victims back if they owed $1,000,000 in restitution.
tl;dr if caught doing ransomware, the United States government will take your money, ban you from electronics, sentence you to 20 years in prison, and may you pay back millions at a rate of $1/hr
tl;dr tl;dr if caught doing ransomware, your life is ruined forever (or about 30% of your adult life, depending on how long you live, or unless you "unalive" yourself in prison)
🚨BREAKING 🚨
Lockbit ransomware group has confirmed our suspicions. Hacking is illegal and for nerds!!
https://lockbit4.com
Bernardo Quintero, the founder of VirusTotal, is releasing a book titled: "Infectado: Del Spectrum a Google, el camino de un emprendedor accidental" (in English, Infected - From Spectrum to Google, the path of an accidental entrepreneur)
It's written in Spanish, we're devastated.
> Lockbit ransomware group bought Lockbit4-dot-com through Cloudflare!
Wrong. They advertised the domain but left it available for purchase. Someone bought it. No idea who could have done such a thing.
> check emails
> email from breachedforum
> get called homosexual african american
> *scroll*
> another email from compromised italian gov email
> long manifesto
> ???
Today Lockbit ransomware group released a lengthy statement threatening Christopher Wray, the Director of the Federal Bureau of Investigation.
Except... Christopher Wray resigned yesterday.
Every single one of you is invited to our Christmas feast.
We only have 1 turkey.
It'll be difficult to split it between all 380,000 of you. We also don't have enough cups, plates, or silverware.
We also don't know where you're all going to sit... But you're invited!
This Christmas Eve we're relaxing at HQ, enjoying the Christmas classics, and drinking hot chocolate (and also cat).
A true blessing.
Song: Rudolph the Red-Nosed Reindeer
Today a bunch of YouTubers began discussing a Browser plugin called "Honey". Their discussions revolves around the investigative research of a YouTuber named MegaLag.
Commentators are referring to it as a scam. Scam in this context isn't quite accurate enough because it is deceptive to advertisers, web stores, AND consumers, but also the browser plugin itself functions fundamentally similar to malware payloads.
tl;dr plugin extension modifies cookies on page checkout to steal commission from other people. The idea in itself is so novel, we want to introduce the entire "Honey" company into Black Mass Volume III
https://www.youtube.com/watch?v=vc4yL3YTwWk
Incomplete project that will be thrown into the trash: https://pastebin.com/raw/3VYrcNYt
Читать полностью…The developer of Lockbit ransomware (and a core member) sure lived a beautiful and cozy life. He seems so happy and relaxed knowing the people using his weapon were ransoming childrens hospitals and critical infrastructure.
The United States government will be very nice to him when he's extradited from Israel (they won't be nice at all, they're going to make his life an inescapable hell).
(one of the developers of lockbit ransomware group was arrested in israel)
https://www.justice.gov/opa/pr/united-states-charges-dual-russian-and-israeli-national-developer-lockbit-ransomware-group
Conversely, we've seen information stealer malware authors receive 5 years in prison.
1. Judges fucking HATE ransomware, they will throw the book at you (slang, meaning be as harsh as possible)
2. It appears it also depends on how much you're willing to snitch and/or beg
> take nap
> wake up
> go poop
> get out of bed
> check emails
> get ICANN requests from Giorgia Meloni, 1800's Russian essayist Fyodor Dostoevsky, and 16th President of the United States Abraham Lincoln
Things are starting to add up — why did Lockbit ransomware group issue a threat to Christopher Wray, the current director of the United States Federal Bureau of Investigation? Why has it taken Lockbit ransomware group so long to release this 'Lockbit 4.0' they keep discussing? Why has it taken them so long to do... almost anything?
In August, 2024 a person named Rostislav Panev was arrested in Israel as he is believed to be a core member of Lockbit ransomware group — the programmer responsible for the development of the Lockbit payload.
Today in Israel it was announced Mr. Panev is deemed extraditable to the United States and his official hearing is schedule on January 5th, 2025 in the Jerusalem District court.
Word on the street is whoever purchased this domain may cover the website in limited edition kitty cats. This is just rumors and speculation though.
Читать полностью…Lockbit ransomware group is advertising Lockbit 4.0.
We requested access to join their platform and, because we can't pay, we are offering them 9 (nine) limited addition cat pictures.
Will this work? Will Lockbit get mad?
Find out on the next episode of Dragon Ball Z
ya im a professional malware analyst (i throw the sample in triage or virustotal and hope it tells me something)
Читать полностью…Thank you to the person who called us homosexuals from a compromised Italian government e-mail.
We haven't received an e-mail from a compromised government e-mail in a few months.