Lawrence Abrams
@LawrenceAbrams
Followers
18K
Following
2K
Media
314
Statuses
2K
Ransomware, Online Security, and Malware. Owner, Editor in Chief of @bleepincomputer. DM on Signal: LawrenceA.11 * https://t.co/LXVRoICs8Z
New York
Joined July 2008
My scoop: PornHub extorted by ShinyHunters for the theft of over 200 million activity data records for Premium members. The data is detailed linking member's emails to what videos they watched, downloaded, and searched for. https://t.co/EwiVHyCvO1
🚨PornHub is being extorted by the ShinyHunters extortion group over the theft of over 200 million Premum member activity data records. Both PornHub and ShinyHunters claim the data was stolen in the recent Mixpanel breach. https://t.co/M1mrL20jYd
1
3
23
The rise and fall of LockBit Gang. It’s clear that FBI Newark and their partners have a solution even to the most prolific ransomware operation.
4
1
30
The security incident at University of Pennsylvania appears to be a more extensive breach than originally stated. My scoop:
bleepingcomputer.com
A hacker has taken responsibility for last week's University of Pennsylvania "We got hacked" email incident, saying it was a far more extensive breach that exposed data on 1.2 million donors and...
0
0
5
The Clop ransomware gang confirmed to BleepingComputer they are behind the emails, claiming they exploited an Oracle bug to steal the data. “We not prepared to discuss details at this time. Soon all will become obvious that Oracle bugged up their core product and once again,
Emails claim Oracle data theft in new Clop-linked extortion campaign - @LawrenceAbrams
https://t.co/4LeISDNJ6Y
https://t.co/4LeISDNJ6Y
5
58
160
My scoop from earlier today. A sample shared with me had a full PDF customer engagement report.
Red Hat confirms security incident after hackers claim GitHub breach - @LawrenceAbrams
https://t.co/kEx58sDjIg
https://t.co/kEx58sDjIg
1
0
4
The XSS forum community is actively discussing the situation. However, it appears that moderators are removing all content where the admin (LARVA-27) is being discussed. This was confirmed in a Telegram chat by moderator LARVA-466 (Rehub). The goal is to suppress any narrative
🚨 Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made €7M facilitating cybercrime. 🇫🇷🇺🇦🇪🇺 Operation led by France with Europol support. https://t.co/JQEfYiYBjF
8
39
152
Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks - @LawrenceAbrams
https://t.co/R4kPiB7HVb
https://t.co/R4kPiB7HVb
bleepingcomputer.com
Microsoft has released emergency SharePoint security updates for two zero-day vulnerabilities tracked as CVE-2025-53770 and CVE-2025-53771 that have compromised services worldwide in "ToolShell"...
5
70
209
🚨 Don’t miss our upcoming BleepingComputer webinar with @specopssoftware and @SCMagazine! We'll discuss how stolen credentials and identity-based attacks have become a favorite way to break into networks. 🗓️July 9th at 2 PM ET ➡️Register here: https://t.co/AIuQIqoZLc
1
0
7
Original leak of stolen 2021 AT&T data had three files, a MASTER file containing encrypted SSNs and date of births, and two other files mapping the encrypted data to the plain text SSNs and DOBs. The new repackaged leak adds the unencrypted SSNs and DOBs to each customer record.
0
0
3
FYI, the repackaged AT&T data breach leak on XSS is from the 2021 breach, not the April 2024 Snowflake data theft attacks. Data matches the 2021 data leaked in March 2024. https://t.co/UuvgaxzyIb
bleepingcomputer.com
A threat actor has re-released data from a 2021 AT&T breach affecting 70 million customers, this time combining previously separate files to directly link Social Security numbers and birth dates to...
1
2
7
ShinyHunters is the threat cluster to track this year. They, or threat actors claiming to be, are behind a lot of the attacks we are seeing. https://t.co/80tJLcdWs8
bleepingcomputer.com
Google has observed hackers claiming to be the ShinyHunters extortion group conducting social engineering attacks against multi-national companies to steal data from organizations' Salesforce...
0
7
19
Looks like RansomEXX ransomware op is still around. 👋 https://t.co/IPN3o3oVPv
bleepingcomputer.com
Microsoft says the RansomEXX ransomware gang has been exploiting a high-severity zero-day flaw in the Windows Common Log File System to gain SYSTEM privileges on victims' systems.
0
2
9
🚨 How was Black Basta structured? What were its members’ roles? How did its infrastructure operate? Leaked chats reveal a highly organized ransomware group with defined leadership, internal teams, and external affiliates. More in my article ⬇️ https://t.co/YJHXxf5H4n
6
70
225
I’ve had a few people flag this with me as a “data breach”. It’s not, it’s authorised access. Not liking that authorisation does not make it a data breach. If one of these guys then accidentally leaks it all over the place to unauthorised parties, *then* it’s a data breach!
“This is the...largest IT security breach in our country’s history.... You can’t un-ring this bell. Once these DOGE guys have access to these data systems, they can ostensibly do with it what they want.”
66
86
1K
https://t.co/GkKPk7WY4M is a good example to what platforms should fight against (but they do not!) : low quality hunters. Those guys are taking a lot of resources (and energy) to be managed. That lowers the quality for us all. #hackerone #bugbounty
hackerone.com
## Summary: An open redirect vulnerability was discovered on the website https://www.xnxx.com/todays-selection/1. This issue allows attackers to modify URLs to redirect users to arbitrary external...
31
21
350
Wow: USAID paid Microsoft to shut down Windows Phone because it was too secure for the CIA to spy on it
292
839
12K
New unverified breach: Data allegedly taken from Brazilian lead gen platform Speedio was posted for sale last week. It included 27M email addresses along with company names, addresses and phone numbers. 51% were already in @haveibeenpwned. Read more:
darkwebinformer.com
A Threat Actor is Allegedly Selling the Data of Speedio
0
13
50
Domains known to have been seized today by the FBI are: 🔴Cracked[.]io 🔴Nulled[.]to 🔴Starkrdp[.]io 🔴SellIX[.]io 🔴MySellIX[.]io While it is not confirmed, it appears that today's law enforcement action targets credential stuffing attacks and the sale of stolen accounts.
2
20
46
FBI seizes domains for https://t.co/AQtlCuVu4P,
https://t.co/EUzbMJ1aSS hacking forums - @serghei
https://t.co/THqbokuvf6
https://t.co/THqbokuvf6
bleepingcomputer.com
The FBI has seized the domains for the infamous Cracked.io and Nulled.to hacking forums, which are known for their focus on cybercrime, password theft, cracking, and credential stuffing attacks.
5
73
224
My scoop from yesterday: Hacker behind PowerSchool breach claimed to steal the data of 62.4 million students and 9.5 million teachers. https://t.co/YgVfZB2wtd
bleepingcomputer.com
The hacker who breached education tech giant PowerSchool claimed in an extortion demand that they stole the personal data of 62.4 million students and 9.5 million teachers.
3
6
12