Lawrence Abrams Profile
Lawrence Abrams

@LawrenceAbrams

Followers
18K
Following
2K
Media
314
Statuses
2K

Ransomware, Online Security, and Malware. Owner, Editor in Chief of @bleepincomputer. DM on Signal: LawrenceA.11 * https://t.co/LXVRoICs8Z

New York
Joined July 2008
Don't wanna be here? Send us removal request.
@LawrenceAbrams
Lawrence Abrams
10 hours
My scoop: PornHub extorted by ShinyHunters for the theft of over 200 million activity data records for Premium members. The data is detailed linking member's emails to what videos they watched, downloaded, and searched for. https://t.co/EwiVHyCvO1
@BleepinComputer
BleepingComputer
11 hours
🚨PornHub is being extorted by the ShinyHunters extortion group over the theft of over 200 million Premum member activity data records. Both PornHub and ShinyHunters claim the data was stolen in the recent Mixpanel breach. https://t.co/M1mrL20jYd
1
3
23
@ddd1ms
𝕯𝖒𝖎𝖙𝖗𝖞 𝕾𝖒𝖎𝖑𝖞𝖆𝖓𝖊𝖙𝖘
27 days
The rise and fall of LockBit Gang. It’s clear that FBI Newark and their partners have a solution even to the most prolific ransomware operation.
4
1
30
@BleepinComputer
BleepingComputer
2 months
The Clop ransomware gang confirmed to BleepingComputer they are behind the emails, claiming they exploited an Oracle bug to steal the data. “We not prepared to discuss details at this time. Soon all will become obvious that Oracle bugged up their core product and once again,
@BleepinComputer
BleepingComputer
3 months
Emails claim Oracle data theft in new Clop-linked extortion campaign - @LawrenceAbrams https://t.co/4LeISDNJ6Y https://t.co/4LeISDNJ6Y
5
58
160
@LawrenceAbrams
Lawrence Abrams
2 months
My scoop from earlier today. A sample shared with me had a full PDF customer engagement report.
@BleepinComputer
BleepingComputer
3 months
Red Hat confirms security incident after hackers claim GitHub breach - @LawrenceAbrams https://t.co/kEx58sDjIg https://t.co/kEx58sDjIg
1
0
4
@3xp0rtblog
3xp0rt
5 months
The XSS forum community is actively discussing the situation. However, it appears that moderators are removing all content where the admin (LARVA-27) is being discussed. This was confirmed in a Telegram chat by moderator LARVA-466 (Rehub). The goal is to suppress any narrative
@Europol
Europol
5 months
🚨 Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made €7M facilitating cybercrime. 🇫🇷🇺🇦🇪🇺 Operation led by France with Europol support. https://t.co/JQEfYiYBjF
8
39
152
@LawrenceAbrams
Lawrence Abrams
6 months
🚨 Don’t miss our upcoming BleepingComputer webinar with @specopssoftware and @SCMagazine! We'll discuss how stolen credentials and identity-based attacks have become a favorite way to break into networks. 🗓️July 9th at 2 PM ET ➡️Register here: https://t.co/AIuQIqoZLc
1
0
7
@LawrenceAbrams
Lawrence Abrams
6 months
Original leak of stolen 2021 AT&T data had three files, a MASTER file containing encrypted SSNs and date of births, and two other files mapping the encrypted data to the plain text SSNs and DOBs. The new repackaged leak adds the unencrypted SSNs and DOBs to each customer record.
0
0
3
@LawrenceAbrams
Lawrence Abrams
6 months
FYI, the repackaged AT&T data breach leak on XSS is from the 2021 breach, not the April 2024 Snowflake data theft attacks. Data matches the 2021 data leaked in March 2024. https://t.co/UuvgaxzyIb
Tweet card summary image
bleepingcomputer.com
A threat actor has re-released data from a 2021 AT&T breach affecting 70 million customers, this time combining previously separate files to directly link Social Security numbers and birth dates to...
1
2
7
@Cyber_0leg
Oleg
9 months
🚨 How was Black Basta structured? What were its members’ roles? How did its infrastructure operate? Leaked chats reveal a highly organized ransomware group with defined leadership, internal teams, and external affiliates. More in my article ⬇️ https://t.co/YJHXxf5H4n
6
70
225
@troyhunt
Troy Hunt
10 months
I’ve had a few people flag this with me as a “data breach”. It’s not, it’s authorised access. Not liking that authorisation does not make it a data breach. If one of these guys then accidentally leaks it all over the place to unauthorised parties, *then* it’s a data breach!
@KimZetter
Kim Zetter
10 months
“This is the...largest IT security breach in our country’s history.... You can’t un-ring this bell. Once these DOGE guys have access to these data systems, they can ostensibly do with it what they want.”
66
86
1K
@Blaklis_
Blaklis
10 months
https://t.co/GkKPk7WY4M is a good example to what platforms should fight against (but they do not!) : low quality hunters. Those guys are taking a lot of resources (and energy) to be managed. That lowers the quality for us all. #hackerone #bugbounty
Tweet card summary image
hackerone.com
## Summary: An open redirect vulnerability was discovered on the website https://www.xnxx.com/todays-selection/1. This issue allows attackers to modify URLs to redirect users to arbitrary external...
31
21
350
@SwiftOnSecurity
SwiftOnSecurity
10 months
Wow: USAID paid Microsoft to shut down Windows Phone because it was too secure for the CIA to spy on it
292
839
12K
@haveibeenpwned
Have I Been Pwned
11 months
New unverified breach: Data allegedly taken from Brazilian lead gen platform Speedio was posted for sale last week. It included 27M email addresses along with company names, addresses and phone numbers. 51% were already in @haveibeenpwned. Read more:
Tweet card summary image
darkwebinformer.com
A Threat Actor is Allegedly Selling the Data of Speedio
0
13
50
@BleepinComputer
BleepingComputer
11 months
Domains known to have been seized today by the FBI are: 🔴Cracked[.]io 🔴Nulled[.]to 🔴Starkrdp[.]io 🔴SellIX[.]io 🔴MySellIX[.]io While it is not confirmed, it appears that today's law enforcement action targets credential stuffing attacks and the sale of stolen accounts.
2
20
46
@LawrenceAbrams
Lawrence Abrams
11 months
My scoop from yesterday: Hacker behind PowerSchool breach claimed to steal the data of 62.4 million students and 9.5 million teachers. https://t.co/YgVfZB2wtd
Tweet card summary image
bleepingcomputer.com
The hacker who breached education tech giant PowerSchool claimed in an extortion demand that they stole the personal data of 62.4 million students and 9.5 million teachers.
3
6
12