amvinfe

@amvinfe@infosec.exchange
98 Followers
35 Following
276 Posts
Cyber security researcher and blogger
#InfoSec #DataTheft #Ransomware #DataBreachhttps://www.suspectfile.com

๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž ๐€๐ญ๐ญ๐š๐œ๐ค ๐จ๐ง ๐‹๐š๐ง๐ ๐ฅ๐ž๐ฒ ๐“๐ฐ๐ข๐ ๐  ๐‹๐š๐ฐ: ๐”๐ฉ๐๐š๐ญ๐ž๐ฌ, ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ข๐š๐ฅ ๐’๐ญ๐š๐ญ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ ๐š๐ง๐ ๐‘๐ž๐œ๐จ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐„๐ฏ๐ž๐ง๐ญ๐ฌ ๐€๐œ๐œ๐จ๐ซ๐๐ข๐ง๐  ๐ญ๐จ ๐€๐ง๐ฎ๐›๐ข๐ฌ

The incident represents one of the most complex and controversial ransomware cases in the New Zealand legal sector, particularly due to discrepancies between the timeline reported by the firm and that described by the criminal group.

https://www.suspectfile.com/ransomware-attack-on-langley-twigg-law-updates-official-statements-and-reconstruction-of-events-according-to-anubis/

#Anubis #Data_Breach #Langley_Twigg_Law #Ransomware #High_Court_of_New_Zealand #Injunctions

I may have to add Moldova to my list of countries I may not be able to visit. I just posted a two-fer involving two of their government portals:

https://databreaches.net/2026/02/19/data-protection-failures-on-moldovan-portals-exposed-citizens-to-risk/ is about a long-time IDOR incident that exposed the personal info of everyone who ever used the govt portal to apply for a job. The vulnerability was brought to my attention by a student who was frustrated with his government's lack of response to his attempts to get them to address it.

and

https://databreaches.net/2026/02/19/leaked-data-raises-questions-about-hackers-claims-and-moldovas-prior-denial/ discusses an alleged hack by Bashe Team of another portal used by Moldovan residents to apply for energy compensation.

In May 2025, the government had denied claims that access to the compensation portal had been sold. "No evidence.... smoke and mirrors... " they claimed.

Fast forward to January 2026, and data from that portal and timeframe was leaked after Bashe Team claimed to have hacked it. But while the data appear to be real, Bashe Team's claims about how and when they acquired it didn't check out.

Bashe Team seems to be allergic to telling the truth about their listings. @cloudsek noted their less-than-honest claims in 2025; DataBreaches.net notes it now, and @amvinfe has also noted it in his new reporting on #SuspectFile.

#databreach #leak #vulnerability #cariere #compensatii #govsec #cybersecurity #Bashe #APT73 #Eraleign

@campuscodi @euroinfosec @lawrenceabrams

Data Protection Failures on Moldovan Portals Leave Citizens at Risk - DataBreaches.Net

Breaches involving government entities may be politically motivated, such as the 2022 compromise of the Presidency of Moldova's email server or the 2024 comprom

DataBreaches.Net

๐ƒ๐จ๐ฎ๐›๐ญ๐ฌ ๐Ž๐ฏ๐ž๐ซ ๐๐š๐ฌ๐ก๐žโ€™๐ฌ ๐‚๐ฅ๐š๐ข๐ฆ๐ฌ: ๐“๐ž๐œ๐ก๐ง๐ข๐œ๐š๐ฅ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ ๐š๐ง๐ ๐Ž๐ฉ๐ž๐ง ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ

What emerged from this follow-up inquiry highlights significant discrepancies between the statements published on the groupโ€™s blog and the technical characteristics of the data examined. Despite our additional questions, no verifiable evidence was provided to substantiate the claims. Instead, we were told that authenticity could be confirmed through the purchase of the stolen database โ€” a proposal we firmly rejected.

https://www.suspectfile.com/doubts-over-bashes-claims-technical-analysis-and-open-questions/

#APT73 #Bashe #CloudSEK #IndianBank #IndonesianBank #LineBank #Ransomware

๐ˆ๐ง๐ฌ๐ข๐๐ž ๐๐š๐ฌ๐ก๐ž: ๐“๐ก๐ž ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐ฐ๐ข๐ญ๐ก ๐ญ๐ก๐ž ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž ๐†๐ซ๐จ๐ฎ๐ฉ ๐Š๐ง๐จ๐ฐ๐ง ๐š๐ฌ ๐€๐๐“๐Ÿ•๐Ÿ‘

#Bashe operates according to a structured hashtag#RaaS model, maintaining central control over the negotiation platform and the publication of exfiltrated data. From their statements, a centralized governance emerges: although they publicly define themselves as โ€œTeam Basheโ€ without an identifiable leadership, the group claims to act as a โ€œsingle core,โ€ maintaining full control over communication panels and affiliate activities...

https://www.suspectfile.com/inside-bashe-the-interview-with-the-ransomware-group-known-as-apt73/

#APT73 #Bashe #Interview #Ransomware

๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž ๐š๐ญ๐ญ๐š๐œ๐ค ๐š๐ ๐š๐ข๐ง๐ฌ๐ญ ๐‹๐š๐ง๐ ๐ฅ๐ž๐ฒ ๐“๐ฐ๐ข๐ ๐  ๐‹๐š๐ฐ: ๐ข๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง ๐จ๐ง๐ ๐จ๐ข๐ง๐  ๐š๐ฆ๐ข๐ ๐œ๐ฅ๐š๐ข๐ฆ๐ฌ ๐›๐ฒ ๐€๐ง๐ฎ๐›๐ข๐ฌ

According to Langley Twigg Law, the incident was detected by its security monitoring systems, which identified unauthorised activity on the firmโ€™s computer network. In response, the firm immediately engaged its IT provider and temporarily took systems offline to contain the incident.

https://www.suspectfile.com/ransomware-attack-against-langley-twigg-law-investigation-ongoing-amid-claims-by-anubis/

#Anubis #Data_Breach #Langley_Twigg_Law #Ransomware

๐๐ฎ๐›๐ฅ๐ข๐œ ๐’๐ญ๐š๐ญ๐ž๐ฆ๐ž๐ง๐ญ ๐š๐ง๐ ๐€๐ฉ๐จ๐ฅ๐จ๐ ๐ฒ

Subsequent checks confirmed the emails were part of a third-party impersonation attempt. We acted in good faith and regret any unintentional confusion.

๐€๐ฌ๐ฌ๐š๐ฎ๐ฅ๐ญ ๐จ๐ง ๐ˆ๐ง๐๐ž๐ฉ๐ž๐ง๐๐ž๐ง๐ญ ๐‰๐จ๐ฎ๐ซ๐ง๐š๐ฅ๐ข๐ฌ๐ฆ: ๐”๐ง๐Ÿ๐จ๐ฎ๐ง๐๐ž๐ ๐‹๐ž๐ ๐š๐ฅ ๐€๐ญ๐ญ๐š๐œ๐ค๐ฌ ๐จ๐ฏ๐ž๐ซ ๐ญ๐ก๐ž ๐๐ฅ๐š๐œ๐ค ๐๐š๐ฌ๐ญ๐š ๐ˆ๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง

On March 1, 2025, SuspectFile published an article on Black Basta based solely on the original, independent work of Valรฉry RieรŸ-Marchive, Editor-in-Chief of LeMagIT.

At no time did Valรฉry or SuspectFile copy from, or use, any original material by [EDITED].

It was therefore surprising that [EDITED]โ€™ law firm, [EDITED], sent SuspectFile a letter asserting copyright infringement of a [EDITED] article on Black Basta, and demanding removal of our article within 24 hours or they would request takedown of our site and monetary damages...

https://www.suspectfile.com/assault-on-independent-journalism-unfounded-legal-attacks-over-the-black-basta-investigation/

#Black_Basta #Copyright_infringement #DMCA #Legal_action #LeMagIT #Nefedov

And it's out!

Zack Whittaker and I have released our report on the pilot survey we conducted to increase awareness about threats security researchers and journalists who report on cybersecurity and cybercrime experience.

We are grateful to all those who responded to the survey and shared a bit of their experiences. Based on what we found in a pilot survey with a non-random sample, I really think we need to do a bigger study that can also do a deeper dive into some questions.

You can read the report in html or download the .pdf version:

html: https://databreaches.net/2026/02/02/under-pressure-exploring-the-effect-of-legal-and-criminal-threats-on-security-researchers-and-journalists/

pdf: https://databreaches.net/wp-content/uploads/security-researcher-journalist-threats-survey-2026.pdf

In conjunction with the release of the report, I've also added a new "Threats" category to DataBreaches.net.

You can also read some overview comments from Zack at
https://this.weekinsecurity.com/new-survey-reveals-how-security-researchers-and-journalists-experience-legal-and-criminal-threats/

My post explaining how this all started is at https://databreaches.net/2026/02/02/threats-results-of-a-pilot-survey-on-threats-and-a-new-category-on-databreaches-net/

#cybersecurity #securityresearch #legalthreats #threats #criminals #databreach #vulernabilities #malware #lawsuit #survey

@zackwhittaker @campuscodi @amvinfe @jgreig @dangoodin @GossiTheDog @lawrenceabrams @euroinfosec

Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists โ€“ DataBreaches.Net

"Dissent Doe," DataBreaches.net admin@databreaches.net Zack Whittaker, this.weekinsecurity.com this@weekinsecurity.com February 2026. [ Download .pdf version ]

DataBreaches.Net
Chile: Ducasse Comercial Limitada con ataque de ransomware y un robo de datos que contendrรญa 123GB

Ciberseguridad-Noticias- Latinoamรฉrica: Qilin ransomware habrรญa cifrado y robado informaciรณn de Ducasse Comercial Limitada Chile

๐ƒ๐จ๐ฎ๐›๐ฅ๐ž ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž ๐€๐ญ๐ญ๐š๐œ๐ค ๐‡๐ข๐ญ๐ฌ ๐‘๐ž๐ฌ๐จ๐ฎ๐ซ๐œ๐ž ๐‚๐จ๐ซ๐ฉ๐จ๐ซ๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐€๐ฆ๐ž๐ซ๐ข๐œ๐š: ๐Œ๐ž๐๐ฎ๐ฌ๐š ๐š๐ง๐ ๐๐ข๐ฅ๐ข๐ง ๐‚๐ฅ๐š๐ข๐ฆ ๐’๐ž๐ฉ๐š๐ซ๐š๐ญ๐ž ๐ˆ๐ง๐ญ๐ซ๐ฎ๐ฌ๐ข๐จ๐ง๐ฌ

Medusa provided a statement clarifying the sequence of events from their perspective: both #Medusa and #Qilin stole sensitive data and encrypted RCAโ€™s network.

https://www.suspectfile.com/double-ransomware-attack-hits-resource-corporation-of-america-medusa-and-qilin-claim-separate-intrusions/

#Data_Breach #HIPAA #RCA #Resource_Corporation_of_America

Chile's National Cybersecurity Agency launches ciberlupa to search for leaks of citizen data.

Personal Opinion:

I find ANCI's Ciberlupa incredibly useful: a Chilean "Have I Been Pwned" tool that helps people find out if their email/RUT (Chilean tax ID) has been leaked, with good privacy (strong authentication, anonymized database). But there's a critical point that can't be ignored: the risk that, in order to keep it updated and "complete," the line might be crossed at some point, and they might start buying dumps on the dark web or black markets (as has happened in other countries with law enforcement). That would be counterproductive: it would finance more data theft and lose all legitimacy. A concrete proposal: ANCI should publicly commit to strict limitsโ€”only open/published sources (Telegram, hacker forums that upload for free, CERT collaborations, reports from victims/companies). No purchases, not even for "specific investigations," in this citizen-led tool.

https://www.security-chu.com/2026/01/ciberlupa-buscador-filtraciones-de-datos-de-ciudadanos.html

#privacy #hacking #dataprotection #Chile

@PogoWasRight @campuscodi @amvinfe @zackwhittaker @jgreig @lawrenceabrams

Chile: Ducasse Comercial Limitada con ataque de ransomware y un robo de datos que contendrรญa 123GB

Ciberseguridad-Noticias- Latinoamรฉrica: Qilin ransomware habrรญa cifrado y robado informaciรณn de Ducasse Comercial Limitada Chile