Dynadot

alert Epik Had A Major Breach

Spaceship Spaceship
Watch

Silentptnr

Domains88.comTop Member
Impact
47,106
Last edited:
33
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
His bio also says 'hacker' and he is defending the actions taken by the hackers, if they were not him, on the basis of "the info was offered to the CIA". Someone claiming to have this much knowledge about the hack itself is someone who is at least somewhat involved in it. Whether or not he commited a crime in his involvement is not something I can conclude, but he is certainly advocating for crimes here, in the same language as the notes included in at least one of the initial hack releases.
 
Last edited:
2
•••
I'm not saying Aubrey did the hack himself personally. I'm saying he is claiming to be the founder of a criminal enterprise who is claiming responsibility for the hack and parading around as someone who is at least somewhat tied to the event.

And in response to criticism is advocating crimes in this thread.
One has not only a legal but a moral responsibility to obey just laws. Conversely, one has a moral responsibility to disobey unjust laws.

So... I wanna change the laws. ;)
 
Last edited:
0
•••
One has not only a legal but a moral responsibility to obey just laws. Conversely, one has a moral responsibility to disobey unjust laws.
And what unjust laws have you disobeyed that makes it relevant to this thread, if any?

;edit now he just put "I want to change the laws" after my post
 
Last edited:
0
•••
And what unjust laws have you disobeyed that makes it relevant to this thread?
I double parked on the wrong side of the street on a Sunday morning between 4-6AM
 
0
•••
0
•••
0
•••
2
•••
Anyway I'm not a detective and can't do this work. If members of anonymous on Twitter want to continue to distance themselves from Aubrey, and his refusal to denounce past tweets or the leaking of passwords of left-wingers and non-political people in the dataset, they are free to do so.

If such people want to give info about his involvement in the hack, if any, they are also free to do so.
 
Last edited:
0
•••
I'm not saying Aubrey did the hack himself personally. I'm saying he is claiming to be the founder of a criminal enterprise who is claiming responsibility for the hack and parading around as someone who is at least somewhat tied to the event.

And in response to criticism is advocating crimes in this thread.
One persons crime is another’s bread and butter. Crime usually requires evidence of wrongdoing that gets taken to court and they decide. Your opinion on the other hand is just that. I respect that you have it, but it means nothing if you do not have evidence or experience to back it up. I have both. You may be king rich of domain speculation, but that means nothing in my world. Thanks for sharing.
 
Last edited:
2
•••
One persons crime is another’s bread and butter. Crime usually requires evidence of wrongdoing that gets taken to court and they decide. Your opinion on the other hand is just that. I respect that you have it, but it means nothing if you do not have evidence or experience to back it up. I have both. You may be king rich of domain speculation, but that means nothing in my world. Thanks for sharing.
I suggest they also research "prosecutorial discretion"
 
0
•••
0
•••
@Bravo Mod Team (or another mod, not sure if there's a way to ping you more broadly), is it possible for you to say why @shoulda9393 was just banned?
 
Last edited:
2
•••
@Bravo Mod Team (or another mod, not sure if there's a way to ping you more broadly), is it possible for you to say why @shoulda9393 was just banned?
Yes mods, tell us that. Whas that a duplicate account or we have to keep playing guessing games

Stay on topic, where is the list that was released on twitter with 24000 accounts or something like 60 pages back
 
0
•••
Yes mods, tell us that. Whas that a duplicate account or we have to keep playing guessing games

Stay on topic, where is the list that was released on twitter with 24000 accounts or something like 60 pages back
Posting that data on this forum would be like trying to decipher Mike Lindells PCAPs, except with actual evidence.
 
1
•••
Where is the list that was released on twitter with 24000 accounts or something like 60 pages back

You probably mean the Google spreadsheet with curated data from the breach, prepared by a researcher and shared with a link on Twitter. Twittter soon removed the tweet, but the spreadsheet is still in existence. It's derived work from the leaks. A lot of researchers are diving in to see how people, businesses and politics are connected, as can be seen on Twitter.
 
Last edited:
2
•••
I am asking for da link. I saw it posted here, but was on mobile and my ophone wouldnt download.

I just want to know how this hack has affected me.
 
0
•••
I am asking for da link. I saw it posted here, but was on mobile and my ophone wouldnt download.

I just want to know how this hack has affected me.

All PII data of customers, including data thought to be 'anonymized'.
 
Last edited:
0
•••
I am asking for da link. I saw it posted here, but was on mobile and my ophone wouldnt download.

I just want to know how this hack has affected me.
Check out haveIbeenPwned type in your email
 
2
•••
My emails have been hit, but one has been hit like 8 times over the years.
One i have no idea how it got nailed, i can find no link back to epik for that one
 
0
•••
Check out haveIbeenPwned type in your email

That's only one part, with the scraped whois data, afaik. But yes, 15MM people in that one, so chances are that you're in it if you do anything with domains. A lot of us are on this forum.
 
0
•••
Yeah. I have the torrent. I have seen the bulk of the unparsed stuff and some of the curated stuff. Posting it on here would require me to explain and redact more than I have time for. I feel I have explained things in the thread pretty well up to now. It is just draining to try and help people understand it and point out logical fallacies to those I am trying to help. Plus I can’t post links or pictures because I am probably on the verge of getting banned for subtly Rick rolling 9393. It is a lot of energy to put into helping people that have it all figured out. I appreciate your posts and you seem to have a good idea of the scope. I have to catch a flight to Denver to make sure people are properly mitigating risk by conducting adversarial simulations. I didn’t want to use the H word because really all it is is social engineering, which is something everyone in the breach should look out for. Make sure to carefully examine all emails, change all passwords, google vishing and smishing and prepare yourselves for the cybers. (To those who read this before I edited do not google smashing and under no circumstance whatsoever do not try to google Brony) you have been warned.
 
Last edited:
8
•••
I have to catch a flight to Denver

Stay secure. Thanks for your contributions, they are packed with relevant info to the trained eye. Do come back here.
 
Last edited:
3
•••
Stay secure. Thanks for your contributions, they are are packed with relevant info for the trained eye. Do come back here.
I am anxiously awaiting a swath of deleted posts by the time I reach my hotel. As much as this is a drain it is not half as toxic as Twitter and I can offer unsolicited advice to people that might actually need it. I wish I could be more help, but I feel disclosing too much might lead to a fun game of parallel construction.
 
3
•••
I am anxiously awaiting a swath of deleted posts by the time I reach my hotel. As much as this is a drain it is not half as toxic as Twitter and I can offer unsolicited advice to people that might actually need it. I wish I could be more help, but I feel disclosing too much might lead to a fun game of parallel construction.

A lot of good and neutral infosec and IH advice (like, nist and cert best practices) has been given to Epik in this thread. Now the question is if it gets routed to the right people within the organization.
 
0
•••
My emails have been hit, but one has been hit like 8 times over the years.
One i have no idea how it got nailed, i can find no link back to epik for that one
The amount of data that was stored, scraped and improperly secured has no doubt led to credential stuffing, concise wordlists for dictionary attacks, complex GPU cracking and maybe even neat python tools to simplify things. I miss the days of Solaris 2.0 when things were a bit easier because who the fark knew Unix in 2001. Now with Parrot or Arch, even Ubuntu there are toolboxes and automation. If Skiddy Ape can make the world believe JFK jr is gonna fly in on an American flag draped Pegasus and wipe out the blood sucking cabal without any discernible talent whatsoever we can safely assume there are 14 year olds that can change your Verizon shipping address and buy IPhones. This may seem like a rant, but this is related to this thread. If mod team wants evidence before deleting the post for the love of jackhammer Jesus, let me post links or pictures. Seriously though, white squall… Couldn’t of picked something from Scorsese or Kubrick?
 
2
•••
Back