Chum1ng0 - Security Research :verified:

#Chile-, Independent Researcher covering #hacktivism, #ransomware, #cybersecurity, #leaks, and data breaches in Latin America. #LATAM

You can subscribe to my newsletter dedicated to #cybersecurity, data breaches, misconfigurations, and #hacktivism in Latin America, created & edited by @chum1ng0

Newsletter: newschu.substack.com

#misconfigurations #leak #cybersecurity #dataleak #databreach #privacy

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-24

#Ecuador:The Qilin ransomware group claims to have stolen 100GB of data from the Savings and Credit Cooperative of Public Servants of the Ministry of Education and Culture.

There is no information available regarding whether the members of the Savings and Credit Cooperative of Public Servants of the Ministry of Education and Culture of Ecuador (CACSPMEC) have been notified about the theft of personal data that allegedly occurred in this incident.

More details:

security-chu.com/2025/05/ranso

#ciberseguridad #government #cyberattack #ransomware #Qilin #LATAM #ciberseguridad #dataprotection #PII #cybersecurity #news #noticias

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-22

A stolen Facebook profile is conducting a fraudulent campaign using the image of Leonardo Farkas.

The stolen verified profile belongs to Brazilian Olympic judoka medalist Rafael Silva Baby.

Attempts to contact the medalist via Instagram were unsuccessful.

The campaign displays Russian characters in its source code, uses the design of biobiochile.cl, and requests registration details (name, surname, email, phone number).

URL: frogswitchtable.com

more details:

security-chu.com/2025/05/Perfi

#scam #Chile #fake #fraud #cybersecurity #ciberseguridad #noticias #news #LATAM

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-22

A stolen Facebook profile is conducting a fraudulent campaign using the image of Leonardo Farkas.

The stolen verified profile belongs to Brazilian Olympic judoka medalist Rafael Silva Baby.

Attempts to contact the medalist via Instagram were unsuccessful.

The campaign displays Russian characters in its source code, uses the design of biobiochile.cl, and requests registration details (name, surname, email, phone number).

URL: frogswitchtable.com

more details:

security-chu.com/2025/05/Perfi

#scam #Chile #fake #fraud #cybersecurity #ciberseguridad #noticias #news #LATAM

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-18

On April 24, the mining company Kolpa was listed on the website of the SafePay ransomware group.

πŸ‡΅πŸ‡ͺ The cybercriminal group claimed in its description that it had stolen 108 GB of data from the company.

The SafePay group leaked information on a page where it compiles all the documentation belonging to this company.

Some documents titled "Constancia de Alta del Personal en FormaciΓ³n" contain employee identification data, such as ID number (DNI), date of birth, nationality, full name, gender, marital status, phone number, email, and address.

Another document called "Data Entrega de Tarjetas Hijos."

This file exposes personal data of workers, such as ID number (DNI), names, job title, and department, as well as information about their family members, including full names of children, ID numbers, dates of birth, age, and gender.

#PII #dataleak #databreach #dataprotection #privacy #ransomware #cyberattack #Peru #cybersecurity #ciberseguridad

If you ever worked for this company, your data may be leaked on the dark web.

In Peru, the Personal Data Protection Law (Law No. 29733) requires companies to protect personal data and notify affected individuals in case of data breaches.

More details:

security-chu.com/2025/05/Miner

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-17

On April 24, the mining company Kolpa was listed on the website of the SafePay ransomware group.

πŸ‡΅πŸ‡ͺ The cybercriminal group claimed in its description that it had stolen 108 GB of data from the company.

The SafePay group leaked information on a page where it compiles all the documentation belonging to this company.

Some documents titled "Constancia de Alta del Personal en FormaciΓ³n" contain employee identification data, such as ID number (DNI), date of birth, nationality, full name, gender, marital status, phone number, email, and address.

Another document called "Data Entrega de Tarjetas Hijos."

This file exposes personal data of workers, such as ID number (DNI), names, job title, and department, as well as information about their family members, including full names of children, ID numbers, dates of birth, age, and gender.

#PII #dataleak #databreach #dataprotection #privacy #ransomware #cyberattack #Peru #cybersecurity #ciberseguridad

If you ever worked for this company, your data may be leaked on the dark web.

In Peru, the Personal Data Protection Law (Law No. 29733) requires companies to protect personal data and notify affected individuals in case of data breaches.

More details:

security-chu.com/2025/05/Miner

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-08

Here's the unlocker.exe file that the Akira ransomware contained in some of its chats with the entities I was able to analyze.

Feel free to analyze it. Best regards, your friend chum1ng0.

github.com/chum1ng0/akira-unlo

#ransomware #akira #cybersecurity #Malware #ciberseguridad #noticias #news #cyberattack

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-08

Here's the unlocker.exe file that the Akira ransomware contained in some of its chats with the entities I was able to analyze.

Feel free to analyze it. Best regards, your friend chum1ng0.

github.com/chum1ng0/akira-unlo

#ransomware #akira #cybersecurity #Malware #ciberseguridad #noticias #news #cyberattack

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-06

We identified four chats from different companies that attempted to negotiate with Akira after being attacked.

Some of these companies were still listed as victims on the group's website.

We analyzed 4 cases: 3 entities refused to negotiate, 1 entity paid $25,000 to a Bitcoin address, and the company was removed from Akira's ransomware site.

Akira's support sent a decryptor called unlocker.exe with instructions to proceed with system decryption and also provided their security report:

"Initial access to your network was purchased on the dark web. Subsequently, kerberoasting was performed, and we obtained the password hashes. Then, we extracted them and retrieved the domain administrator password."

More details:

security-chu.com/2025/05/entid

#akira #ransomware #cybersecurity #ciberseguridad #noticias #news #cyberattack

Chum1ng0 - Security Research :verified: boosted:
2025-05-05

In an effort to clarify certain aspects of the attack and the group’s strategy, SuspectFile.com submitted a series of questions to Silent, receiving direct answers that both confirm and expand upon the information published in their statement. The questions and responses will be fully reported at the end of this article.

suspectfile.com/ransomware-gro

#Infosec #Data_Breach #Ransomware #VersaNetworks #Silent

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-05

We identified four chats from different companies that attempted to negotiate with Akira after being attacked.

Some of these companies were still listed as victims on the group's website.

We analyzed 4 cases: 3 entities refused to negotiate, 1 entity paid $25,000 to a Bitcoin address, and the company was removed from Akira's ransomware site.

Akira's support sent a decryptor called unlocker.exe with instructions to proceed with system decryption and also provided their security report:

"Initial access to your network was purchased on the dark web. Subsequently, kerberoasting was performed, and we obtained the password hashes. Then, we extracted them and retrieved the domain administrator password."

More details:

security-chu.com/2025/05/entid

#akira #ransomware #cybersecurity #ciberseguridad #noticias #news #cyberattack

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-05-05

πŸ‡¬πŸ‡Ή Server exposed data from Miscorp S.A.

Miscorp was alerted about this situation, and the server is no longer exposed as of a few days ago.

The server exposed files such as: identity cards, electronic records of individual employment contracts, temporary certificates of no claims, diplomas, resumes, criminal background reports, and health cards.

Data of employees or former employees, including names, DPI, phone numbers, addresses, dates of birth, nationality, marital status, home ownership information, etc.

read more:

newschu.substack.com/p/misconf

#dataprotection #leak #leaked #cybersecurity #ciberseguridad #PII #incidentresponse #Guatemala #noticias #news #substack #LATAM

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-04-30

πŸ‡¬πŸ‡Ή Server exposed data from Miscorp S.A.

Miscorp was alerted about this situation, and the server is no longer exposed as of a few days ago.

The server exposed files such as: identity cards, electronic records of individual employment contracts, temporary certificates of no claims, diplomas, resumes, criminal background reports, and health cards.

Data of employees or former employees, including names, DPI, phone numbers, addresses, dates of birth, nationality, marital status, home ownership information, etc.

read more:

newschu.substack.com/p/misconf

#dataprotection #leak #leaked #cybersecurity #ciberseguridad #PII #incidentresponse #Guatemala #noticias #news #substack #LATAM

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-04-24

πŸ‡΅πŸ‡¦ Varela Hermanos, a liquor producer (Ron Abuelo), has been listed on the dark web by the GunRa group

πŸ”— security-chu.com/2025/04/Gunra

#ransomware #cybersecurity #cyberattack #news #noticias #panama #LATAM #ciberseguridad

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-04-22
Chum1ng0 - Security Research :verified: boosted:
2025-04-20

"Security Researchers" should know better than to make news articles about data still being publicly exposed.

The irony of talking about the risks of this data being exposed publicly while helping others finding said data for the sake of more traffic to your website is something indeed.

It gets worse when you have no clue how your source of research, that you pay $25/month subscription for, finds said exposed data.
By simply mentioning a company name in this situation you're already giving away too much information for people to find said server.

But when you mention on the article the data is still exposed and then go ahead and show the partial link to where it is hosted, a simple query on the same service you pay for will give you all you need to know. That service is actively used by hacker groups to ransom companies.

This is not an isolated case either, multiple times now I've seen @cybernews pull this stunt.

For reference the post I'm talking about: cybernews.com/security/loop-leaks-personal-data-creatives-exposed/

This is 1 of multiple instances I've seen this happen, other times I had to intervene myself to get stuff closed: databreaches.net/2024/09/26/massive-french-citizens-data-leak-exposes-95-million-records/

#cybersecurity #infosec #news #research #security #data #leak

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-04-20

The Akira ransomware group's chat with the Customs Agency Browne (browne.cl) confirms it suffered a ransomware attack.

The list of files, with the most recent dated March 24, includes directories such as HR, Clients, Purchases, Petty Cash, Special Accounts, and Work Contracts.

However, the agency has not issued any statements regarding a cybersecurity incident.

πŸ”— security-chu.com/2025/04/confi

HAPPY EASTER

#Chile #ransomware #akira #cybersecurity #cyberattack #ciberseguridad #LATAM

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-04-19

The Akira ransomware group's chat with the Customs Agency Browne (browne.cl) confirms it suffered a ransomware attack.

The list of files, with the most recent dated March 24, includes directories such as HR, Clients, Purchases, Petty Cash, Special Accounts, and Work Contracts.

However, the agency has not issued any statements regarding a cybersecurity incident.

πŸ”— security-chu.com/2025/04/confi

HAPPY EASTER

#Chile #ransomware #akira #cybersecurity #cyberattack #ciberseguridad #LATAM

Chum1ng0 - Security Research :verified: boosted:
Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-04-19

#ChileπŸ‡¨πŸ‡± : On April 19, the Akira ransomware group claimed to have stolen 37 GB of data from the Chilean customs agency Browne y Espinoza (Browne.cl) on its dark web site.

The data reportedly includes financial and personal files. The agency has not issued a statement. We are monitoring the incident.

πŸ”— security-chu.com/2025/04/Agenc

#cybersecurity #akira #ransomware #ciberseguridad #LATAM #noticias #news #cyberattack #incidentresponse

HAPPY EASTER

Chum1ng0 - Security Research :verified:chum1ng0@infosec.exchange
2025-04-19

#ChileπŸ‡¨πŸ‡± : On April 19, the Akira ransomware group claimed to have stolen 37 GB of data from the Chilean customs agency Browne y Espinoza (Browne.cl) on its dark web site.

The data reportedly includes financial and personal files. The agency has not issued a statement. We are monitoring the incident.

πŸ”— security-chu.com/2025/04/Agenc

#cybersecurity #akira #ransomware #ciberseguridad #LATAM #noticias #news #cyberattack #incidentresponse

HAPPY EASTER

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst