• XSS.stack #1 – первый литературный журнал от юзеров форума

Database access Brazil's nuclear and missile manufacturing 2024/26/october

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

Bjorka

floppy-диск
Забанен
Регистрация
18.01.2024
Сообщения
9
Реакции
0
Пожалуйста, обратите внимание, что пользователь заблокирован
We are excited to present you with an exclusive opportunity to access over 250 GB of highly sensitive data from the Brazilian website www.nuclep.gov.br. This comprehensive collection contains the most critical files, including:

Defense production
Production and extraction of nuclear materials
Military nuclear submarines
Autocad designs (3D, DWG, etc.)
Videos and photos of uranium extraction
Oil and gas data
Geographic coordinates
Employee data (emails, passwords, names, etc.)

These records reveal numerous secrets about the organization's internal operations, potentially drawing significant interest from media, government entities, and anyone interested in uncovering potential security vulnerabilities or valuable industrial insights.

To gain access to this exclusive source, simply click the "Buy" button and provide your contact information for registration. Our team will reach out to you promptly to ensure a smooth and confidential transaction process.

Don't miss out on the opportunity to uncover the hidden secrets within these 250 GB of confidential data from
www.nuclep.gov.br for just

Nuclep - Nuclebrás Heavy Equipment SA
(NUCLEP) is a Brazilian state-owned nuclear company specialized in nuclear engineering and heavy equipment for nuclear, defense, oil and gas industries.
www.nuclep.gov.br
We have more than (250GB) of NUCLEP data.
The data contains most sensitive files about:
↔️ Defense manufacturing
↔️ Nuclear manufacturing and ↔️mining
↔️ Military Nuclear
Submarines
↔️ Schemes Autocad (3D,dwg, etc..)
↔️ Videos and pictures for Uranium mining
↔️ Oil and Gas
↔️ Coordinates
↔️ Employees details (emails, passwords, names, etc..)



Access control panel: 15.000$
Database: 5000$
Total : 20,000$

Negotiations can be done by contacting the contact below

Telegram: t.me/bjorkanesiaaaa


ALL ACCESS PROOF AND DOCUMENT FILE DATABASE ARE HERE
Скрытый контент для зарегистрированных пользователей.
 
Последнее редактирование модератором:
I think many people had this access to the forti (thanks to CVE 22), and many people uploaded the date from there
But, I'm not sure that it appeared in the public, and most likely it will be different.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
yeah but i think someone else has gained access and. also maybe it wont last long but i can assure you that the access we have is the most recent access and the database of information is very recent if this is public or old. we will hack it again and lock all access for this
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Hasn't this data already been leaked?
this data is not leaked but some users try to sell it but they don't have accurate proof that they have access unlike us. see all this stuff is from meow ransomware group, and we bought it for 15,000$ and we sell it for 20k$ making a profit of 5000$ with the latest access and rarely people get it
 
не покупайте ничего у него. это старое говно, которое по любому ходит по рукам. лично мы его (этот фортик) пробивали в 2023 году, но не стали обрабатывать
 
Пожалуйста, обратите внимание, что пользователь заблокирован
не покупайте ничего у него. это старое говно, которое по любому ходит по рукам. лично мы его (этот фортик) пробивали в 2023 году, но не стали обрабатывать
Как это могло быть вашим и признать, что вы вломились туда? ты не прочитал имя ноль 7, лол, перестань утверждать, что оно твое или когда-либо взламывать его
 
this data is not leaked but some users try to sell it but they don't have accurate proof that they have access unlike us. see all this stuff is from meow ransomware group, and we bought it for 15,000$ and we sell it for 20k$ making a profit of 5000$ with the latest access and rarely people get it
I'm very skeptical about this access still being valid, but congratulations on the profit.
 
TS probably tries to impersonate BF user: https://breachforums[.]st/User-Bjorka but isn't connected with him (at least public contacts - telegram - are different).
Be careful.
 
Статус
Закрыто для дальнейших ответов.
Верх