LOCKBIT 3.0 LOCKBITSUPP? ALPHV (BLACKCAT), BLACKBASTA, FORMERLY KNOWN AS CONTI PRIOR REVIL
Jun 3rd, 24
https://www.facebook.com/mike.montgomery.7771586 THE $1 MILLION QUANTUM EXIT EXIT SCAM AS WELL AS, THE CRYPTO CURRENCY OR DIGITAL CURRENCY MONEY MULE LAUNDERING MONEY ACROSS 7 CONTINENTS BRETT JOHNSON EXPLAINS IT AS WELL AS, AIDING AND ABETTING THIS MONEY MULE https://www.instagram.com/jordansiny1?igsh=ejFxNHkwOXdhMDU2 bc1qazcm763858nkj2dj986etajv6wquslv8uxwczt 94,643 BTC AS WELL AS, LAUNDERING THE 2016 BITFINEX BITCOINS THAT IS HOW THE TATE BROTHERS BOUGHT ALL OF THE LUXURY CARS AND, WHATEVER ELSE…
A SILVER INFINITI WITH MARYLAND TAGS 8ET2343 INVOLVED WITH THE NARCOTICS TRAFFICKING...
https://www.instagram.com/casperthevapingghost?igsh=MXUyazhhaGRydXlucA==
THIS GUY WAS THE GUY WHO HIT THE MGM GRAND FOR $100 MILLION IN RANSOMWARE https://www.facebook.com/cooley5758
ANOTHER CRYPTO CURRENCY MONEY MULE AND, NARCOTICS TRAFFICKER!
THESE 3 ARE ALL LAUNDERING MONEY AS CRYPTO CURRENCY MONEY MULES
https://www.instagram.com/jordansiny1?igsh=ejFxNHkwOXdhMDU2
https://www.instagram.com/hardwhite?igsh=MTZsdnAzem1kcGFocQ==
https://www.instagram.com/keenu77?igsh=MWFsbm90MTV6MGNhNg==
AND, THE TRILLIONS THAT WERE LAUNDERED FOR OVER A DECADE AND, MOST OF THE CRYPTO CURRENCY EXCHANGES ARE FRAUDULENT OR UNETHICAL…
THAT IS ACCURATE AND, THE MONEY LAUNDERING AS WELL AS, NARCOTICS TRAFFICKING HAS BEEN COMMON AND, TRAFFICKING HUMANS INTO THE UNITED STATES OF AMERICA ???????? FROM THE SOUTHERN BORDER THAT IS WHY HE INSTRUCTED INDIVIDUALS TO RIOT AT THE CAPITAL ON JANUARY 6TH AS WELL AS, SHIPPING NARCOTICS THROUGH THE UNITED STATES POSTAL SERVICE AND, THESE ARE THE GUYS THAT BROKE THE SECRECY AGREEMENT BY SAYING DONALD J. TRUMP COMMUTED THE SILK ROAD GUYS SENTENCE THAT IT’S INSANITY AS WELL AS, ORDERING PRECURSORS TO PRESS FENTANYL PILLS AT PODCASTER JOHNNY MITCHELL’S SOUTHERN CALIFORNIA PROPERTY…
AND, CARL MARK FORCE IV WHO USES THE ALIAS OR SYNTHETIC IDENTITY AS STEPHEN ERKINTALO OR VINN ROXX HAS BEEN LAUNDERING MONEY WITH THE NARCOTICS TRAFFICKING SPECIFICALLY WITH LSD ALSO KNOWN AS, LYSERGIC ACID DIETHYLAMIDE TRAFFICKING AND, THE FOLLOWING IS PROOF https://jakartaglobe.id/news/jakarta-police-seize-2500-lsd-sheets-from-germany AND, THAT IS WHERE THE TRILLIONS CAME FROM FOR HIS IS CONTINUING CRIMINAL ENTERPRISE OTHERWISE, KNOW AS RICO THE RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS ACT OF 1970
https://www.facebook.com/drew.mcvay.5 AND, THIS GUY IS A CRYPTO CURRENCY MONEY MULE LAUNDERING CRYPTO CURRENCY THROUGH REAL ESTATE FRAUD AS WELL AS, MORTGAGE FRAUD...
A RACKETEER FOR THE COLOMBO CRIME FAMILY NOW CREATING SHELL COMPANIES ACROSS 7 CONTINENTS…
THE RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS ACT OF 1970 IT GOES WITH THE THE FOREIGN CORRUPT PRACTICES ACT (FCPA) WAS PASSED BY CONGRESS IN 1977 IN RESPONSE TO THE DISCOVERY OF BRIBERY AND ORHER MISCONDUCT ON THE PART OF MORE THAN 300 AMERICAN COMPANIES. THE ACT WAS CODIFIED IN 1988 AS AN AMENDMENT TO THE SECURITIES EXCHANGE ACT OF 1934.
LOCKBITSUPP? OR LOCKBIT RANSOMWARE
Jul 21st, 24
LOU FERRIGNO’S NEPHEW WAS BURNED AS WELL AS, SHELVED THIS IS WHY BECAUSE, HE LAUNDERED 25,113 BTC FROM THE ORIGINAL 119,756 BTC WITH JOEY MERLINO AS WELL AS, MANY OF THE OTHERS…
AND, ALL THE CARS BEING SHIPPED TO THE EUROPEAN UNION BY DOMINIC KHALEEL WHO IS ACTUALLY PABLO ESCOBAR INCLUDE THE COCAINE ROUGHLY 30,000 LBS OR 15,000 KILOS PER YEAR IT IS QUESTIONABLE AND, EMINEM IS A LIAR, A CHEATER, AND A CON JUST LIKE JAY-Z WHO IS ALSO HUMAN TRAFFICKING LIKE ANDREW TATE AND TRISTAN TATE HAVE BEEN AND, CONTINUE TO DO SO AND, AMERICAN LA COSA NOSTRA IS RECRUITING AT 61 SMITH ST. EAST STROUDSBURG, PA AND, THE INDIVIDUAL WHO ATTEMPTED TO SELL LUCKY LUCIANO’S PINKY RING IN LAS VEGAS, NV ACTUALLY STOLE IT…
SO BASICALLY, THE CIA SOFTWARE GOT INTO THE WRONG HANDS…
THAT BEING SAID I KNOW ABOUT THE WONDERLAND GANG AND, JAY-Z IS IN DEEP HE WAS THE FIRST PERSON WHO SPOKE BEHIND THE MASK IN THE “BUSINESS OF DRUGS” AND, THE ILLEGAL ARMS DISTRIBUTION IS CONTINUING AND, HAS NOT CHAMGED I AM JUST CURIOUS WHAT IS JOHN GLEESON’S CUT?
LOCKBITSUPP? OR LOCKBIT 3.0 RANSOMWARE
Jul 24th, 24
THIS WAS THE MONEY LAUNDERING THAT HAPPENED WITH CARL MARK FORCE IV AKA STEPHEN ERKINTALO AKA VINN ROXX
AND, HE WAS LAUNDERING THE CRYPTO CURRENCY WITH LOU FERRIGNO’S NEPHEW MATTHEW FERRIGNO
AND, THE BLAMED IT ON LICHENSTEIN BUT, YOU WON’T FIND THAT IN THE DOJ INDICTMENT.
AND, MR.BEAST AKA JIMMY DONALDSON AKA PETER KRUPA WAS INVOLVED WITH THE MONEY LAUNDERING OPERATION KEEP IN MIND THERE WAS 119,756 BTC AND, THE 25,113 BTC WAS USED FOR LUXURY PURCHASES OF SUPER CARS WITH COCAINE CONCEALED IN THE CARS THAT IS WHY THE ROMANIAN GOVERNMENT SEIZED THE VEHICLES.
SO THAT BEING SAID I KNOW ABOUT WONDERLAND AND, THEY ARE IN DEEP!
SO THIS ARTICLE IS A LIE BY AN ASSOCIATE OF THE COLOMBO CRIME FAMILY WHO WAS DOING MORTGAGE FRAUD WHILE, AIDING AND ABETTING THE MONEY LAUNDERING OPERATION BUT, HE BRIBED A SUPREME COURT JUSTICE TO AVOID PROSECUTION.
DDoS Attack Case Study: 20 Hours of Unprovoked Aggression
Criminal IP
Recently, there was a GET Flooding Attack–type DDoS attack case on a web services company for about 20 hours. Various attack traffic was detected on the login page, which caused a serious load on the server and ultimately paralyzed the entire login function. The CIP Team was provided with data from the attack with the cooperation of the company and analyzed the attack data with Criminal IP. (The company will remain nameless, but all data is real.)
Some of the received data from a web services company
Some of the received data from a web services company
More than Half of IP Addresses Identified as Malicious
Following a thorough analysis of the DDoS attack case, our findings indicate that out of the 6,972 IP addresses used, a staggering 63% (4,402) were categorized as Dangerous or Critical.For reference, Criminal IP (https://www.criminalip.io) defines any inbound IP addresses detected as Dangerous or Critical to be blocked.
Criminal IP Score result of 6,972 IP addresses used in the DDoS attack
Criminal IP Score result of 6,972 IP addresses used in the DDoS attack
SMB Worm Infected IP Addresses Used in the Attack
What we first noticed from this DDoS attack case is that the vast majority of the IP addresses were classified as Scanner. As shown in the image, SMB negotiation was requested from this IP address on June 21, 2022 at 3:35 pm and again on July 8, 2022 at 8:52 pm. These requests indicate that the IP address was infected with an SMB worm and was periodically performing SMB scanning. SMB is a file/printer sharing protocol, which allows computers with assigned network names and IP addresses to communicate via NetBIOS running over NBT protocol. Once hackers identify that SMB ports are open and successfully negotiate with the target system, they may attempt to use brute force attacks to obtain personal information from the PC and access the server IP. That’s why hackers are frequently scanning open SMB ports worldwide.
Because these IP addresses are infected by malicious codes, they can initiate other cyber attacks under the command of other than SMB Worm like C2 servers. The corresponding IP address’ various malicious traces were found as it was categorized into KISA’s DDoS IP, Fail2ban’s Brute force IP, and even spam mail in the IP Address Category section.
Search result of an IP address categorized as "Scanner" among those used in DDoS attacks.
Search result of an IP address categorized as “Scanner” among those used in DDoS attacks.
IP Address Category that displays the malicious history of an IP address from the DDoS attack case.
IP Address Category that displays the malicious history of an IP address from the DDoS attack case.
Conducting DDoS Attack Through Remote Control IP Address
IP addresses that were classified as Remote on Criminal IP (https://www.criminalip.io) are those with open ports 22 (SSH) and 3389 (RDP). Once a hacker infects a server, the hacker controls the server’s IP address with commands to run C2 malicious codes or remote control protocols. For example, the IP address 180.xxx.xxx.194 is running an OpenSSH protocol on port 22, but it has known security vulnerabilities, including CVE-2021-41617 and CVE-2021-36368. In fact, a total of 12 vulnerabilities have been mapped to this version of OpenSSH.The hacker might have installed OpenSSH after infecting the IP address, as well. Alternatively, the hacker might have exploited OpenSSH vulnerabilities already exposed to the attack surface to penetrate and dominate the server. With various methods available to the attackers, they can control this IP address by issuing different commands through OpenSSH. In addition, myriads of IP addresses with exposed ports 23 (telnet) and 3389 (RDP) were also identified.
An IP address with open port 22 (SSH) and 3389 (RDP), classified as a remote host
An IP address with open port 22 (SSH) and 3389 (RDP), classified as a remote host
OpenSSH protocol vulnerability found on IP addresses used for DDoS attacks. Mapped to 12 vulnerabilities including CVE-2021-41617 and CVE-2021-36368.
OpenSSH protocol vulnerability found on IP addresses used for DDoS attacks. Mapped to 12 vulnerabilities including CVE-2021-41617 and CVE-2021-36368.
Automated Password Attack with Bypassed (VPN, Tor, Proxy) and Server’s IP Address
Many of the IP addresses from the DDoS attack case were associated with Hosting, VPN, Tor, and Proxy. It can be assumed that the attacker utilized technology to hide and bypass the actual IP address. In recent days, especially, there have been numerous patterns in which attackers use VPN to hide IP addresses in an attempt for login attacks or Fraud. It wouldn’t be surprising to see them using Proxy or Tor IP for bypassing purposes as well.
It is worth taking closer eyes on IP addresses used for hosting as well. Normally, the IP address used to log in is either a mobile, home, or office IP address. If login or sign up was done through hosting servers like AWS, Azure, or Tencent Cloud, it can be considered as a part of an automated attack. Therefore, it is necessary to examine whether the incoming IP is a hosting address when analyzing Brute Force Attack or Get Flooding Attack.
The following is a statistic that categorizes the IP addresses used in this DDoS attack by whether they are Remote, VPN, Proxy, Tor, and Hosting IP addresses, on Criminal IP. Despite the remote IP address taking up the most, we can see that VPN, Proxy, Tor and Hosting IP addresses account considerably as well.
* Dirty Count = Number of IPs scored more than or equal to Dangerous / De-Duplication for the Total number
IP Category Count Dirty Count
Hosting 518 169
VPN 2,019 1,485
Tor 518 517
Proxy 2,120 1,338
Remote 6,966 4,398
Total - 4,402
A pie chart of Remote, VPN, Proxy, Tor, and Hosting IP addresses from the DDoS attack case.
A pie chart of Remote, VPN, Proxy, Tor, and Hosting IP addresses from the DDoS attack case.
Details on Nation and Hosting Server
Looking at where these IP addresses came from, most came from Indonesia, with a total of 773 IP addresses, followed by the United States, China, and Russia. According to the ISP’s statistics by country, the majority of the companies listed in the Top 10 are Chinese companies. For the United States, the ISP ranking was lower compared to the number of IP addresses they have as the ISP is dispersed to various companies. A key finding from this analysis is that hosting servers provided by Hangzhou Alibaba, which is ranked 4th in the list, are infamous for being used as malicious servers in China.
Top 10 Country
Top 10 ISP
Detecting 99% of DDoS Attack Cases with IP Intelligence
Simply looking at the scoring on detected IP addresses on Criminal IP, 4,402 IP addresses, which amounts to 63.1% of the used addresses, were identified as Critical and Dangerous. Even if the address was diagnosed as Low or Moderate, 36.6% of them were VPN, Proxy, or Tor IP addresses that are likely to bypass, or hosting server IP addresses expected to be automated attacks. In other words, if IP addresses are filtered out by Critical, Dangerous, VPN, Proxy, Tor and Hosting, 99.7% of them are determined to be risky addresses in terms of IP Intelligence.
Malicious diagnostic statistics on IP addresses used in DDoS Attack, classified through IP intelligence
Malicious diagnostic statistics on IP addresses used in DDoS Attack, classified through IP intelligence
We can’t conclude that any IP addresses categorized into the likes of VPN and Proxy are 100% malice. However, there are many signs of vulnerability or usage in attacks among IP addresses in the category. Therefore, it is necessary to check the behavior of the bypass IP addresses as well. For more effective detection of all kinds of brute force attack, we suggest examining which type of IP addresses are logging in or signing up (whether they use VPN, Tor, or Proxy, or are from a hosting server) rather than merely responding to IP addresses with malicious history.
We have previously published a report on analyzing attack patterns and IP addresses with Log4j attack traffic data from Criminal IP Honeypot when the Log4j zero-day vulnerability was released, so make sure to check it out.
AND, MICHEAL GALLUP WAS SELLING NARCOTICS FOR THESE INDIVIDUALS.
NFL star mysteriously RETIRES at just 28 and just three months after signing a $3million contract
By Jake Nisse 16:43 24 Jul 2024, updated 17:27 24 Jul 2024
Michael Gallup played all 17 games for the Cowboys last season at WR
READ MORE: Tom Brady could make another retirement return, claims NFL star
NFL receiver Michael Gallup has retired after six seasons - and only three months removed from signing a deal worth up to $3million.
Gallup, a third-round draft pick in 2018, played his entire career with the Dallas Cowboys, totaling 3,744 yards and 21 touchdowns.
But after signing with the Raiders in free agency, Gallup has decided to hang his cleats up before training camp.
Clarence Hill Jr., who covers the Cowboys for the Fort Worth Star-Telegram, wrote on X that Gallup's 'heart was no longer in it.'
The 28-year-old's best season was his sophomore campaign in 2019, when he notched 1,107 receiving yards and six touchdowns.
Michael Gallup, 28, has decided to walk away from the NFL after six seasons with the Cowboys
Gallup, seen playing in 2022, finished his career with 21 receiving TDs for the Cowboys
However, his production would tail off as he battled injuries, including an ACL tear in January 2022.
He was released by the Cowboys in March after failing to top 500 receiving yards in three consecutive years. Hill added on X that he was 'sure' Gallup wanted to remain in Dallas.
Gallup's health held up last season, as he appeared in every game for Dallas, but he's apparently had enough.
He hasn't said much publicly about his decision, though he reposted two congratulatory Instagram stories from former Cowboys teammate CeeDee Lamb.
'Nothing but love this way kid,' he wrote to Lamb in one.
Gallup signed a five-year, $57.5million deal with Dallas in 2022, with $27million in total guarantees.
DISPOSSESSOR A LOCKBIT REBRAND AND, LOCKBITSUPP? LOCKBIT RANSOMWARE
Jul 28th, 24
https://www.instagram.com/jordansiny1?igsh=ejFxNHkwOXdhMDU2
https://m.facebook.com/1479681198/
THESE 2 HACKED THE BOEING AIRLINES AND, THEN LAUNDERED THE FOLLOWING ADDRESSES IN 2018 FOR THE WONDERLAND GANG!! JORDAN MAX ABRAMS AND, DOMINIC ANTHONY KHALEEL PART OF A MUCH LARGER ISSUE WITHIN’ THE AGENCIES OR IC.
1439q4Na8v88kPBqoyg8F4ueL9SYr8ANWj
155FsTtEFq4eGCcBxDseuwLKPbmtWbyHJR
16W4XcUAKPmSES9MiUCio28msSCp8rDZgs
18KDS3q6a4YV9Nn8jcyMvNoVPfcrfemeag
1AZu7TQmKBAes2duNDctYwjAB9nhHczUnA
1B6kJM75iu5ty1HAHMMz6tT1HhjoGNTCa9
1CRjKZJu8LvTutnSKq4zTJ4yiqrzMAArYW
1EiiKCCnFgHjEvPZdu29qqgdBm8zTvpU3U
1EK8vW7UYaYHKiW4TZmYJKtwcZLM14VjvP
1Fu4YgM3Y9CxvioGPqkSzkydAC8MVaPN1D
1Hm6XDmhKCHz68wDEYTapN9MEanke8iwUk
1LXi3x7hyt17cxncscGE887WCrC6XDNZ4P
THEY ALSO WITHHELD INFORMATION ABOUT THE ATTEMPTED TRUMP ASSASSINATION
THAT BEING SAID THE ASSASSINATION ATTEMPT ON ANY POLITICAL FIGURE, INCLUDING DONALD TRUMP, TRANSCENDS POLITICS AND TOUCHES ON BROADER ISSUES OF NATIONAL SECURITY, PUBLIC SAFETY, AND THE STABILITY, OF DEMOCRATIC INSTITUTIONS. SUCH ACTIONS THREATEN THE FABRIC OF SOCIETY AND RAISE SERIOUS QUESTIONS ABOUT EXTREMISM, VIOLENCE, AND THE RESPONSIBILITY OF CITIZENS, TO ENGAGE IN CIVIL DISCOURSE. ADDRESSING THESE THREATS, REQUIRES A COLLECTIVE RESPONSE THAT UPHOLDS DEMOCRATIC VALUES AND, THE RULE OF LAW.
IT IS SAD ???? WHAT HAPPENED AND, THE SAME GOES WITH THE EXTREMISM THAT OCCURRED ON JANUARY 6TH AND, BOTH COULD HAVE BEEN PREVENTED…
SO IS https://mphclub.com A SHELL COMPANY FOR THE WONDERLAND GANG.
AND, THOSE INDIVIDUALS ALSO PARTICIPATED IN THE MONEY LAUNDERING OF 119,756 BTC WHERE 25,113 BTC DISAPPEARED AND, THESE ARE THE REMAINING 94,643 BTC
Bitfinex Money Laundering 119,756 BTC
Aug 2nd, 24
Aubrey Cottle
Born April 6, 1987
Nationality Canadian
Other names Kirtaner, Kirt
Occupation(s) Forum administrator, member of hacking group(s)
Years active 2008–present
Known for Early member of Anonymous
Founder of 420chan
Website phisher.io Edit this at Wikidata
Aubrey Cottle (born April 6, 1987),[1] also known as Kirtaner or Kirt, is a Canadian website forum administrator who claims to be an early member of the hacktivist group Anonymous.[2] Cottle was involved with Anonymous during the late 2000s and in its resurgence beginning in 2020, in which the group attempted to combat the far-right conspiracy movement QAnon.[3]
Cottle is the founder of the now-defunct forum-image site 420chan and its sister-site Taima.tv, which majorly consisted of imageboards about pro wrestling (where its board was known as "/wooo/", which spawned the /wooo/tube station on Taima.tv), recreational drug use, and LGBT+ and transgender topics.
History
Early years
Cottle was an active user of 4chan and Something Awful in the mid-2000s, where he and others began collectively referring to themselves as "Anonymous", due to the 4chan moniker of the same name. During this time Anonymous began trolling and "raiding" other websites, online games and chat rooms, as well as black-hat hacking: targeting Hal Turner, The Church of Scientology and others.[4] 4chan ultimately curtailed raiding from their platform, resulting in Cottle and others migrating to Cottle's website 420chan, an imageboard with a focus on drug culture, LGBT discussion, and raiding.[1]
According to Cottle, upon being photographed by Scientologists during the 2008 Project Chanology rally, he began fearing for his family's safety. According to Cottle, he tried unsuccessfully to "shut down" Anonymous after this incident, and so attempted to generate bad press for the group so that they would lose public support.[4] During a 2021 interview with Vice News, he claimed responsibility for the group's 2008 attack on the Epilepsy Foundation's website,[4] where Anonymous members flooded the forum with flashing animations to trigger seizures in those with photosensitive or pattern-sensitive epilepsy.[5] Cottle later expressed remorse for the attack.[4]
Cottle said in a 2021 interview that he retired for "a number of years", and was not continuously involved with Anonymous since its creation.[4] During this period Cottle turned to software engineering contract work.[3]
2020 re-emergence
Beginning with a series of arrests in 2009–2011, Anonymous' notoriety began to fade, and by 2018 the group had largely left the public spotlight.[6][7] However, in 2020 Anonymous re-emerged following the George Floyd protests, performing the June 2020 BlueLeaks breach in which they publicly released a large amount of hacked U.S. law enforcement data.[8][9] Reuters named Cottle as one of those responsible for the group's presence on Twitter.[10]
In August 2020, Cottle identified himself as a founder of Anonymous in an article by Dale Beran in The Atlantic.[1] Cottle said in a November 2020 Reddit AMA that "right now my only end-goal is bringing the QAnon game to a conclusion".[3] The previous month, he had been one of the anti-QAnon researchers who exposed connections between QAnon figure Jim Watkins and domain names suggesting connections to child pornography.[11]
In November 2020, Cottle was responsible for exploiting security flaws in Parler, a social networking service popular with the right wing, to spoof posts to appear as though they were from a verified account belonging to Ron Watkins. In the posts, Watkins appeared to expose his father, Jim Watkins, as "Q", the anonymous poster at the center of the QAnon conspiracy theory.[12] Around this time, Cottle exposed Parler user data by exploiting a flaw in a third-party vendor, which granted him access to Parler's email newsletter database.[13] In January 2021, Cottle exposed email logs from a company called Is It Wet Yet, which belongs to Jim Watkins[10][14] and serves as the parent company for 8chan, an imageboard described as the "home" of QAnon.[14][15] These leaked logs allowed researchers to analyze Watkins's connections with other figures involved with the QAnon conspiracy movement.[14] In August 2021, Cottle and open source intelligence analyst Libby Shaw were among the researchers who exposed the developer behind QAlerts, an app used by QAnon adherents to read posts from the anonymous "Q".[16]
In February 2022, Aubrey Cottle claimed responsibility for a hack on Christian crowdfunding website GiveSendGo, which was hosting a fundraiser for the Canada convoy protest. The hack released donor's names, personal information, and donation amounts for all the campaigns on the website. After he claimed responsibility, it was revealed he had been threatened with murder.[17][18]
Sakura Samurai
In 2020, Cottle joined the white hat hacking group Sakura Samurai, and was involved in the January 2021 disclosure of a United Nations breach, which exposed more than 100,000 private employee records.[19] In August 2021, Cottle and other Sakura Samurai members helped to validate a vulnerability with Ford's website, exposing company records and enabling malicious account takeovers.[20] Cottle left Sakura Samurai later that month,[21] saying he wished to avoid "entanglements" pertaining to his other activities.[22]
References
Beran, Dale (August 11, 2020). "The Return of Anonymous". The Atlantic. Archived from the original on August 11, 2020. Retrieved September 26, 2021.
Harwell, Drew; Allam, Hannah; Merrill, Jeremy B.; Timberg, Craig (September 25, 2021). "Fallout begins for far-right trolls who trusted Epik to keep their identities secret". The Washington Post. ISSN 0190-8286. Archived from the original on September 25, 2021. Retrieved September 25, 2021.
Langlois, Shawn (November 2, 2020). "Founder of hacker group Anonymous reveals his ultimate 'end-game'". MarketWatch. Archived from the original on November 2, 2020. Retrieved September 26, 2021.
Cottle, Aubrey (September 21, 2021). ""I Left Anonymous. Now I'm Back"" (Interview). Vice – via YouTube.
Poulsen, Kevin (March 28, 2008). "Hackers Assault Epilepsy Patients via Computer". Wired. Retrieved September 26, 2021.
Gilbert, David (November 2, 2016). "Is Anonymous over?". Vice. Vice Media. Retrieved September 26, 2021.
Griffin, Andrew (August 7, 2018). "Anonymous promises to uncover the truth behind 'QAnon' conspiracy theory". The Independent. Retrieved September 26, 2021.
Griffin, Andrew (June 1, 2020). "'Anonymous' is back and is supporting the Black Lives Matter protests". The Independent.
Molloy, David; Tidy, Joe (June 1, 2020). "The return of the Anonymous hacker collective". BBC News. Archived from the original on June 1, 2020.
Menn, Joseph (March 25, 2021). "New wave of 'hacktivism' adds twist to cybersecurity woes". Reuters. Retrieved September 26, 2021.
Vicens, AJ; Breland, Ali (October 29, 2020). "QAnon Is Supposed to Be All About Protecting Kids. Its Primary Enabler Appears to Have Hosted Child Porn Domains". Mother Jones. Retrieved October 31, 2020.
Harwell, Drew; Lerman, Rachel (November 23, 2020). "Conservatives grumbling about censorship say they're flocking to Parler. They told us so on Twitter". The Washington Post. Archived from the original on November 24, 2020. Retrieved November 24, 2020.
Rothschild, Mike (December 11, 2020). "Why 8kun's former admin is at war with right-wing star Dan Bongino". The Daily Dot. Archived from the original on December 11, 2020. Retrieved September 26, 2021.
Bevensee, Emmi; Aliapoulios, Max (January 7, 2021). "Exposed Email Logs Show 8kun Owner in Contact With QAnon Influencers and Enthusiasts". bellingcat. Archived from the original on January 7, 2021. Retrieved September 26, 2021.
Rothschild, Mike (December 11, 2020). "Why 8kun's former admin is at war with right-wing star Dan Bongino". The Daily Dot. Archived from the original on December 11, 2020. Retrieved December 12, 2020.
Goforth, Claire (September 16, 2021). "How an Oath Keeper brought QAnon to the masses". The Daily Dot. Archived from the original on September 16, 2021. Retrieved September 26, 2021.
"GiveSendGo Hacker Faces Death Threats for Leaking 'Freedom Convoy' Donor Info". www.vice.com. February 17, 2022. Retrieved February 22, 2022.
Hopper, Tristin (February 17, 2022). "FIRST READING: The ugly witch hunt for Freedom Convoy donors". National Post. Retrieved February 22, 2022.
Sharma, Ax (January 11, 2021). "United Nations data breach exposed over 100k UNEP staff records". BleepingComputer. Archived from the original on January 11, 2021. Retrieved September 26, 2021.
Howard, Phoebe Wall (August 17, 2021). "Friendly hackers save Ford from potential leak of employee, customer data". Detroit Free Press. Archived from the original on August 17, 2021. Retrieved September 26, 2021.
Aubrey Cottle [@ThatNotoriousK] (August 22, 2021). "I'm going to take a moment to let everyone know, I am as of today, taking a multi-month sabbatical from Sakura Samurai. I'm not gone forever... I'd started work with the gang, before other, more urgent matters that brought me out here had been resolved to my liking" (Tweet) – via Twitter.
Aubrey Cottle [@ThatNotoriousK] (August 23, 2021). "I'm stepping away so there will be no entanglements or potential issues as it pertains to my other... work. Duty calls. I have business I need to finish. I'll be home sooner or later. ;)" (Tweet) – via Twitter.
SCATTERED SPIDER ????? LOCKBIT RANSOMWARE
Aug 19th, 24
https://www.facebook.com/jordan.abrams.75
https://www.instagram.com/jordansiny1
ANOTHER STRAW BIDDER
ACCESS CONTROL POINT PROGRAM
FedBizOpps
2019-02-21
This is a SOURCES SOUGHT notice. The Government is seeking to identify qualified sources under North American Industry Classification System (NAICS) code 237310 "Highway, Street, and Bridge Construction". The small business size s
I GUESS THE OTHERS INVOLVED WITH AIDING AND ABETTING THE WONDERLAND GANG ARE WORKING ON THIER NEXT INDICTMENT; BECAUSE THE INDIVIDUALS WHO PARTICIPATED IN THE SCHEME WHICH, ULTIMATELY LED TO THE ATTEMPTED ASSASSINATION OF A FORMER PRESIDENT!
IT IS TRULY SAD ???? WHAT HAPPENED I WAS RAISED WITH CHARACTER AND, VALUES AND, THE WAY I SEE IT AN ATTACK ON A FORMER PRESIDENT IS AN ATTACK ON AMERICA ????????
THAT BEING SAID THE ASSASSINATION ATTEMPT ON ANY POLITICAL FIGURE, INCLUDING DONALD TRUMP, TRANSCENDS POLITICS AND TOUCHES ON BROADER ISSUES OF NATIONAL SECURITY, PUBLIC SAFETY, AND THE STABILITY, OF DEMOCRATIC INSTITUTIONS. SUCH ACTIONS THREATEN THE FABRIC OF SOCIETY AND RAISE SERIOUS QUESTIONS ABOUT EXTREMISM, VIOLENCE, AND THE RESPONSIBILITY OF CITIZENS, TO ENGAGE IN CIVIL DISCOURSE. ADDRESSING THESE THREATS, REQUIRES A COLLECTIVE RESPONSE THAT UPHOLDS DEMOCRATIC VALUES AND, THE RULE OF LAW.
AND, ONCE AGAIN IT IS SAD ???? WHAT HAPPENED AND, THE SAME GOES WITH THE EXTREMISM THAT OCCURRED ON JANUARY 6TH AND, I TRULY BELIEVE THAT BOTH COULD HAVE BEEN PREVENTED…
THIS IS ONE OF THE INDIVIDUALS WHO WAS A STRAW BIDDER ON BEHALF OF AEY INC. THAT WAS DISBARRED IS IT TRUE INDIVIDUALS WITHIN’ THE FSB WERE SECRET INVESTORS PART OF THE RUSSIAN ???????? SPY RING AND, THIS WAS THE HANDLER https://www.facebook.com/profile.php?id=100009883725306&mibextid=LQQJ4d
AKA THE BAG MAN…
THERE IS MULTIPLE MOLES WITHIN’ THE AGENCY OPERATING AS DOUBLE AGENTS…
THE SCATTERED SPIDER RANSOMWARE
Aug 22nd, 24
THIS INDIVIDUAL IS BELIEVED TO BE OPERATING ON BEHALF OF THE FSB IN RUSSIA AS WELL AS, THE OTHERS NOT MENTIONED
https://www.facebook.com/jordan.abrams.75
ANOTHER STRAW BIDDER
ACCESS CONTROL POINT PROGRAM
FedBizOpps
2019-02-21
This is a SOURCES SOUGHT notice. The Government is seeking to identify qualified sources under North American Industry Classification System (NAICS) code 237310 "Highway, Street, and Bridge Construction". The small business size s
I GUESS THE OTHERS INVOLVED WITH AIDING AND ABETTING THE WONDERLAND GANG ARE WORKING ON THIER NEXT INDICTMENT; BECAUSE THE INDIVIDUALS WHO PARTICIPATED IN THE SCHEME WHICH, ULTIMATELY LED TO THE ATTEMPTED ASSASSINATION OF A FORMER PRESIDENT!
IT IS TRULY SAD ???? WHAT HAPPENED I WAS RAISED WITH CHARACTER AND, VALUES AND, THE WAY I SEE IT AN ATTACK ON A FORMER PRESIDENT IS AN ATTACK ON AMERICA ????????
THAT BEING SAID THE ASSASSINATION ATTEMPT ON ANY POLITICAL FIGURE, INCLUDING DONALD TRUMP, TRANSCENDS POLITICS AND TOUCHES ON BROADER ISSUES OF NATIONAL SECURITY, PUBLIC SAFETY, AND THE STABILITY, OF DEMOCRATIC INSTITUTIONS. SUCH ACTIONS THREATEN THE FABRIC OF SOCIETY AND RAISE SERIOUS QUESTIONS ABOUT EXTREMISM, VIOLENCE, AND THE RESPONSIBILITY OF CITIZENS, TO ENGAGE IN CIVIL DISCOURSE. ADDRESSING THESE THREATS, REQUIRES A COLLECTIVE RESPONSE THAT UPHOLDS DEMOCRATIC VALUES AND, THE RULE OF LAW.
AND, ONCE AGAIN IT IS SAD ???? WHAT HAPPENED AND, THE SAME GOES WITH THE EXTREMISM THAT OCCURRED ON JANUARY 6TH AND, I TRULY BELIEVE THAT BOTH COULD HAVE BEEN PREVENTED…
HOW THE FRAUD WORKS IN RELATION TO THE FRAUDULENTLY OBTAINED FEDBIZOPPS CONTRACTS IS THAT 35% GOES TO THE ADVERSARY THEN 35% GOES TO THE SHELL COMPANY THAT WAS CREATED AND, 30% GOES TO THE STRAW BIDDERS!
SO LAUNDERING $10 TRILLION DOES NOT HAPPEN BY ACCIDENT.
212,000 BTC WAS ABLE TO BE LAUNDERED THE FOLLOWING ADDRESSES 50,000 BTC WAS LAUNDERED IN 2018 IN 25 HARDWARE WALLETS FOR THE WONDERLAND GANG AND, THEN ANOTHER 162,000 BTC WAS LAUNDERED IN 2024 SO THE KRYPTALL K-iPHONE RECORDINGS TELLS A STORY OF THE CULTURE AT THE UNITED STATES IC
MTGox cold wallet adresses:
1439q4Na8v88kPBqoyg8F4ueL9SYr8ANWj
155FsTtEFq4eGCcBxDseuwLKPbmtWbyHJR
16W4XcUAKPmSES9MiUCio28msSCp8rDZgs
18KDS3q6a4YV9Nn8jcyMvNoVPfcrfemeag
1AZu7TQmKBAes2duNDctYwjAB9nhHczUnA
1B6kJM75iu5ty1HAHMMz6tT1HhjoGNTCa9
1CRjKZJu8LvTutnSKq4zTJ4yiqrzMAArYW
1EiiKCCnFgHjEvPZdu29qqgdBm8zTvpU3U
1EK8vW7UYaYHKiW4TZmYJKtwcZLM14VjvP
1Fu4YgM3Y9CxvioGPqkSzkydAC8MVaPN1D
1Hm6XDmhKCHz68wDEYTapN9MEanke8iwUk
1LXi3x7hyt17cxncscGE887WCrC6XDNZ4P
MTGox cold wallet BCH adresses:
1439q4Na8v88kPBqoyg8F4ueL9SYr8ANWj
155FsTtEFq4eGCcBxDseuwLKPbmtWbyHJR
16W4XcUAKPmSES9MiUCio28msSCp8rDZgs
18KDS3q6a4YV9Nn8jcyMvNoVPfcrfemeag
1AZu7TQmKBAes2duNDctYwjAB9nhHczUnA
1B6kJM75iu5ty1HAHMMz6tT1HhjoGNTCa9
1CRjKZJu8LvTutnSKq4zTJ4yiqrzMAArYW
1EiiKCCnFgHjEvPZdu29qqgdBm8zTvpU3U
1EK8vW7UYaYHKiW4TZmYJKtwcZLM14VjvP
1Fu4YgM3Y9CxvioGPqkSzkydAC8MVaPN1D
1Hm6XDmhKCHz68wDEYTapN9MEanke8iwUk
THEY ALSO WITHHELD INFORMATION ABOUT THE ATTEMPTED TRUMP ASSASSINATION
THAT BEING SAID THE ASSASSINATION ATTEMPT ON ANY POLITICAL FIGURE, INCLUDING DONALD TRUMP, TRANSCENDS POLITICS AND TOUCHES ON BROADER ISSUES OF NATIONAL SECURITY, PUBLIC SAFETY, AND THE STABILITY, OF DEMOCRATIC INSTITUTIONS. SUCH ACTIONS THREATEN THE FABRIC OF SOCIETY AND RAISE SERIOUS QUESTIONS ABOUT EXTREMISM, VIOLENCE, AND THE RESPONSIBILITY OF CITIZENS, TO ENGAGE IN CIVIL DISCOURSE. ADDRESSING THESE THREATS, REQUIRES A COLLECTIVE RESPONSE THAT UPHOLDS DEMOCRATIC VALUES AND, THE RULE OF LAW.
IT IS SAD ???? WHAT HAPPENED AND, THE SAME GOES WITH THE EXTREMISM THAT OCCURRED ON JANUARY 6TH AND, BOTH COULD HAVE BEEN PREVENTED…
Mt. Gox Wallet Addresses
1LS5EFRRMDgMQusW6zokQUHjzNUfy6HHCQ
1KFDUSZuapMv7YaDmL6cyrHTQhma1MtFYs
1LLc8aA9C9LLULGbYCYSFKXgxKP2DXdCqP
1LueUjEuBgc7cQhsWT8zAfTjcWmrNBZXaR
1JztCg7eKSkb1vi7NzGJynXpLZmoaFtYud
1MvpYtqgBH7CXbTutrSVCTNHPzm9vakuRy
1Mm9brripN4RPTzkGnRrbt5uDWdqbfk2iX
1Pq7hooZbEAz5y3QMnqFY8C5xqTdrjUwcA
1MPJJzRaT8vLhowNB4dVyWRxxu79dq7WkB
1PRXQEoL8vzEzoJJ9hbtAP6NaV2daccAUn
1NA3Tj4b1jtx9eGELe31Jw4DrzTqKP3ayH
1LzwbLgdKd4eFLkpRdeajkH1YJkVCip2zj
1PxGTuJzDx1ceFHx4Z5CHaWuhiPBNovmZD
1MkyfwJf7uhWTmVGGQXfcT5ip31DoHMxsz
1N5X4kcZ56uRh24XrZoztS9Vb8G7j1Joop
1JVU43LNKXqa9W5fCh8tppxDDEWgfeNg46
1HzEPuenagLEWj68igDXBBXrzc293RuR5V
1JVmoJT3471FjsX5H4hAeR1RyrDgpkHbpm
1JtgU6Uo1RAt5eiMf34EehyatUezBQP36C
1HdKXsNQtzDcfB6PGM7DWTgX9vhBWsz1ak
1G23Uzwj55k2A9TRwaTknqGav66oDTkWCu
1H4K3dGfNbAN4AUfyUrpkGpjrd83sntDpV
1HuPVqz2xvf1rdNFUqd62vRTyxP3jeX9Ch
1HX4s3JeFU3x1eQgPNQVAdx6FoCtbb1hr8
1Hb8DmmvvtTYv5RBLuGtDxznkZwVpd5Vjy
1GyDutntMuYyA2vQGW5HFcKLfx4cbDdbJq
1HweN9p41BY2RBunsPqyVuheEq7gVoxA9u
1GkZQcDy8V6pmHFZqUBUBCnN9dc2hoWasD
1Drshi4RAuvxk4T6Bkq959ZvLbvy7b1wvD
1FhRuUkk8Bfx8FJDemtxhKAR4F8GCNKrXG
1FrV9hv1AW34BGJvobJatyzUWYDWB9epRW
1BDZBTb4KE5oq6wAgA6EvAe3uCFRrAbPao
1BXyJc6BVuTFnHQCcjiWX2xmCPNVfaSZeb
19c8sUa54yQuRTVDfJa3iDkkCaFkzBJLPB
1BzK87zuqidZn489Wb2oLSktrjKrX7TLKe
19eihBKk6e5YD2QXAe4SVUsxRLLnTDKsfv
19KiFrafXEyJCUDYFEv3B6tBUwyfFo7kNU
1Ar6meJQCkNoC9wnPcyRNNpzX5fBDaGcKd
19Cr4zXpKw43xLJhFZW9iv4DDNtQk2TDeB
1DedUxzgwErg4ipNi988wPgLk5thwciKcc
1C5aU4Xnpd3txbxehk46UZgiuNB8QdpHCH
1CZsoJfkknbnW5fKrt1oR7N1ALE5WmDGP1
199Yxz2TJGtND3QKsHTptTJivqSaUZBvku
18YDgRhxsomuBZ1g9d8Y1JuRmxDhF8Bvff
18hcZVFPqDNAovJmb9vA6hEJrDz6uWXNGh
195HvmjXgoF3M5vFaBC8swZPhwrE7VhxRD
18ok25NTkdrUzdByFJCNVsqVYkujZ8aP45
16w6sZBDP58yyeyZAcvnxcEGJpwR9amM6g
15kNZcrhxeFZgVVLK2Yjzd69tRidbFdJEZ
15U4VsmWG1cdXAtizvQsW4r7iMxzp64Tgu
16jZZkMYqjUWUtQ9DfDvHdH5ko5BcnH9XQ
17etv2L3nhk6SCcWSNW4eoZkBy84izAm17
18M1Z337NqLtK9V69bssnQUYsvb7hmfSFS
17KcBp8g76Ue8pywgjta4q8Ds6wK4bEKp7
17Tf4bVQaCzwWrDWGRPC97RLCHnU4LY8Qr
14mP6caC5dFhHdVAPCjPKM8Nm36MBDR5pM
14p4w3TRCd6NMRSnzTmgdvQhNnbrAmzXmy
13xGCc4TPSYY9GYxBGVNox82KxyjkFnxMX
15SeCwVCFx5cWyrcdD1Zp1D1zxjH2SELPg
15QcKCa84ZCHxbsqXDoKhi5XbmQB8jPEAd
156HpsWfgkWYLT63uhTAGUSUF3ZMnB9WWj
14USZ558Rr28AZwdJQyciSQkN4JT1cEoj2
13ahgw8sM95EDbugT3tdb8TYoMU46Uw7PX
13dXFMyG22EsUsvaWhCqUo7SXuX7rBPog6
13sXfpp2V16nnxYvW9FHHoBdMa3k98uJw8
13Wv5hGhubAWgSPWtXYh6s1s7HX2N1psYg
12KkeeRkiNS13GMbg7zos9KRn9ggvZtZgx
12T4oSNd4t9ty9fodgNd47TWhK35pAxDYN
1439q4Na8v88kPBqoyg8F4ueL9SYr8ANWj
155FsTtEFq4eGCcBxDseuwLKPbmtWbyHJR
16W4XcUAKPmSES9MiUCio28msSCp8rDZgs
1EiiKCCnFgHjEvPZdu29qqgdBm8zTvpU3U
1LXi3x7hyt17cxncscGE887WCrC6XDNZ4P
1AZu7TQmKBAes2duNDctYwjAB9nhHczUnA
1B6kJM75iu5ty1HAHMMz6tT1HhjoGNTCa9
1Hm6XDmhKCHz68wDEYTapN9MEanke8iwUk
1CRjKZJu8LvTutnSKq4zTJ4yiqrzMAArYW
1Fu4YgM3Y9CxvioGPqkSzkydAC8MVaPN1D
1EK8vW7UYaYHKiW4TZmYJKtwcZLM14VjvP
18KDS3q6a4YV9Nn8jcyMvNoVPfcrfemeag
OR ARE THE OTHERS GETTING A CUT BECAUSE, THE WAY IT LOOKS IS THAT BITCOINS ARE BEING SKIMMED OFF OF THE TOP AND, CERTAIN INDIVIDUALS WENT OUT OF THEIR WAY TO HIDE THE MT.GOX BITCOINS BECAUSE, THEY WERE STORED AT THE NEPTUNES MEMORIAL REEF ???? SECTION B2 THESE ARE THE COORDINATES N25º 42.036?, W80º 05.409?
SO I KNEW ABOUT THE WONDERLAND GANG AND, WHAT WAS REALLY GOING!!
EVERYBODY SHOULD HAVE FOLLOWED THE 2 RULES FROM PATRICK BET-DAVID
1. DON’T TOUCH THE MONEY
2. LEAVE THE KIDS ALONE
SO IT’S OKAY FOR INDIVIDUALS WITHIN’ THE INTELLIGENCE COMMUNITY TO BE INVOLVED WITH TAKING NARCOTICS I DIDN’T KNOW THAT WAS A THING? SO THE WONDERLAND GANG IS IMPERSONATING INDIVIDUALS WITHIN’ THE DONALD J. TRUMP CAMPAIGN!!
IT IS TRULY SAD ???? WHAT HAPPENED AND, IT IS A WIDESPREAD ISSUE WITHIN’ AND, THAT BEING SAID I WAS RAISED WITH CHARACTER AND, VALUES AND, THE WAY I SEE IT AN ATTACK ON A FORMER PRESIDENT IS AN ATTACK ON AMERICA ????????
THAT BEING SAID THE ASSASSINATION ATTEMPT ON ANY POLITICAL FIGURE, INCLUDING DONALD TRUMP, TRANSCENDS POLITICS AND TOUCHES ON BROADER ISSUES OF NATIONAL SECURITY, PUBLIC SAFETY, AND THE STABILITY, OF DEMOCRATIC INSTITUTIONS. SUCH ACTIONS THREATEN THE FABRIC OF SOCIETY AND RAISE SERIOUS QUESTIONS ABOUT EXTREMISM, VIOLENCE, AND THE RESPONSIBILITY OF CITIZENS, TO ENGAGE IN CIVIL DISCOURSE. ADDRESSING THESE THREATS, REQUIRES A COLLECTIVE RESPONSE THAT UPHOLDS DEMOCRATIC VALUES AND, THE RULE OF LAW.
AND, ONCE AGAIN IT IS SAD ???? WHAT HAPPENED AND, THE SAME GOES WITH THE EXTREMISM THAT OCCURRED ON JANUARY 6TH AND, I TRULY BELIEVE THAT BOTH COULD HAVE BEEN PREVENTED…