News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Lapsus rockstar hack : hacking | Torhoo darknet markets

So what exactly did lapsus(autistic kid) do in order to get the gta 5 source code i see that he used a rockstar employee credentials but woudnt your average rockstar employee not have access to such thing cause from what im seeing lapsus wasnt really all that complicated they were just using phishing and bribing employees how was the kid able to get the source code exactly
/u/lemonDragon
2 points
1 week ago

they got into Rockstar’s systems on Sept. 16 2022 using social engineering, “by masquerading as an employee or contractor who had ‘lost’ or ‘couldn’t remember’ their password.”




After failing to log in with the credentials of a former employee, they used an account linked to a contractor named Siwar Jrad (siwar.jrad), prosecutors said. Once inside, credentials of the former employee “mohd.hidaytullah” were used to access a part of the system associated with game development, they said. Rockstar’s logs show that the device used for the enrollment was the exact type and specification of the iPhone seized from Kurtaj at the Travelodge Bicester.
/u/lemonDragon
1 points
1 week ago
[removed]
/u/AutoModerator M
1 points
1 week ago
All links require moderator approval.

This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
/u/Cyberjagu Moderator
1 points
1 week ago
talking about me ?
/u/workerbee
1 points
1 week ago
Whoever downvoted your question should be held up to the muffler of a 1985 Buick Century Station Wagon. Maybe they're mad you didn't Google hard enough and do more research but down voting questions is such a dickhead thing to do.

The question is reasonable to me. It makes sense to ask how he got to point D from point A. We may never know how he enumerated other users exactly or why that specific target user was chosen.

I once compromised a corporate network by moving laterally first and bumping into things along the way. When I finally got to the motherlodes, I realized how many things went right for me to get there. And the time spent was significant. One move at a time, one PC at a time, one got-lucky at a time. By the end, I had virtually all of the region's network mapped out, even some out of state servers started making sense. Along the way I found access to expense accounts, payroll, sensitive employee docs, camera system, gate/RFID access and control, raw access to barcode and orders system, DirecTV accounts, router and firewall passwords, domain controller, rdp and password access into nearly anyone's email/PC, client lists, clients' costs lists, and even NSFW pics. I had no target in mind, no goal to achieve or motivation to get something specific. I imagine someone with a goal like source code in mind, bumps along piece by piece until they get what they came for. It's probably happened hundreds of times where they didn't get what they came for. They got in, did what they could and came up short for whatever reason. We hear about the successes, not as much about the failures.

Somewhere out there right now, someone is one got-lucky away from securing the real release date for GTA6