Comment by edm0nd
14 hours ago
If they do leak it all, these are the first one's im digging into out of curiosity
3329:-rw-r--r-- 1 root root 62971493 May 18 22:52 spam-investigations.tar.gz
3330:-rw-r--r-- 1 root root 7915019 May 18 22:55 spamops.tar.gz
680:-rw-r--r-- 1 root root 306146 May 18 23:14 copilot-abuse-dashboard.tar.gz
681:-rw-r--r-- 1 root root 219637 May 18 23:03 copilot-abuse.tar.gz
2245:-rw-r--r-- 1 root root 55838 May 18 23:14 le-portal-go-admin.tar.gz
3820:-rw-r--r-- 1 root root 2204 May 19 04:25 secret-scanning-password-detection.tar.gz
2223:-rw-r--r-- 1 root root 36777 May 18 23:05 law-enforcement-front-door.tar.gz
2224:-rw-r--r-- 1 root root 56824 May 18 23:12 law-enforcement-portal-go.tar.gz
2225:-rw-r--r-- 1 root root 141825 May 18 23:12 law-enforcement-portal.tar.gz
The existence of a explicitly named "front-door" implies there is also a ....
To be fair, personally I wouldn't think much of the law enforcement ones. We used to have a department for that at one of my previous gigs and it's mostly just uploading files and making sure the contacts line up with official contacts.
Yeah, it’s a good sign if anything. Any operation as big as GitHub and open to the public will need to have a way to verify and track requests from law enforcement agencies. There are going to be legitimate LE requests. The illegitimate requests (whatever happens with them) are not going through this portal, I guarantee.
Where is this list from?
It's the filetree the threat actors, TeamPCP, released of what they exfil'd.
see the full one @ hxxps://limewire[.]com/d/4HPnj#dbRR3wQb4u
Everytime it is BreachForums: https://breached.st/threads/internal-github-source-code.8739...
What is the hell is muslims-of-github.tar.gz ?! I guess nebula is the new PRISM. What is `newly-packaged-malware` ?!
I'm sorry for Sophie.
2 replies →