SELLING (ES) Avatel Telecom Database
by ByteToBreach - 7 hours ago
#1
Avatel telecom Azure server compromised with employee data exfiltrated from the Active Directory + 380Gb of users data from Oracle DB.
Some credentials might still work, depending on how fast the Spaniards will react.
Ample time was given to Avatel and it's representative Mr Andres (Andres Perez Rego). But in the end, they just keep buying time and hoping to find the exploited vulnerability, and maybe strengthen their bargaining position.
Not only do i put the employees information for sale now, but the entirety of Oracle Database that contains data on Avatel infrastructure, financials, contracts, clients and users from Andalusia, Catalonia, and other major Spaniards regions.
Samples:
https://dump.li/image/6f3d83818a9f3f57.png
https://dump.li/image/a8473e45f1d2330d.png
https://dump.li/image/22b0f99887279b76.png
https://dump.li/image/6be4ba106ee5dd3d.png
-------------
Avatel AD Users: https://pastebin.com/VABrwvhM
Avatel Emails: https://pastebin.com/wXxGRjfZ
Avatel Credentials: https://pastebin.com/psRAPfX1
--------------
Avatel Comms:
https://dump.li/image/d438c9920b2343fe.jpeg
https://dump.li/image/d5e0d1d0bc6a3e7c.jpeg
https://dump.li/image/6f26ef4fc572e247.jpeg
https://dump.li/image/88757b01f0e0d238.jpeg
https://dump.li/image/7d98896536a10295.jpeg
https://dump.li/image/5c31c9fd01fdb2f8.jpeg
https://dump.li/image/d5991cd84c64a469.png
https://dump.li/image/ed28d113256c4838.png
https://dump.li/image/5afb78dbed0f19c1.png
https://dump.li/image/5c2edd7dc5aa2712.png
-----------------------------------------------------------------------------
Session: 05c2db4775cb46350f16814dfe3bfa856664f315585653e4c368af08ce50b0c31b
Signal : Bytetobreach
Telegram : Bytetobreach
Email : Bytetobreach@tuta.com
Reply


Forum Jump:


 Users browsing this thread: 6 Guest(s)