Fulcrumsec

3/4 up parser
22posts (all time)
21last 30 days
21last 7 days
75% avg uptime 30d
Activity · last 30 days last post
fulcrumsec logo
Parsing: enabled

View crypto

Description

Mail2
Mail
fulcrumsec@tuta.io
threatspians@fulcrumsec.net
Telegram3
Telegram
@fulcrumsec
@fulcrumsec
@threatspians
Tox2
Tox
6A5E9ED3D7D26CAD5E6CA4E229CC80DA3C13AD002F73D4450078284E6C762F6DBDCF1FE9BF44
969F8BE40B09537CD2A5038B9DA4BADE71C5F35DD666CC0D7632A6812D7AF72626D422D22540
Urls4
Url
Status
Screen
Uptime 30d
Health
http://gsgot6tua7ffammwdv6vpxkog32b4z7qivtqkxz55afq2hkt2o24w5yd.onion/ Down Screen
0%
http://fulcrumsec.net Up Screen
100%
http://4e3p3in2bl67hxchuwza7qvnpe7pyeloyztr5fnh257fxkovfhappjyd.onion/ Up Screen
100%
http://4e3p3in2bl67hxchuwza7qvnpe7pyeloyztr5fnh257fxkovfhappjyd.onion/shame/ Up Screen
100%
Activity (interactive) 22
Activity charts
Posts22
Date Title Description Screen
Nordstern Technologies Screen
ParkEngage Screen
Saleskido Screen
Interzero Screen
IMEVI Screen
Rotary Club Screen
JOT Screen
BookBlock Screen
Crank Communications Screen
CrediElite Screen
Fashinza Screen
Avnet Screen
Raptor Supplies Screen
Lena Health Screen
Woundtech Screen
youX / Drive IQ Screen
LexisNexis Screen
MCO Screen
ReFocus AI Screen
Hatica Screen
Analog Gold / Prospector Screen
The Avnet Leaks We at FulcrumSec completely compromised Avnet's vast infrastructure, with over 1.1 TB of heavily compressed data stolen, mostly as snappy.parquet partitions. The raw data is between 7-12TB uncompressed. The data is global but coverage of their EMEA operations is absolute. To Avnet: You shouldn't have lowballed us repeatedly. You shouldn't have kept stalling. Now it's time for the consequences. This is on you, Gallagher. We'd rather sell it for less than you offered just to inflict damage on you. To Avnet's competitors, corporate intel brokers, and other interested parties: We are selling the entirety of Avnet's EMEA data lake. This is an exclusive, one-time sale to a single buyer. All data will be sold to a single party See our thread in Seller's Place on darkforums.st or contact us directly for private negotiations: Email: threatspians@fulcrumsec.net | fulcrumsec@tuta.io Telegram: @fulcrumsec https://t.me/fulcrumsec Tox: 6A5E9ED3D7D26CAD5E6CA4E229CC80DA3C13AD002F73D4450078284E6C762F6DBDCF1FE9BF44 We will provide the keys to the cloud servers where the data is stored, delete our local backups, and announce here and our clearnet site that the data is no longer available. Everything -- all Avnet's sales strategies, customer data (including thousands of HIDDEN customers), supplier lists, proprietary AI training data, pricing models, and Databricks infrastructure blueprints -- will be yours, and yours alone. To journalists: Contact us for additional samples or information regarding our motives and the full story of our negotiations with Avnet over the last 3 weeks. Below is a report we generated on the breach with Avnet's own stolen OpenAI API keys as we were exfiltrating the data. This was done before the transfers completed fully, but the below covers about 85% of the total data. You can also find screenshots of the directories, videos of the contents of several of the Azure storage accounts from Avnet's data lake, and a few random sample files. For serious buyers, we will provide a full directory tree and can arrange for a trusted escrow. Screen
Note