DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Babuk re-organizes as Payload Bin, offers its first leak

Posted on May 31, 2021 by Dissent

At the end of April, threat actors known as Babuk indicated that they were closing up shop and switching to a different model:

Babuk changes direction, we no longer encrypt information on networks, we will get to you and take your data, we will notify you about it if you do not get in touch we make an announcement.

Also for other groups that do not have their own blog or have but they want to exert additional pressure, you can not be placed with us.

Two weeks later, they wrote:

Hello! We announce the development of something really cool, a huge platform for independent leaks, we have no rules and bosses, we will publish private products in a single information platform where we will post leaks of successful no-name teams that do not have their own blogs and names, these are not girls who run with ship like rats and change the policy of their resources. these are really strong guys.

Another loud leak awaits you within a week.

Today, we began to see the changes as the site is now called Payload Bin.

Image: DataBreaches.net

The About and Rules pages are not available yet and so far there is only one leak listed under Announcements:  CD Projekt. CD Projekt was attacked in February by attackers using what is believed to be the Hello Kitty ransomware. The hackers had put the stolen source code up for sale on a Russian-language forum, listing it all as:

  • Full sources for the games Thronebreaker , Witcher 3 , the undeclared Witcher 3 RTX (the version of the Witcher with raytracing) and of course Cyberpunk 2077
  • Dumps of internal documents
  • CD Projekt RED offenses .

They subsequently withdrew the auction listing, claiming that they had received a satisfactory offer from outside of the forum, and that because of a condition of no further distribution, they were removing the listing from auction.

Source code withdrawn from auction. Image: DataBreaches.net

Now Payload Bin says they will make all source code available on its site. So what, exactly, happened to that sale with “no further distribution?”

Image: DataBreaches.net

Related:

  • MPOWERHealth victim of cyberattack; protected health information involved (1)
  • Pharmaceutical Company Inotiv Confirms Ransomware Attack
  • Two agencies in one state investigated and fined Healthplex. Was that one too many?
  • HHS OCR Settles HIPAA Ransomware Security Rule Investigation with BST & Co. CPAs, LLP
  • Government papers found in an Alaskan hotel reveal new details of Trump-Putin summit
  • Data breach at Fundamental Administrative Services affected 56,235 patients at long-term care facilities
Category: Breach IncidentsMalwareOf Note

Post navigation

← Claiming to be the “new generation,” threat actors declare, “No more discounts or long negotiations”
IA: Union Community School District publicly silent after threat actors dump files on dark web →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FBI cyber cop: Salt Typhoon pwned ‘nearly every American’
  • EuroFins cancer screening hack far bigger than thought, agency says
  • Fake ID website busted; Dutch police deal a blow to criminal infrastructure
  • 3rd Circuit Clarifies Scope of Computer Fraud Abuse Act With Employer’s Policies
  • CISA steps in to help Nevada state government recover from cyberattack
  • A hacker used AI to automate an ‘unprecedented’ cybercrime spree, Anthropic says
  • We Get Privacy For Work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
  • TransUnion notifying more than 4.4 U.S. million consumers of data breach (1)
  • South Korea fines SK Telecom US$97M over data breach
  • Taiwanese associated with Chinese group behind cyberattacks arrested

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ChatGPT Leaks: We Analyzed 1,000 Public AI Conversations—Here’s What We Found
  • 3rd Circuit Clarifies Scope of Computer Fraud Abuse Act With Employer’s Policies
  • CBP Had Access to More than 80,000 Flock AI Cameras Nationwide
  • Office of the Privacy Commissioner of Canada funds research projects studying personal information collection by smart devices
  • EPIC and Many Other Civil Society Groups Oppose Stalkerware Executive’s Attempt to Escape Accountability from FTC Order
  • DOGE employees uploaded Social Security database to ‘vulnerable’ cloud, agency whistleblower says
  • Fourth Amendment Victory: Michigan Supreme Court Reins in Digital Device Fishing Expeditions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.