If they set up a phishing site, doesn't that indicate they did NOT have access to the passwords? Why else bother with trapping passwords if they already had them?
passwords were likely hashed and they're too retarded to know how to crack them. Thus phishing website makes sense. Still, think we all knew something was going down when RF was just randomly down for a whole week. That almost always means it was seized and whoever has seized control is now bumbling to redeploy.
(April 12, 2022, 08:14 PM)penis Wrote: It means that the phishing page was more than likely for obtaining clear text copies of the passwords and IP addresses for linking back to the records they have for RF's entire back-end. Many thought they only obtained the domains, but not the back-end. This also confirms they have everyone's private messages. Expect to be raided within the year if you didn't take time to contain your opsec and considered to be a big fish.
(April 12, 2022, 08:14 PM)penis Wrote: It means that the phishing page was more than likely for obtaining clear text copies of the passwords and IP addresses for linking back to the records they have for RF's entire back-end. Many thought they only obtained the domains, but not the back-end. This also confirms they have everyone's private messages. Expect to be raided within the year if you didn't take time to contain your opsec and considered to be a big fish.
good one buddy!
I think this is probably just a way to build profiles on people. Being on this site isn't a crime. They might track the IP's of the torrent files (like that 459GB raidforum one) but you don't even need to pay credits for it. The page is google searchable.