#1
[Image: VUMI_Group_Logo-3.jpg]






1_POSSIBLE_VULNERABILITY.png
https://dump.li/image/8c6c7172e6ce5679.png (backup: https://ibb.co/gZMvN8vm)

2_PAYLOAD.png
https://dump.li/image/9568a41697b8291f.png (backup: https://ibb.co/qLGWcz0G)

3_DB_ENUM.png
https://dump.li/image/aca4102d14deb072.png (backup: https://ibb.co/x8JYFTbT)

4_EXFILTRATION.png
https://dump.li/image/a2a68e07b33c1b4b.png (backup: https://ibb.co/nsXcMSRY)

5_SSN_NUMBERS.png
https://dump.li/image/cce814ab7db224c3.png (backup: https://ibb.co/4nDMCnPf)

6_PASSPORT.png
https://dump.li/image/c9baa9683f764fae.png (backup: https://ibb.co/Z1MLmV2w)


-- Intro :

There is everything : Complete PII with social security numbers of both the agents and clients, including the corresponding passport documents and W-9 forms.
Around 300.000 Insured, and +25.000 Staff/Partners/Agents. It took 6 days to exfiltrate everything, which is relatively fast using the safest parameters to avoid crashing the server.
All the databases and documents collected were taken from VumiGroup and only VumiGroup. No other 'imaginary' third party was involved in here.

--

- Links :

OWNCLOUD : http://bytetobreach.online/s/CjaQ37bIJSXnBKl
BACKUP 2 : https://drive.google.com/drive/folders/1...drive_link
BACKUP 3 : https://ln5.sync.com/dl/5956166c0#5dckrd...y-fj5zyjx5

- Contacts:

Signal : @bytetobreach .33
Session: 05c2db4775cb46350f16814dfe3bfa856664f315585653e4c368af08ce50b0c31b
Telegram: @Bytetobreach33
Email : Bytetobreach@tuta.com / dodkhloyka@outlook.com
X: @GgsFafagas
Website : Bytetobreach.com
PS: Prefer messages on Session / Signal.

JESSUS IS KING.