Jason Thor Hall / PirateSoftware / Maldavius Figtree / DarkSphere Creations / Maldavius / Thorwich / Witness X / @PotatoSec - Incompetent Furry Programmer, Blizzard Nepo Baby, Lies about almost every thing in his life, Industry Shill, Carried by his father, Hate boner against Ross Scott of Accursed Farms, False Flagger

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.

Which will happen first?

  • Jason Hall finishes developing his game

    Votes: 33 0.8%
  • YandereDev finishes developing his game

    Votes: 412 9.6%
  • Grummz finishes developing his game

    Votes: 117 2.7%
  • Chris Roberts finishes developing his game

    Votes: 143 3.3%
  • Cold fusion

    Votes: 1,640 38.4%
  • The inevitable heat death of the universe

    Votes: 1,930 45.1%

  • Total voters
    4,275
The VPN shit is especially funny when Mald attempts to show off his 20 years of h4x0r experience:
View attachment 6906106
The "gotcha" is that the "weird service" that Mald "unraveled" is TunnelBear, which is obviously a VPN service, which Mald doesn't seem to realize, so the next hypothetical step in Mald's master plan would be to "arrest the dude". So what Mald has demonstrated is a pretty good case for VPNs, I'd say.

Maldy mentions a specific service here which is IP2location, it's fine for what it is but it's horribly flawed. For example, I bounced around a few nodes and pretty quickly it gave me a result while using a VPN that showed I wasn't using one, despite using one.
1737884149525.png


It's fine as a basic tool, but you can't really get a ton from it beyond that at a quick glance. Sometimes it will block real people, and other times it will let through nefarious actors, and it's not that consistent.

You're also not arresting a dude over video games retard.
 
Maldy mentions a specific service here which is IP2location, it's fine for what it is but it's horribly flawed. For example, I bounced around a few nodes and pretty quickly it gave me a result while using a VPN that showed I wasn't using one, despite using one.

It's fine as a basic tool, but you can't really get a ton from it beyond that at a quick glance. Sometimes it will block real people, and other times it will let through nefarious actors, and it's not that consistent.
Are you by any chance work for the government hacking power plants?
 
The VPN shit is especially funny when Mald attempts to show off his 20 years of h4x0r experience:

The "gotcha" is that the "weird service" that Mald "unraveled" is TunnelBear, which is obviously a VPN service, which Mald doesn't seem to realize, so the next hypothetical step in Mald's master plan would be to "arrest the dude". So what Mald has demonstrated is a pretty good case for VPNs, I'd say.
Would you consider this encouraging a black hat? Because I would.

https://www.reddit.com/r/IAmA/comme...=web3xcss&utm_term=1&utm_content=share_button
 
Are you by any chance work for the government hacking power plants?
I'm Mossad's top guy, I make the goy quake in fear.

But really this is all really simple shit you figure out if you've ever set up a basic Word Press website once and installed any plugins. Or if you use a VPN now many sites block them thanks to LLMs and account sharing so you can find ways around that by hopping around nodes.
 
Turkish "cheating is fine, I've guntguarded DesTINY until it was inconvenient for me" Thomas released a video on mald finally.
Turkish fem doomer roach reacts to american furry fag roach. Now this is what I call a Turkish Delight. :smug:

We have a saying in Turkish: "Deli deliyi görünce sopasını saklar." --> "When a lunatic sees another lunatic, he hides his staff"

Basically, they know their own kind and go by the "caution among equals" mindset. much expected behavior.
 
He normally likes to avoid getting into details about his job at Blizzard as far as I can tell but he wasn't a developer. Other popular code content creators, whether they're quality or not, tend to link their Github in the description and have something to demonstrate their style and allow others to check out their projects. Maldy doesn't link anything.

His official website is also something a web tech 101 student would have made by the end of the semester.
View attachment 6905470

I don't care much to analyze his code, what's obvious is he likes to present himself as something he's not, which is a really clever developer and hacker and he has nothing to show for it.
I mean, if you read the thread you can see that he doesn't claim to be a developer on WoW, he claims to be QA who then switched to Cybersec (not one of the ops guys, the jannie who bans people), he even used to go on multiple minute long rants about how "QA is still game development" and demanding you take him seriously.
This is the same guy who counts his Second Life furry avatar bussiness as "game development", take anything he says with extreme salt and assume he has told an extremely egregious lie to ingratiate himself and make the notion of what hes going to push next time, easier.
 
The VPN shit is especially funny when Mald attempts to show off his 20 years of h4x0r experience:
View attachment 6906106
The "gotcha" is that the "weird service" that Mald "unraveled" is TunnelBear, which is obviously a VPN service, which Mald doesn't seem to realize, so the next hypothetical step in Mald's master plan would be to "arrest the dude". So what Mald has demonstrated is a pretty good case for VPNs, I'd say.
The lead in to your clip has Maldy saying the IP that he's referring to (107.170.236.5) has a lot of hits for malware on Virustotal (link to IP page) and then presumably links IP2location. At this point, Maldy thinks he's cracked the case and that the attacker is using a jump box as described in the clip but really it's just the Tunnelbear VPN... which isn't a jump box obviously. The victim in the video is clearly not hacked as they expect because he says the hacker doesn't get the server ID until his delayed stream shows it.

Looking online, Malwarebytes apparently likes to pretend it's doing extra work by notifying a user anytime an external IP is hitting their own computer, even if it's on closed ports that wouldn't get through anyway, which is what's shown in the clip. Maldy looked up the port and was like "ah ha so they tried to connect to your computer over port 135 from a rented machine on digitalocean meaning you probably have a trojan!!!" but if they had a trojan there are much better ways to get through the firewall and poking the computer over a Tunnelbear VPN connection on port 135 is one of the worst ways. For example, using the infected computer to reach out to the command and control server and creating a reverse shell.

1737892746859.png

Mald jumped the gun in an effort to look smart and continues to insist that this is evidence that the hacker can directly connect to his machine, even though the attempted connection was blocked and that port would be publicly blocked by default on Windows as well. It also implies the computer is effectively directly connected to the internet or at least the network forwards traffic it shouldn't which is peculiar but Mald never brings that up.

The guest, ImperialHal, then says, "Jim burns just stated in my chat that he did a full reinstall of Windows before the tournament started." Mald replies, "You could still have persistence on the machine but that is interesting..." then mentions hardware persistence and that likelihood decreases slightly. No, it decreases significantly.
Further on, ImperialHal says someone in his chat says you can do a reverse DNS on the IP and tell that it isn't a jump box. Maldy is quick to say akshually you can't tell and proceeds with his tunnel vision on the IP going to a rented server to launch attacks from because Virustotal has some flags for the IP.

Maldy is constantly fixated on the IP being an "attack box" when it obviously isn't. He even says having the IP is a huge win when it isn't. If the connection was ever established then it'd be in the event logs anyway which would also be where you can start pulling more threads. All of this said, I'm pretty sure that Malwarebytes popup is a red herring, the hacker himself said the hacks "never went outside of the game" in a TechCrunch interview which Mald goes through in the stream instead of letting Justin Hammond talk who knows more about this subject than Mald. Justin Hammond did a video showcasing some OSINT that was done that uncovered more about Destroyer2009, the Apex hacker, and nothing indicates he's hacking player computers.

At 57 minutes in, Mald says his forte is "physical access control systems, which is breaking and entering, wifi vulnerabilities, web related vulnerabilities, and social engineering..." Around 2:30:00 Mald talks about working at Blizzard doing a pentest and getting caught picking a lock on a door, then he restates his skills verbatim as if it's a practiced phrase for him, which it probably is. He admits malware isn't something he's as knowledgeable on but then turns around and says every day he's looking up new vulnerabilities and updating his home lab to "try stuff on."

Humorously, at 2:42:00 he talks about how you shouldn't berate people for making honest mistakes. Funny considering how he talked down to Shaye for not understanding how he wanted her to edit the sign for their game and spent half an hour bullying her live over it, literally calling her dumb.

As for ImperialHal's weird inbound connection, it could be a lot of things and likely has nothing to do with the Apex hack. It'd be funny if he personally had Tunnelbear installed at the time and a service erroneously went across the internet and back to his public IP.

Justin Hammond knows what he's talking about as far as I know, I can't stand his videos personally but haven't heard him say anything wrong from the few I've listened to. I don't know why Hammond puts up with Mald's blatant ignorance and lies so he can look smart to his ignorant audience. It ends up lending Mald credibility through association which is frankly irresponsible as he says a lot of really stupid things the more you listen.

That's the most Maldy I've struggled through to date and he's literally nonstop with the bullshit, it's incredible.
 
Last edited:
Seeing this retards fans defend him is so obnoxious. Mald is obfuscating the drama by showing the absolute worst actors sending him death threats and saying “see! These are the people criticizing me!” When really most of the criticism was just people wanting him to apologize and pull his head of his ass. Seeing someone be manipulative is already annoying but seeing someone who is such a smug tard using really simple and dishonest tricks to win his audience back over is even more annoying. Sorry for getting MATI
 
Interesting how in these VPN clips he refers to himself as a hacker for 20 years.

There's an old YouTube short where he claims to be involved in bot detection for blizzard. His super smart idea? Put a rock in the middle of a path that people autowalk along. Anyone who might run into the rock is clearly a bot and not someone autorunning the many minutes it takes to go from city to city while afk. I mean, it's not like there were established paths players used where you basically just line it up once and let the game take care of it for you...

He also gives some bullshit reasons for why bans would be in waves that are as surface level as it gets. Literally, oh well if we did it right away they would know what got them caught and change that, but if we give them months to bot, they don't know what gave them away. Nevermind the fact they got to bot for an extra 2 months, and will just bot for another quarter uninterrupted again.
 
Amusingly enough an anime I was watching recently had an episode about a hacker event where the main characters execute something like this and in ten seconds they explain it far better than he does by saying they managed to create a local interference just long enough to boot up a secondary router with the same wifi tagging and because everyone was rushing to connect to a network during the delay in the opening they overlooked that that HTTPS was actually HTTP on that network.
Drop the name, sounds interesting.
 
This thread has become more informative than the actual cyber security thread on the farms.

Unrelated, have any of you been to someone's home who owns ferrets? They smell AWFUL and if you aren't meticulously cleaning your whole house will reek of ferret shit and piss. All this to say I'm certain our Maldy is truly a FUNKY ferret :smug:
 
This thread has become more informative than the actual cyber security thread on the farms.

Unrelated, have any of you been to someone's home who owns ferrets? They smell AWFUL and if you aren't meticulously cleaning your whole house will reek of ferret shit and piss. All this to say I'm certain our Maldy is truly a FUNKY ferret :smug:
They are disgusting little creatures for sure. I had one when I was very young, maybe 8 or 9 years old, and it would just constantly shit and piss EVERYWHERE and I just remember it being a huge hassle. It ended up escaping into some gay mans apartment through a crack in the wall or some shit, never saw the little fucker again.
 
Unrelated, have any of you been to someone's home who owns ferrets? They smell AWFUL and if you aren't meticulously cleaning your whole house will reek of ferret shit and piss. All this to say I'm certain our Maldy is truly a FUNKY ferret :smug:
One of my middle school teachers had one as a classroom pet. The smell was noticeable even sitting on the far side of the room from its cage, and it was one of the larger classrooms on the campus if I recall. Never spent enough time in the room to go nose blind so taking tests with that distraction wasn't great.
 
Back