User
is still available? if purchase 4 credits?
Legend of the Northern Blade
Return of the Blossoming Blade
Murim Login
Nano Machine
The Breaker
Return of the Mad Demon
Star Instructor, Master Baek
The Undefeatable Swordsman
Spirit Hunter
Moon Shadow Sword Emperor
Heavenly Inquisition Sword
The Heavenly Demon Wants a Quiet Life
A Modern Man Who Got Transmigrated Into the Murim World
Champion’s Path to Murim
Heavenly Grand Archive’s Young Master
TL;DR:
Discord recently discovered an incident where an unauthorized party compromised one of Discord’s third-party customer service providers.
This incident impacted a limited number of users who had communicated with our Customer Support or Trust & Safety teams.
This unauthorized party did not gain access to Discord directly.
No messages or activities were accessed beyond what users may have discussed with Customer Support or Trust & Safety agents.
We immediately revoked the customer support provider’s access to our ticketing system and continue to investigate this matter.
We’re working closely with law enforcement to investigate this matter.
We are in the process of emailing the users impacted.
How to get this brother? can you share
The Ember Knight , Becoming the Monarch , Black Knight, The Lazy Lord Masters the Sword , The Reincarnated Assassin Is a Swordmaster
The Red Knight Seeks No Reward
The Knight and Her Emperor
Sigrid
The Frost Flower Knight
The Legendary Spearman Returns
Caught by the Villain
Shadowless Night
The Stellar Swordmaster
The Knight King Who Returned With a God
Time-Limited Genius Dark Knight
Update (August 5)
Google confirmed that one of its corporate Salesforce instances was briefly compromised in June by threat actor UNC6040, who specialize in voice-phishing campaigns. The attackers retrieved limited business contact data before Google cut off access.
Following these intrusions, a related group dubbed UNC6240 has launched extortion campaigns, sending emails and calls demanding bitcoin payments within 72 hours—often under the name ShinyHunters. Analysts believe the actors may escalate by launching a data leak site (DLS) to pressure victims further.
Google’s Threat Intelligence Group notes that UNC6040 has evolved from abusing Salesforce’s Data Loader app to deploying custom Python applications, registered through compromised accounts, and masked via VPN or TOR connections. Their operations rely heavily on social engineering rather than exploiting Salesforce itself.
Google continues to monitor the situation and has published indicators of compromise (IOCs) to help organizations defend against these campaigns.