Support Tech Teacher Help keep our digital safety guides free for seniors and non technical learners. Click to hide this message

Tech Teacher is a small nonprofit. We do not run ads or sell data. Your donation helps us:

  • Offer free cybersecurity guides for seniors
  • Run workshops for underserved communities
  • Explain technology in simple, clear language
Donate with PayPal Even 3 to 5 dollars helps us reach more people.

Meet ‘REY,’ The Admin of Scattered LAPSUS$ Hunters – November 2025

Author/Source: Brian Krebs See the full link here

Takeaway

This article reveals the identity of “Rey,” an administrator for a group called LAPSUS$ Hunters, which shares information about hacking attacks and leaked data. You’ll learn how “Rey” helped manage this online group and promote the distribution of stolen information.


Technical Subject Understandability

Intermediate


Analogy/Comparison

This situation is like finding out who is running a secret online club that talks about how people broke into different houses and shared information about what was stolen from them.


Why It Matters

Groups like LAPSUS$ Hunters spread sensitive information from hacks, which can harm companies and individuals. For example, the article mentions “Rey” was linked to sharing stolen data from Western Digital, showing how this kind of activity can expose private information and company secrets.


Related Terms

LAPSUS$, LAPSUS$ Hunters, Admin, OSINT, SIM-swapping, VPN, IP address, Ransomware, Data breach. Jargon Conversion: LAPSUS$ is a well-known group that steals data from companies. LAPSUS$ Hunters is a group that shares news about hackers and stolen information. An Admin is a person who manages an online group or channel. OSINT means using public information to find clues. SIM-swapping is a trick where someone takes over your phone number. A VPN is a tool that helps hide your internet location. An IP address is a unique number for a device on the internet. Ransomware is a type of harmful software that blocks access to a computer until money is paid. A Data breach is when private information is stolen from a computer system.

Leave a comment