There is literally no reason why we should possess 30,335,219 malwares (growing as this is being written).
This 'collecting' thing is getting out-of-hand.
Apologies — we failed to use a comma and we fear our translation may be misleading to some.
Translation:
my bad lol i forgot the , in the sentence, i dont want mfers thinkin we sad that we blowin up lol, fr we blessed
Thank you, it's appreciated.
(no idea what this means, or why they blocked us after the message)
> go online
> see internet archive defaced
> comment on the ddos / compromise
> give more information in follow up post
> non-nerds find post
> blame us
We woke up to hate mail.
Some people believe we're responsible for DDoS and/or compromise of The Internet Archive. We did not DDoS and/or compromise The Internet Archive
Regardless, thanks for calling us mentally handicapped and saying we should commit suicide.
The website has returned to normal. We suspect this person(s) defaced the site to make a point. However, this is just speculative. If this were a financially motivated TA they could have done much more damage or made a horrific defacement.
tl;dr kind of classy?
In summary: the person who claimed Lockbit ransomware group was making a training course was doing it as a publicity stunt (probably) to attract people to their training course (crime focused?).
We give it a 7/10. It fooled some people.
Malware Ingestion statistics, August 2024:
2024-08-01: 15,604
2024-08-02: 13,593
2024-08-03: 12,354
2024-08-04: 12,679
2024-08-05: 12,245
2024-08-06: 12,914
2024-08-07: 14,432
2024-08-08: 15,054
2024-08-09: 13,625
2024-08-10: 20,955
2024-08-11: 23,064
2024-08-12: 22,850
2024-08-13: 19,464
2024-08-14: 15,219
2024-08-15: 114,050
2024-08 -16: 70,162
2024-08-17: 93,572
2024-08-18: 138,520
2024-08-19: 178,314
2024-08-20: 87,425
2024-08-21: 146,435
2024-08-22: 306,526
2024-08-23: 208,720
2024-08-24: 133,827
2024-08-25: 7,533
2024-08-26: 19,108
2024-08-27: 18,980
2024-08-28: 21,085
2024-08-29: 16,032
2024-08-30: 17,327
2024-08-31: 17,620
Total: 1,821,596
Size: 230GB (7z Ultra compressed)
We are considering implementing a clause where companies with a specific amount of revenue must pay for the right to download malware from us.
It's irritating seeing multi-million or multi-billion dollar companies profit off our work
tl;dr becoming a villain
We're doing a merch giveaway on Xitter.
https://x.com/vxunderground/status/1843479223446778080
Why even ask us for merchandise, or stickers, if you're going to freak out when we say yes? How are we going to physically mail you something if you can't provide us a physical address?
real world things require real world address, the real world isnt the internet ok
Thank you to whoever lives in Milton Keynes, UK and decided to spray paint our website onto a wall.
You kind of messed up the centering, you had to do a weird trail off for .org, but overall we give it a 8/10
Hello, how are you?
tl;dr tl;dr I'm sick, update on ransomware leak, update on video game 0day, stuff
Apologies for so many delayed communications — I have contracted some sort of viral infection. My sinus' have begun draining fluid into my esophagus. tl;dr Sinusitis. As this post is being written, I have consumed enough Robitussin to kill an Elephant.
Anyway, regarding the ransomware leaks, the data is a result of an unknown person(?) compromising ransomware threat actor VPS'. Once the individual compromised the VPS' they decided to forfeit the data over to law enforcement (anonymously) which they believe resulted in the apprehension of individuals and the takedown of several onion domains. Following the takedown and arrests, this person (people?) decided to gift the data to us to study or distribute to others. They believed that, due to the size of our audience, us announcing it and sharing it would disseminate information faster. Because this person(s) compromised a VPS, it has a great deal of victim PII present — it appears they compromised some of their hosts mid-ransomware campaign or attack. In order for us to share it, we need to scrub the victim PII. We still haven't done that (see why in first paragraph).
However, we have decided we will share the data to Threat Intelligence vendors, or anti-virus vendors, or whomever to study, review, blah blah blah. We believe these companies, which typically offer anti-ransomware services, will make good use of this information and data. Truthfully, we ourselves have not reviewed the data in totality. Our domain of study typically revolves around malware development — reviewing VPS data is kind of a Threat Intel / DFIR thing, so there is a lot someone could probably find that we would probably miss. If your organization is interested in the data to do a review, or write-up, or whatever, shoot us an e-mail or a DM or something. You'll need to show us proof you're from a legitimate vendor.
We have no timeline on a public release. I don't feel like scrubbing the PII, maybe someone else in our group feels like it, I don't know, I haven't asked because I've been sick. I could probably ask right now, but I'm not.
About the video game 0day, very few people are aware of its existence and we believe it will cause a mini-shit storm online. It's high severity, but it's impact is limited to a relatively small userbase. I've sworn on the Old Robitussin bottle and the New Robitussin bottle (Game of Thrones reference) to not disclose more information. Regardless, you'll all have a nice chuckle. It's disclosure timeline is roughly 7 - 14 days. The person who found the exploit is doing a writeup. Upon release, the exploit will not be patched.
Finally, we've got lots of updates to vx-underground. I haven't pushed any to prod yet (despite the pile up from petik, Bradley, and GuessThePwd), because I've been sick.
Have a nice day,
- smelly
Not a big deal, the disk is okay and we still got ((2,147,483,648 * 3) - 17,216) good sectors left.
Читать полностью…Unfortunately, as we grow in size we continue to see less tech-savy individuals who do not understand the malware nomenclature.
Moving forward we will make translations.
Translation:
Sad we getting big but dumb mfers come here mad as hell and now we gotta use littler words
Thank you to everyone for the kind words and for defending us.
Truthfully, we aren't upset by these remarks. The post was made in our typical fashion and was directed toward our target audience. Whenever something we post escapes the information security ecosystem, information tends to bend and warp. It isn't surprising non-technical people who are unfamiliar with our work would misconstrue our commentary.
Some people who made the hateful remarks have apologized, others continued to criticize us saying our post was intentionally (or unintentionally) misleading. We personally did not believe this is something which could mislead people as we were directly quoting the wording in the compromise. However, it is evident we were painfully wrong.
We are sure things will calm down soon. The internet moves very fast and people outside the information security ecosystem will drift back into their circles of interest.
There is also a joke to be made somewhere regarding the hateful comments directed toward us on October 10th, World Mental Health Day, probably. We'll let someone more creative than us make the memes.
Anyway, back to work.
Have a nice day
We're not entirely sure what is happening right now, but we suspect this person thinks we are responsible for the attacks against The Internet Archive.
It also has 94,000 likes and 1.8M views
Note:
Final update and confirmations:
The compromise has been confirmed via BleepinComputer and TroyHunt. 31,000,000 users impacted. There is no confirmed information on how the site was compromised. No Threat Actor(s) have been attributed to the compromise. More information is available on their respective social media platforms. More information will probably become available in the following hours or days.
Unrelated to the defacement and compromise, Sn_darkmeta claims to have been DDoSing Internet Archive. They state they're DDoSing the website because the United States government supports Israel and The Internet Archive belongs (?) to the United States.
Craziest compromise of 2024 (thus far) possibly going to this person(s). This is wild
Читать полностью…> be fall season
> get chilly outside
> turn off air conditioning
> get on pc
> compress 150gb blobs of malware
> office becomes inescapable fiery hell
> turn ac back on
> entire house freezing cold
> office still burning hot
¯\_(ツ)_/¯
Yesterday someone wrote that Lockbit ransomware group is making a training course. Is this true?
tl;dr no
1. LockbitSupp a/k/a Dimitry Yuryevich Khoroshev is a Russian national who has stolen an estimated $400,000,000 via ransomware. Does he need money by producing and selling a training course? Probably not.
2. According to the United States Federal Bureau of Investigation and United Kingdom National Crime Agency, Lockbit ransomware group had affiliates who were members of EvilCorp, an infamous Russian-based malware crime family who the family is estimated to have made hundreds of millions of dollars. EvilCorp is believed to have ties to the Russian FSB. Does he need money by producing and selling a training course? Probably not.
3. LockbitSupp does not speak English well. Why would he write a course in English? (in the photo shared it was written in English, native English with virtually no typos or funky spelling)
4. The photo shared mentioned Breached. LockbitSupp is not associated with Breached. He is a Russian national, does not speak English well, and does not traditionally trust foreigners (or anyone really, except maybe his most esteemed ransomware affiliates). His primary forum platforms for communication and recruitment has been Exploit and RAMP
5. We asked Lockbit if he was making a training course, he said no. Note his native English (sarcasm, a native English speaker would write, "no, why do you ask?")
We love hearing that students, the morbidly curious, and independent researchers use our website.
We don't like watching your multi-million dollar company scrape our malware collection for their 'AI' training set.
The AI girlfriend website got compromised.
It's all over for lonely degenerates. Say a prayer 🙏
https://www.404media.co/hacked-ai-girlfriend-data-shows-prompts-describing-child-sexual-abuse-2/
Good evening,
We've got a bunch of malware in queue. Some has already been pushed to prod. It is over 1,000,000 malwares.
Additionally, please give us time to review the over 700 animal pictures we received. We didn't anticipate so many critter pictures.
Thanks,
Hello, we are a malware library.
We are not a cult.
Please don't go around tagging buildings with our logo(s) or website URL. 😭😭😭😭
> "smelly can i have {free merch} for {thing}? "
> "sure"
> "nice try u fuckn fed ur never gettin my dox"
That's crazy. We are indeed interested in The largest collection of malware source code, samples, and papers on the internet.
Password: infected.
How did they know?