Hello.
It is now Cybersecurity Awareness Month. Some organizations less privy to Cybersecurity often label this month "CSAM" month.
Please do not call it CSAM month. Call it CSA month. CSAM is something entirely different.
Thanks,
SEE THIS? UR FUNDING THIS MANS CAMPING TRIPS WITH HIS FRIENDS AND FAMILY. THEY EVEN GOT A BOAT AND A USED JEEP CHEROKEE
Читать полностью…Someone told us to check it out and give our input. It's not related to malware, not a compromise or anything.
It's also giant walls of text from all over the place.
tl;dr not reading all that
Hi,
If you like what we do (the free malware papers, samples, whatever) please consider being a monthly donor. Or do a 1 time donation. Or buy a shirt or something and scare your family.
Thanks,
Thank you to everyone for the love and support on Telegram.
We've broken 40,000 subscribers. That's a lot.
We look forward to continually serving you with malware source code, samples, papers, news, and shitposts.
Love you
A few years ago there was a person who got a scholarship for their contributions to open source software.
This person spent a majority of their time changing indentations and correcting typos. The university never reviewed the contributions.
We still think about it sometimes.
x2 fun multiplied!
Bonus points is when someone heavily borrows from your code, or copy pastas, but markets it heavily on LinkedIn and gets nominated for an award and wins it.
It's about doing it for the love of the game — not the money, fame, and anime.
Anyway, we've got a large update coming soon. It's gonna be another big one, so hold onto your horses, or whatever they say.
Читать полностью…Trying to use a different tool**.
Apologies — currently posting from Walgreens restroom.
Edit: we're being told EvilSocket didn't define the vulnerability as a 9.9, someone else did (RedHat) and they went with it. No idea if that's true, we don't know whats real anymore because everyone is yappin.
We're going back to bed
Today in internet stuff
- Sanctions against more TAs
- KIAs can get hacked somehow
- Linux RCE discussions everywhere
- More botnet tracking from people
We didn't read any of it
There's some noise in the infosec vulnerability and blue team space about an alleged 9.9 CVE score impacting all GNU/Linux systems.
Due to lack of details, some users have expressed criticism on the severity of the exploit — with the infamous Heartbleed being a 7.5 CVE. Some expressed concern that the exploit is overhyped, or acting as marketing material for the researcher.
Others have noted that they believe the exploit is real and possess a genuine score of 9.9 but question the impact of effecting all GNU/Linux systems.
From what we've seen, nobody knows anything and everyone is just yappin. We'll see what happens when the details are released.
We have a large quantity of malware samples and papers to add. These will all be pushed in bulk in a very large update coming soon-ish.
Until that times comes (finishing collecting the stuff) we're just gonna play Crab Champions
Have a nice day
More arrests for Lockbit today.
Evidence unveiled shows a relationship between Lockbit and EvilCorp. However, the details remain a little fuzzy.
None of this is surprising, it's part of the cybercrime ecosystem.
It's Monday.
Today the United States Federal Bureau of Investigation and United Kingdom National Crime Agency decided to continue hitting Lockbit ransomware group with sticks.
As the image illustrates: they've arrested more Lockbit affiliates and taken down more infrastructure
While we understand what the FBI is trying to convey — is owning a camper and a small boat really that luxurious? That seems like, a slightly above average, moderately successful lifestyle. But it isn't flashy or extreme.
Читать полностью…Our upcoming update to vx-underground is so large it may require a text file upload on Telegram, and an article written on Xitter.
Just writing all the additions will take time 😭😭😭
Hacking is boring.
Wanna know what's fun? Browsing MSDN documentation at 2 o'clock in the morning, looking for APIs to potentially abuse in malware. It'll also probably never go in the wild and it'll go unappreciated for several months or even years.
That's where the fun is
> see cups vulnerability trending on xitter
> *click*
> nothing but arguing and name calling
> *scroll*
> printers not working on linux memes
> *scroll*
This is misinformation.
This is actually Kitten Tempest. A financially motivated Threat Actor being monitored by Microsoft Threat Intelligence.
Hello,
We're aware of a long standing issue where trying to extract vx-underground files with the default MacOS tooling fails.
We don't remember why, but it does.
Our proposed solution is introducing your device to thermite, or trying to a different tool.
Thanks,
Summary of the Linux RCE 9.9 CVE
The vulnerability write up and disclosure is confusing. Initially the write up was scheduled for release in October. However, the write up and proof-of-concept was leaked onto Breached (???) which then resulted in the researcher / author to do an official write up (maybe?).
- Self described as 9.9, not officially declared 9.9
- Attacks CUPS
We haven't looked at it because we don't do exploit stuff and also Linux is for nerds
When we said users, we meant nerds on social media. Currently posting from the restroom at Apple Bees.
Читать полностью…Some controversy today as YouTube tech reviewer Marques Brownlee 'Panels' app is getting pretty substantial backlash.
tl;dr Marques Brownlee app, 'Panels', offers high-definition wallpapers from Digital Artists for $49.99/year. People criticized the app for an array of reasons, beside the idea of paying $49.99/year for wallpapers on your cell phone, the app requests tracking information, and contains ads.
Unsurprisingly, and as is tradition, internet nerds quickly began inspecting the app under the metaphorical microscope. Security researcher @I_Am_Jakoby discovered the apps API is wildly insecure. He wrote a simple script which programmatically scrapes every high-definition wallpaper.
Attached image is the script he shared. If you want to experiment with it, just OCR it or something.
After what feels like an eternity, we have finally identified, repaired, and re-deployed our corrupted batch of malware samples from the MalwareIngestion feed for June, 2024.
It's over 600,000 malware samples. Download them.
https://vx-underground.org/Samples/MalwareIngestion