Our interview with 'Grep' — impersonating a journalist.
https://x.com/vxunderground/status/1827002916856627556
Rumors are floating around someone has compromised wedding planning site 'TheKnot'. Someone is using it to send spam phishing links — accusing people's spouses of cheating.
Which one of you degenerates did this?
Thanks to everyones donations the new vx-underground hardware has arrived and is in prod.
Pros:
- Process malware faster than a fast thing
- Anime
Cons:
- Sounds like jet engine
- Makes room hotter than hell
- Scares the dog
More information: https://www.justice.gov/usao-edky/pr/pulaski-county-man-sentenced-cyber-intrusion-and-aggravated-identity-theft
Читать полностью…Oh, and don't do it for clout. People can smell bullshit a mile away. Just be passionate about what you're doing and have fun. Everything else will follow.
Читать полностью…MalwareBytes responded by removing the block and blaming the intern.
Unironically underpaid social media controller for memeing the excuse meme.
10/10 for person controlling the account
This image was stolen from a Malwarebytes' post. This was the stock photo they used when discussing the National Public Data drama.
This guy looks so concerned 😭😭😭
Hello,
We're aware individuals are having problems accessing some files on vx-underground. Rest assured our finest nerds are on the case.
(two are on Holiday, we're so far up shits creek we can see the shit ocean).
Yes, I'm chillin' with 7TB of malware while running Windows. I like to play video games and I also like doing WINAPI coding. Yes, I could use a VM, but that's a lot of work. It's easier to just carefully not detonate 7TB of malware.
Читать полностью…imagine one day the vx-underground website is compromised and the threat actor tries to deliver malware from it but everyone gets happy because they're just there for the malware anyway
Читать полностью…Today ZachXBT noted unusual BTC activity – at 04 UTC August, 19th, $238,000,000 was moved to Avalanche Bridge, ChangeNow, eXch, Kucoin, Railgun, and ThorChain.
Ransomware? Draining? Money laundering? Anime?
https://blockchair.com/bitcoin/transaction/4b277ba298830ea538086114803b9487558bb093b5083e383e94db687fbe9090
Hello,
We need to make something very clear: we are not like VirusTotal. We are not a competitor to VirusTotal.
VirusTotal does file detections, allows retrohunting, sandboxing and blah blah blah.
We just collect it
They're enterprise malware tooling. We're a public library
I got social engineered into giving an interview for BreachedForum.
They impersonated CyberScoopNews. It seemed strange the journalist was using a Gmail, but I never thought I would be tricked into a vx-underground interview.
Solid impersonation, silly goof.
10/10
We're so back.
We're correctly labeling our malware collection and filtering out the non-malicious files
vx-underground was created to store malware source code, samples, and papers that I liked.
Since 2019 nothing has really changed except I got a team of friends, some help, and some malware source code, samples, and papers.
VXUG in 2019:
https://web.archive.org/web/20190522032703/http://vx-underground.org/
On Tuesday, August 20th, 2024, the United States Department of Justice did a press release on the most intelligent person in world history.
Jesse Kipf, 29 of Somerset, Kentucky, USA, owed a total of $195,758.65 in child support. Jesse, being a true intellectual, decided to the best decision was to compromise the United States Hawaii Death Registry System, using stolen credentials from a physician in a different state outside of Hawaii, and insert himself into the Death Registry. Additionally, he used his own name, Jesse Kipf, to assert his own death and certified his own death using the name Jesse Kipf
tl;dr Jesse Kipf died, death was certified by the deceased Jesse Kipf and corpse of Jesse Kipf was verified by the deceased Jesse Kipf (recursive death certification and verification?)
The death certificate was signed by a different physicians stolen signature.
He was sentenced to 6 years and 7 months in prison for being a true intellectual.
Our advice to anyone who is trying to grow a project, or community, or whatever, is to be consistent.
Our first year we barely had 1,000 followers. We celebrated when we broke 100 followers because it was surreal thinking 100 people cared about this crappy little website.
Administrative updates:
Bad news:
Following our migration we're still having problems with users receiving ACCESS_DENIED when attempting to view or download files
Good news:
We have 100+- papers in queue. We broke a personal record and ingested 450,000+ new malware samples.
POV: Your grandson downloaded a Fortnite mod from a YouTube comment section and now you're being extorted for $999 (but you get 50% off if you pay in less than 72 hours)
Читать полностью…We have incredible news.
Yesterday we spoke with Bernardo Quintero – the Founder of VirusTotal. He granted us insane API access to clean our malware collection. Thanks to him, and the VirusTotal team, we can now guarantee we're sharing pure malware with all of you.
Thank you, VirusTotal
Good news: we have malware
Bad news: soon our malware collection will no longer be able to fit on an 8TB harddrive.
Our entire malware collection 7z ultra compressed is 7.02TB. Papers is 139GB (59,807 papers).
Thank you, Chris Hansen, for the kind words.
(we have no idea who paid Chris Hansen to do this)
Today journalist Brian Krebs released an article about the recent (sort of) compromise of National Public Data. Previously, National Public Data was (sort of) compromised which resulted in the theft of billions of records on individuals residing in the United States.
The drama update:
National Public Data owns a sub-company named RecordsCheck dot net. A customer of RecordsCheck dot net (later unveiled to be a law enforcement officer) was a victim of Information Stealer malware (e.g. Redline, Formbook, Lumma, etc). The malware stole login credentials to RecordsCheck for the law enforcement officer which allowed Threat Actors access to RecordsCheck with essentially infinite credits for searches. The Threat Actor(s) then subsequently began dumping as much data as possible.
The Brian Krebs plot twist:
Brian Krebs discovered that previously RecordsCheck publicly exposed a file on their website titled: "members dot zip". This zip file contained the username and password for every customer on their platform (and supposedly other entities owned by National Public Data) in a plain text file. Krebs discovered that by default, each customer is assigned a 6-character password. As of a result of this accidental exposure, RecordsCheck instructed customers to change their default 6-character password. It turns out many DID NOT change their default assigned 6-character password.
More information on the file exposure, back story, discovery, etc. Can be found on Brian Kreb's article here: https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/
We'll be aiming to share our malware ingestion feed on Xitter everyday. You can watch numbers go up and listen to a cooling system.
Alternatively, you can do something better with your time while we watch numbers go up.
¯\_(ツ)_/¯
This started off as a side-project created to collect and share cool malware stuff that I liked – I hoped maybe other people would find it useful and think it's cool too.
Now it's gotten wildly out of control.