The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh
Today the largest Anonymous social media profile issued a heavily-charged political message regarding recent changes in the United States political ecosystem.
In summary, they assert rapid changes in technology systems, due to actions performed by Elon Musk (or rather the Department of Government Efficiency), has left massive vulnerabilities which can be exploited (and they intend to exploit?).
This has resulted in a lot of attention from non-techies to their social media profiles.
Thoughts:
- Previously Anonymous has promised to perform similar actions, none came to fruition
- Government institutions have been compromised in the past which resulted in very little. Conti, Lockbit, ALPHV (RansomHub), various state-sponsored groups — compromised the United States government (although to various degrees). This includes when the Iran government compromised Trump's campaign via social engineering. It wasn't the end of the world.
- You don't need to exploit anything, just follow Scattered Spider's TTP. Pay some guy $15 to call them and ask for a password reset. Or check stealer logs.
- If in the event a government institution is compromised, what do you intend to do? Deploy ransomware (partially sarcastic)? 99% of United States citizen's PII have been dumped anyway from places like Breached or from previous ransomware attacks.
- Where was this call-to-action speech when other countries had political ideologies present which do not adhere to your belief system?
- Any serious Threat Actor (or Hacktivist) shouldn't announce their intentions to millions of people prior to action. We personally have not witnessed a serious Threat Group release a 3:50 long manifesto prior to performing a compromise.
- Is it a good idea to (metaphorically) declare war on the person who owns this platform? Is it good to (metaphorically) declare war on the United States government on any social media platform without doing due diligence and ensuring your OPSEC isn't cooked?
¯\_(ツ)_/¯
We censored the Meta employee names. We also want to give them a shout-out for trying to push back against Zuckerberg and informing the executives about the ethical issues regarding it.
Читать полностью…Everyone knows that when you're a REAL hacker you follow THE CODE. If other hackers spot you not following THE CODE then you're banned from being a hacker.
Читать полностью…Someone get И́горь Костюко́в on the phone RIGHT NOW because pigs are flying, it's a cold day in hell.
The Trolls from Olgino and APT28 have done such a good job at misinformation, Russia's state-sponsored media outlet has to correct Twitter misinformation.
Google will put advertisements literally anywhere. It's why everything they do turns into a pile of poo poo
Читать полностью…You can keep malware on your computer for free if you want
Читать полностью…malloc, HeapAlloc, GlobalAlloc, LocalAlloc, IMalloc, RtlAllocateHeap are for cowards.
Real gamers call NtAllocateVirtualMemory and recreate the heap structure themselves
Sorry, Claroty, you didn't deserve that. I'm just really annoyed with constant web pop ups and shitty AI agents and sales person buzzwords
Читать полностью…Clone Robotics also noted the skin is very "comfy" and you can "give it a hug".
Читать полностью…To help people understand what's going on we've brought in our corporate translator cat.
“We realized there is a lot of money in making weapons and spying on people. Fuck the pledge. I love money” — Demis Hassabis, CEO of Google DeepMind
Just used my botnet swarm to DDoS 300 elite hackers and scrape all their personal information from the IP address when my IP address was locked
Читать полностью…Plankton: The Movie, scheduled for released on Netflix March 7th, 2025, has been leaked online.
SpongeBob fans are mocking Netflix in the comment section of the movie trailer, the movie is being widely distributed on X by various sock accounts.
Today a Threat Actor(s) operating under the moniker "FutureSeeker" claimed to have compromised TrumpHotels-dot-com.
The Threat Actor(s) appear to have compromised TrumpHotels e-mail notification system. Specifically, the service responsible for reminding and/or verifying reservation details for guests. The data present includes:
- UniqueId (SQL Table)
- First name
- Last name
- Email
- Creation Date
- Unit ID (N/A)
- Status
- Last updated
- Expiration Date
- Sampling exclusion
164,910 records are present in the data dump.
The data exfiltrated from the Threat Actor(s) range from January 18th, 2018 to January 15th, 2025.
While the information does unveil the guests present at the hotel(s) operated by the Trump organization, no PII from guests (omit name, e-mail, reservation date) are present within the data dump. Furthermore, the information does not include wherein the guests resided or date of departure from the hotel(s).
Based on review of the data we do not believe this compromise to be politically motivated or financially motivated. Rather, because of the recent inauguration of the United States president, we perceive this compromise as a way for the Threat Actor(s) to verify their legitimacy as a Threat Group and/or Actor.
We're still in the process of restoring the virus exchange data. In the meantime, as we process and restore data, we can now get real accurate data.
Unique samples:
APTs: 36,547
APK Collection: 24,553
Virusshare.00000: 87,072
Virusshare.00001: 70,927
Virusshare.00002: 37,847
Virusshare.00003: 122,306
Virusshare.00004: 113,896
Virusshare.00005: 99,708
Samples restored: 592,856
Remaining: idk, like, 39,400,000
pov you meet the twitter comment section computer experts irl
Читать полностью…The Blue Team thought I was just some network lackey, but in actuality I'm a silicon valley AI wiz. The CEO just hired me to develop a 4th generation Quantum AI Neural Network.
Even though my background is in Quantum AI Neural Networks, I'm also gifted in offensive and defensive security. I singlehandedly defended my companies server from over 300 elite hackers.
In the midst of the attack the hackers locked our server IP (the life line of the company) and kept attacking our firewall, but I'm a great coder. I very quickly wrote an HTML5 program that unlocked our IP address, redirected the attackers, and created a massive botnet swarm that hacked them back. The botnet swarm also scraped all their personal data off their IP addresses.
The entire Blue Team was amazed (it was 3 people). I told everyone they could go home because I knew it would be a long night of me hacking back over 300 elite hackers.
The next day when everyone returned to the office I was exhausted. The Blue Team was amazed I was still hacking them back with my botnet swarm. I was so focused on hacking them back I didn't realize it had been 18 hours. I hadn't eaten, slept, or practiced any basic hygiene. I defecated in my pants. I urinated all over the floor. The Blue Team insisted I go home, but I'm a silicon valley AI wiz. I instead went into the other room, placed a book over my eyes, and went to sleep.
Unsealed court documents from February 5th, 2024, in Kadrey v. Meta show Meta (formerly Facebook) illegally torrented 81.7TB of data from "shadow libraries" such as Anna's Archive, Z-Library, and LibGen to train Meta artificial intelligence.
Highlights include:
- A senior AI research at Meta says, "I don't think we should use pirated material. I really need to draw a line there."
- Another AI researcher says, "using pirated material should be beyond our ethical threshold" ... "SciHub, ResearchGate, LibGen are basically like PirateBay or something like that, they are distributing content that is protectec by copyright and they're infringing it".
- In January 2023, Mark Zuckerberg attends a meeting which is heavily redacted in court documents. However, he says "we need to this move this stuff forward" and "we need to find a way to unblock all of this".
- Fast forward to April, 2023, Meta employees discuss using a VPN to conceal Meta IP address ranges when torrenting data. Meta employees also discuss the need to involve lawyers if something goes astray. The unredacted court records show a Meta employee saying, "torrenting from a corporate laptop doesn't feel right 😂".
mfw calling the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (Russia has silly names) a/k/a the "GRU" to let them know something is wrong.
Читать полностью…Day 4/???
Restoring virus-dot-exchange.
We have malware
forgive me lord for i have sinned.
i prefer chatgpt over most search engines now because theyre ass.
(we've literally never done this, would be needlessly over complicated with little benefit other than making your code needlessly over complicated)
Читать полностью…Day 3/???
Restoring virus-dot-exchange.
We have malware
February 1st, the Cybersecurity and Infrastructure Security Agency (CISA) released a report on two patient health monitors (CONTEC CMS8000), produced in China, containing backdoors.
February 2nd, Claroty, a United States-based cybersecurity company which specializes in the healthcare domain of cybersecurity, reviewed the firmware of the CONTEC CMS8000 and came to a different conclusion.
Interestingly, the IP addresses discussed by CISA in their report (202.114.4.119 202.114.4.120), are in the operations manual of the CONTEC CMS8000. Additionally, the user manual provides instructions on configuring the Central Management System (CMS) with the IP address listed in healthcare networks.
More information:
https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated
December 24th, 2024, Clone Robotics unveiled their "Torso 2"
It has an actuated lumbar spine and all corresponding abdominal muscles. It's "skin" encloses 910 muscle fibers. It has 164 degrees of motion and 182 sensors for control feedback.
This is their demo
Yesterday Google updated their AI Principles. Google has removed their pledge to not use AI for weapons or surveillance.
“There’s a global competition taking place for AI leadership within an increasingly complex geopolitical landscape” — Demis Hassabis, CEO of Google DeepMind
Day 2/???
Restoring virus-dot-exchange.
We have malware
The past couple of weeks we've noticed Threat Actors hijacking expired bit-dot-ly hyperlinks to push rug pulls and fraudulent meme coins**
In this particular case, they've used it to push AI generated pornography of President Trump
*Cryptodraining nerds corrected us. Initial post we incorrectly said these are drainers. These are not drainers. These are campaigns aimed to push misleading people into purchasing a meme-coin to then subsequently get rug pulled.
*Cryptodraining nerds have notified us bit-dot-ly has introduced additional precautions to combat the recent surge of hijacking expired short links.
> wake up
> go poop
> get out of bed
> check dms
> scammers asks "how were you scammed"
> never said we were scammed
> tries to scam us
> doesnt elaborate
United States foreign adversaries and financially motivated Threat Actors seeing the new FBI Director
Читать полностью…