The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh
Updates to vx-underground
- 2021-12-23 - Threat Report: Echelon Malware Detected in Mobile Chat Forums
- 2023-01-22 - BadBazaar: iOS and Android Surveillanceware by China’s APT15 Used to Target Tibetans and Uyghurs
- 2023-02-23 - Berbew Backdoor Spotted In The Wild
- 2023-09-26 - Analyzing Lu0Bot: A Node.js Malware with Near-Unlimited Capabilities
- 2023-12-01 - New Tool Set Found Used Against Organizations in the Middle East, Africa and the US
- 2024-03-01 - NoName057(16)’s DDoSia project: 2024 updates and behavioural shifts
- 2024-03-09 - New Backdoor Activity Socks5Systemz
- 2024-03-18 - Mirai Nomi: A Botnet Leveraging DGA
- 2024-04-01 - Passive DNS For Phishing Link Analysis - Identifying 36 Latrodectus Domains With Historical Records and 302 Redirects
- 2024-05-13 - Gootloader Isn’t Broken
- 2024-05-16 - Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns
BSides Colorado Springs is looking for people to submit papers and talks – especially beginner and/or intermediate malware talks.
They're trying to grow. Go to BSides Colorado Springs, submit a talk, do stuff, and fight bears
Updates to vx-underground
Samples:
- AcidRain
- AgentTesla
- Android.SoumniBot
- AveMaria
- GuLoader
- LummaStealer
- NjRat
- PikaBot
- QakBot
- Rawdoor
- Remcos
- SystemBC
- Upstyle
- Vultur
- zLoader
Papers:
- 2024-06-06 - Remcos RAT Analysis
- 2024-06-06 - Agent Tesla Analysis
- 2024-06-03 - Wineloader – Analysis of the Infection Chain
- 2024-06-03 - PikaBot: a Guide to its Deep Secrets and Operations
- 2024-05-30 - A DNS Investigation of the Phobos Ransomware 8Base Attack
- 2024-05-29 - Fake Browser Updates delivering BitRAT and Lumma Stealer
People are paying thousands of dollars for educational courses on initial access vectors. We'll provide you a step-by-step guide on how to get initial access to companies with a budget of $0. All it requires is some time, effort, and the ability to grep
1. Go to Telegram
2. Get free stealer logs
3. Look for VPN creds
4. Hope no MFA
4.a If MFA, spam requests
4.b If fails, go back to Step 1.
5. Log into VPN
6. Go to Jira / Kanban board
7. Scrape everything when people are sleeping
8. Log out
9. ???
10. Profit!!!11
Congratulations, you're now the most dangerous hacker on the planet
Does this sound absurd? Of course it does. Does it work? Yes, literally every single day. Infostealers are a giant problem. They don't need to target enterprise environments with top-notch security – they only need to target lazy home users, with security settings probably disabled, downloading junk binaries.
Happy Birthday to herm1t.
herm1t was the creator and administrator for vxHeaven. vxHeaven was our inspiration — we try to act a successor for.
We hope you have a wonderful day.
This week Xitter will make likes private.
They're being made private for privacy, or something. We don't trust it. No social media platform cares about privacy.
5 years ago we never would have believed we would corrupt the mind, body, and souls of people by nothing but malware and shit posting.
Here we are.
One time we saw a group of people arguing about different ways to perform variable initialization in C vs C++ vs Rust and which language was superior... for 3.5 hours.
All of them had anime profile pictures.
Thank you to our friends at MDSec Labs for the cool and badass stickers and merch.
Читать полностью…I was told to tweet this.
I forgot it was a thing because I've been busy downloading malware and staring into the void (Telegram).
Everyone is cool though. Watch it. If you don't you'll be bonked.
- smelly smellington
Updates to vx-underground:
Samples:
VirusSign.2024.06.02
VirusSign.2024.06.03
VirusSign.2024.06.04
VirusSign.2024.06.05
VirusSign.2024.06.06
VirusSign.2024.06.07
VirusSign.2024.06.08
VirusSign.2024.06.09
Papers:
- 2024-05-10 - Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators
- 2024-05-14 - Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain
- 2024-05-14 - QakBot attacks with Windows zero-day (CVE-2024-30051)
- 2024-05-15 - Revealing Spammer Infrastructure With Passive DNS - 226 Toll-Themed Domains Targeting Australia
- 2024-05-15 - Black Basta overview and detection rules
- 2024-05-15 - Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
- 2024-05-15 - To the Moon and back(doors)- Lunar landing in diplomatic missions
- 2024-05-16 - Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID
- 2024-05-16 - Springtail: New Linux Backdoor Added to Toolkit
- 2024-05-20 - Tiny BackDoor Goes Undetected: Suspected Turla leveraging MSBuild to Evade detection
- 2024-05-21 - Master of Puppets: Uncovering the DoppelGänger pro-Russian influence campaign
Meanwhile in the non-cyber security world: graphic design nerds are foaming out the mouth as Adobe slip steams 'your work is now ours' into their agreement checkbox (that you probably don't read)
tl;dr they own whatever you make in their software
ShinyHunters, the group (person?) responsible for administrating Breached has disappeared. Breached is offline on both clearnet and Tor
Additionally, Shiny's Telegram and Telegram Channel have been deleted
People are speculating they've been arrested
¯\_(ツ)_/¯
Hello, we hope all of you had a good week and weekend
Today is the day of rest. We'll see you Monday
Also, to clear up some confusion, we are still going to work on vx-underground, the post about 5 years of work was regarding older material
tl;dr got lots of stuff, feels good
(they e-mailed us a long time ago and i forgot)
(going to smaller events is cool and badass)
Good morning,
People are not seeding the vx-underground torrents. You nerds asked for torrents, so you better seed.
>:(
https://vx-underground.org/Torrents
The current state of the vx-underground Telegram chatroom
Читать полностью…Breached after being taken down multiple times from law enforcement agencies
Читать полностью…A sitcom that follows a group of friends, the up's and down's in the Russian ransomware cyber crime ecosystem, and their ultimate pursuit of love
Читать полностью…Today the Ukrainian National Police arrested a 28 year old man who is suspected to have worked with Conti ransomware group and Lockbit ransomware group.
Читать полностью…Yesterday evening a website was launched title: EpicDB. EpicDB is a hobby project created from a user named "MixV2". The EpicDB website is designed to act similar to SteamDB.
Gaming nerds quickly discovered the EpicDB website began leaking information on games (listed on the site under code names) which are scheduled to arrive on Epic games platform. To the best of our knowledge, no information has been disclosed on how EpicDB gathered these code names.
Confirmed titles:
- Dragon Age: The Veilguard
- Helldivers 2 (never released onto Epic)
- Last of Us Part 2
- Apex Legends
- Battlefield 2042
- Tomb Raider Bundle
- Final Fantasy XVI
- Final Fantasy IX
- Remnant 3
- BioShock 4
- Growtopia
Speculated titles:
- Rise of the Ronin
- Spider-Man Miles Morales
- Streets of Rage
- Crazy Taxi
- Max Payne 1+2 Remake
- Red Dead Redemption
- DOOM: The Dark Ages
- Doom Eternal
- Bloodlines 2
- Europa Universalis V
- Warhammer: Vermintide 3
- Civilization VI
- Civilization IV
- AtomFall
- Among Us 2
There are nearly 100 code names for unreleased content. We aren't going to list them all. Here are some highlights:
- LaserLemon
- GreenSheen
- Debussy
- Project Wiseguy
- Burger
- Puffpastry
- CurlyWurly
- Croquembouche
Denial of Service via Trebuchet
hashtag red team tips
In other news, today Lockbit ransomware group posted that someone is conducting a Denial of Service attack via Friend Request's on Tox.
They've allegedly received 200,000 Friend Requests
Neat
Yesterday Apple announced they plan on introducing ChatGPT into Siri, iOS, and MacOS
https://arstechnica.com/gadgets/2024/06/apple-integrates-chatgpt-into-siri-ios-and-mac-os/
Cybersecurity Among Us sponsored by keepitcloaked this Wednesday, 7 PM EST with h313n_0f_t0r repping vx-underground! We will be unable to stream it ourselves that day, so please enjoy by tuning in to your favorite participating streamer.
Читать полностью…David Fincher's 1999 cult-classic 'Fight Club', based on the novel written by Charles Palahniuk, has a scene which philosophically reminds us of what we witness every single day in the cyber-ecosystem
Читать полностью…The only thing we know for sure is that it's Sunday. We dislike when things happen on Sunday
>:(
We've received a lot of messages today regarding Lockbit ransomware groups Telegram.
We've been in contact with Lockbit ransomware group and several of their affiliates and subgroups since 2019. Lockbit ransomware group does not have a Telegram.
Lockbit is so paranoid he uses his own onion-based file sharing service. He thinks Telegram, Twitter, virtually all social media, is controlled by governments and refuses to use them.
Also, the account some of you send us named FbiSupp is not the real FBI. We have no idea what or who this account is — but the real FBI Telegram accounts are listed on the United States Department of Justice and Justice for Rewards (operated by the United States Department of State) website. These are imposters.
tl;dr being scammed by fake FBI because ??? and scammed by fake Lockbit because ???
After over 5 years of work, we believe vx-underground is now approaching "maintenance mode" — our work will primarily be keeping content up to date.
tl;dr 1,825 days of work